{"id":5598,"date":"2018-04-03T10:19:34","date_gmt":"2018-04-03T14:19:34","guid":{"rendered":"http:\/\/ncjolt.org\/?p=5598"},"modified":"2020-06-04T20:52:32","modified_gmt":"2020-06-04T20:52:32","slug":"facebooks-cambridge-analytica-scandal-shines-spotlight-privacy-concerns","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/facebooks-cambridge-analytica-scandal-shines-spotlight-privacy-concerns\/","title":{"rendered":"Facebook\u2019s Cambridge Analytica Scandal Shines a Spotlight on Privacy Concerns"},"content":{"rendered":"<p>Years of stewing privacy concerns have erupted in response to Facebook\u2019s Cambridge Analytica scandal. Cambridge Analytica <a href=\"https:\/\/www.nytimes.com\/2018\/03\/17\/us\/politics\/cambridge-analytica-trump-campaign.html\">obtained information<\/a> collected from more than 50 million Facebook profiles without users\u2019 permission. In 2014, information gathered on <a href=\"https:\/\/www.nytimes.com\/2018\/03\/17\/us\/politics\/cambridge-analytica-trump-campaign.html\">Facebook<\/a> was used to create around 30 million psychographic profiles. Surprisingly, the only <a href=\"https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/facebook-data-sharing.html\">\u201cproblem\u201d<\/a> according to Facebook\u2019s rules was that Cambridge Analytica didn\u2019t collect the information themselves. It wasn\u2019t the information that was obtained or how it <a href=\"https:\/\/www.nytimes.com\/2018\/03\/18\/us\/cambridge-analytica-facebook-privacy-data.html\">was used<\/a> that broke Facebook\u2019s rules; it was the fact that they got the information from a third party.<\/p>\n<blockquote><p>Facebook actually encourages third-party apps to collect personal information to fulfill the app developers purpose and have had little in place to prevent <a href=\"https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/facebook-data-sharing.html\">developers<\/a> from exploiting the personal information available on its platform.<\/p><\/blockquote>\n<p>\u201cUsers can <a href=\"https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/facebook-data-sharing.html\">opt out<\/a> of sharing specific pieces of information, but it\u2019s unclear how many do.\u201d<br \/>\nIt\u2019s almost certain that similar practices permeate throughout social media companies and the tech industry as a whole.\u00a0 The public\u2019s realization that they are being profiled, sold, and possibly manipulated has likely led to the <a href=\"https:\/\/www.nytimes.com\/2018\/03\/28\/technology\/social-media-privacy.html?hp&amp;action=click&amp;pgtype=Homepage&amp;clickSource=story-heading&amp;module=photo-spot-region&amp;region=top-news&amp;WT.nav=top-news\">growing discomfort<\/a> that many have with these large platforms. Facebook, Twitter, and Google (Alphabet) online services are largely built around the <a href=\"https:\/\/www.nytimes.com\/2018\/03\/28\/technology\/social-media-privacy.html?hp&amp;action=click&amp;pgtype=Homepage&amp;clickSource=story-heading&amp;module=photo-spot-region&amp;region=top-news&amp;WT.nav=top-news\">monetization<\/a> of personal data and serving ads to hungry users. These services have long since switched from being free to \u201cfree.\u201d\u00a0 The features they provide are not the free loving meals of a parent but instead a fisherman\u2019s \u201cfree\u201d worm on a fish hook.\u00a0 While the fish in this analogy have \u201cconsented\u201d to sharing their data, the problem is that many do not know what is collected from them or what it will be used for.<br \/>\nAnother problem is that once a person has consented to giving their information to one app there is not much deterrence to sharing that information with others.\u00a0 When data is exchanged between private individuals illegally or legally it\u2019s not like you see shipping containers of goods.\u00a0 No one may ever know.\u00a0 Presently, there doesn\u2019t appear to be any effective system in place by<a href=\"https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/facebook-data-sharing.html\"> Facebook<\/a> to prevent the transfer of this information.<br \/>\nAs a result of this scandal, Facebook is under<a href=\"https:\/\/www.npr.org\/sections\/thetwo-way\/2018\/03\/26\/597135373\/ftc-confirms-its-investigating-facebook-for-possible-privacy-violations\"> investigation<\/a> by the FTC and may also be hit with lawsuits from <a href=\"https:\/\/www.npr.org\/sections\/thetwo-way\/2018\/03\/26\/597135373\/ftc-confirms-its-investigating-facebook-for-possible-privacy-violations\">State Attorneys<\/a> around the country. <a href=\"http:\/\/www.latimes.com\/business\/la-fi-facebook-zuckerberg-testify-20180322-story.html\">Congress<\/a> has also requested that Zuckerberg testify before them.\u00a0 Lawmakers will undoubtedly review current privacy laws and suggest changes to meet the concerns of the country. However, lawmakers will need to be discerning in this area because there will be tradeoffs between technological innovation and privacy. <a href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2017\/06\/09\/why-ai-would-be-nothing-without-big-data\/#15f589414f6d\">Artificial intelligence<\/a>, for example, is progressing at breakneck speeds because of the wide availability of data. This scientific progress will create new wonders, but it is important that lawmakers and the tech community appreciate the individuals need for privacy.<br \/>\nTech companies will have to look at more than just their bottom line and the competition to develop new products. Lawmakers should probably wait for the industry to regulate itself, however, it could be argued that this opportunity has already been given. But, allowing companies to regulate themselves, instead of the government passing hardline rules, would leave more space for companies to react to advances in technology. Companies need to strive for the optimal balance in their own space and not simply develop methods, likely no less intrusive or outrageous, that skirt the rules passed by lawmakers. Hard line rules may allow companies to point the finger at government, for passing \u201cshoddy laws\u201d, instead of taking the blame themselves. Hopefully, if the public is educated on how to protect their privacy and what companies are doing with their data, the public\u2019s opinion and outrage will stimulate change in this field without the government having to act.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Years of stewing privacy concerns have erupted in response to Facebook\u2019s Cambridge Analytica scandal. Cambridge Analytica obtained information collected from more than 50 million Facebook profiles without users\u2019 permission. In 2014, information gathered on Facebook was used to create around 30 million psychographic profiles. Surprisingly, the only \u201cproblem\u201d according to Facebook\u2019s rules was that Cambridge <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/facebooks-cambridge-analytica-scandal-shines-spotlight-privacy-concerns\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5597,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5598"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=5598"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5598\/revisions"}],"predecessor-version":[{"id":6950,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5598\/revisions\/6950"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/5597"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=5598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=5598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=5598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}