Six Facebook Privacy Blunders - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Facebook Privacy Blunders-4 Next

In January 2011, Facebook scored another one for its "act first, apologize later" strategy. The company announced it would make user information – including phone numbers – available to application developers. But they wouldn't get access to the data until after they got express permission "through the usual permission dialogues," according to the INQUIRER.

After only three days, however, Facebook suspended the program, indicating it had received feedback that users weren't exactly clear on when they would and would not be giving up access to their information, even with the standard permissions dialogue boxes.

Over the years, Facebook has developed features and made policy changes that have routinely put privacy advocates on the warpath, so much so that blogger Lora Bentley wonders if they don’t pay people to dream up new ways to annoy them.

Despite the privacy concerns, Facebook remains hugely popular and as a company appears set on the path to constantly push the privacy boundary.  A reader from The New York Times summed it up this way:

When will the great analysts of today finally get it? We, the 20-somethings of today, are not that concerned about privacy. Facebook has become a way of life.

This slideshow features some of Facebook’s more spectacular blunders.

More Slideshows:

Ten Tips for Getting the Most from Your Mentor Both parties need to take an active role for this relationship to pay off.

Salary Negotiations: Insider Secrets Recruiter reveals insider's secrets to getting paid what you want.

Top 25 Companies for Work-life Balance See which companies employees rank highest for work-life balance.


Related Topics : Symantec, Spyware, Supercomputing, HIPAA, Privacy

More Slideshows

security43 Protecting Corporate Identities Through Password Management

One of the best ways to keep corporate identities safe is to practice proper password management. From an IT perspective, this entails determining the types of passwords that are acceptable and where they are housed on the company's systems. ...  More >>

Security70-190x128 What to Look for in an IAM Solution

A number of new capabilities available in IAM solutions greatly increase security, while improving employees' productivity. ...  More >>

Misc38-190x128 Five Critical Tenets of Identity and Access Management

The identity and access management (IAM) market is experiencing a renaissance with the emergence of new options for how and where to deploy IAM technology, both on-premises and as a service. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.