Facebook's Internal Content Rules Revealed

A secretly leaked Facebook document has revealed how users are allowed to call for the death of public figures and can praise mass murders, based on company's own vague definitions of what constitutes a crime. This 300-page Facebook document explains what sentences and phrases are ethically unacceptable to publish on Facebook’s 2.8 billion monthly users’ site.

The guidelines seen by the Guardian show how the company controls its mainly outsourced moderators’ work down to the smallest detail, defining its rules so precisely that contractors are told which emojis constitute “praise” and which count as “condemnation”.

A particular area of contention surrounds what are defined as dangerous individuals and organisations. In the leaked documents dating from December 2020, moderators for Facebook and Instagram are instructed how to define “support” for terrorist groups and other “dangerous individuals”, whether to distinguish between “explaining” and “justifying” the actions of terrorists, and even in what contexts it is acceptable to call for the use of “gas chambers”.

While Facebook’s community guidelines which have in a short report been publicly available since 2018 but these newly leaked 300 page documents are different. 

These much more detailed guidelines explain what the published rules mean in practice. Facebook has long argued that to publish the full documents would be counterproductive since it would let malicious users avoid a ban for deliberately borderline behaviour.

According to the internal guidelines, Facebook bans users from “expressing a belief in the stated goals, methods, etc of an organisation or individual.” According to the company they do protect the public figures in some ways. Any posts which seems to have an extremely severe attack is removed while posts containing threats in which the directed person is tagged is also removed. However, for the private citizens this security goes a lot deeper and further and they are protected in several other ways with greater measures. 

Facebook, which also owns Instagram, has changed its policies in response to the criticism, introducing new rules to cover abuse sent through direct messages and committing to cooperate with law enforcement over hate speech.

These new guidelines say public figures can be targeted in ways that the company bans for those classed as private individuals, although they cannot be tagged in the content and its policy protects them from direct threats of severe physical harmIt comes as social networks face renewed criticism over abuse on their platforms from people in the public eye, including  the Duke and Duchess of Sussex and black sports stars like soccer player Marcus Rashford. 

In response to the Guardian, a Facebook spokesperson said: “We think it’s important to allow critical discussion of politicians and other people in the public eye. But that doesn’t mean we allow people to abuse or harass them on our apps.

“We remove hate speech and threats of serious harm no matter who the target is, and we’re exploring more ways to protect public figures from harassment.... We regularly consult with safety experts, human rights defenders, journalists and activists to get feedback on our policies and make sure they’re in the right place.”

Facebook:    Guardian:      ITV:      Daly Mail:     MacObserver:    Digital Information World:     Image: Unsplash

You Might Also Read: 

Facebook To Pay $650m For Facial Recognition Lawsuit:

 

« Avoiding Arrest: Cyber Criminals Share Dark Web Secrets
Investigating Fake News With Google, YouTube & Facebook »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

AngelList

AngelList

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.

Innerworks

Innerworks

Innerworks intelligent bot detection. Innerworks is building the future of behavioural data on web3.