That thing that used to be called privacy

January 2013 News & Events

If you use Facebook, you might have seen a spate of status updates claiming that the user’s posts are copyright and cannot be used by Facebook (or anyone) without the account holder’s written permission. Of course this is useless as when you sign onto Facebook you sign away all rights to privacy and all those nice things so that Facebook can use whatever it wants from your profile to try to make money. Simply putting a new declaration on your status does not change the terms of Facebook’s service, which it changes whenever it feels like it to benefit itself.

The issue is, of course, more than simply a matter of what Facebook does with your data (which is not private, no matter what you may think). It is a matter of privacy in general and the erosion of it specifically. The worst offenders are not the social media sites that collect all your information, but those individuals who fill out whatever information the screen in front of them asks for without thinking, and then continue to update the site (and other social media sites) with details of every aspect of their lives. Being cool can be dangerous.

The best example of how careless people are can be seen in this YouTube video ( http://ow.ly/fDTTx, which redirects to http://www.youtube.com/watch?feature=player_embedded&v=F7pYHN9iC9I). It is an advert from a bank in Europe. This clip has been seen by over 6 million people, but I wonder how many people actually pay attention to it

If you are the type of person who puts personal information on social media, and in this case Facebook specifically – things like pictures of your kids – you should go to www.takethislollipop.com (I had trouble running it in Chrome, but it works well on Internet Explorer). The site was introduced at the launch of the 2012/13 South African Cyber Threat Barometer. It simply takes random information from your Facebook profile and incorporates them into a story. You have to sign in via your Facebook details, but it is safe, if not somewhat traumatic.

To practice good online behaviour, simply go to Facebook’s Privacy Settings, click on the 'Ads, Apps and Websites' option and remove www.takethislollipop.com to revoke its access to your Facebook data – after you have watched it.

Of course, this is fun to watch, but it shows Facebook fans just how much information they are putting out there. So, how much of your life is online? And given the environment we live in, perhaps the more important question is, how much of your kids’ lives are online?

Andrew Seldon – Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
Linear heat detection (LHD) from Technoswitch
Technews Publishing Technoswitch Fire Detection & Suppression Products & Solutions Fire & Safety
SecuriHeat LHD by Securiton prevails where conventional fire detectors reach their physical limits. It copes well with extreme temperatures and constantly high atmospheric humidity, while precise measurements are also possible when corrosive gases and contaminated air are present.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...