Facebook Wants To Eliminate Racially Targeted Advertising

Facebook has updated its advertising policies to ban discrimination based on a number of personal characteristics, including race, ethnicity, sexual orientation or age.

Accompanying the new policies is a section aimed at educating advertisers about the extent to which ad targeting is allowed on the social network, both in terms of Facebook’s own policies and applicable national laws.

Enforcing the rules may be tricky, but Facebook plans to use new technology “that leverages machine learning” to identify the most egregious offenders – those that “offer housing, employment or credit opportunities” in a discriminatory manner.

The move follows accusations that the social network offered tools that allow advertisers to break American anti-discrimination laws, through an ad-targeting feature described as “ethnic affinity” profiling.

First highlighted in March 2016, the affinity targeting was intended to allow advertisers to target messages to specific audiences without getting into the murky ground of racial profiling.

Facebook describes the feature as grouping people not by “their genetic makeup, but their affinity to the cultures they are interested in”. That way, a white Facebook user who has expressed interest in hip-hop music, the TV channel BET, and the films of Spike Lee might be put in the “African-American” affinity group.

Although Facebook goes to great lengths to emphasise that the feature, which is still available for advertisers, is not the same as racial profiling, a second wave of negative publicity arrived in October 2016, when ProPublica reported that the affinity targeting could be used to exclude particular groups from advertising for home sales. That is explicitly banned under the Civil Rights Act of 1964, due to America’s long history of segregation.

Now, if Facebook’s tools think that a user is attempting to implement the “multicultural advertising segments” targeting unlawfully, it will force them to undergo manual review, with a Facebook employee explicitly checking for compliance. And for housing, employment and credit adverts which are targeted in other ways, the company is asking advertisers to explicitly certify their compliance with relevant laws.

“Several organisations have asked us to work with them to help identify ways that our advertising technology could be used to promote inclusion and opportunity for underserved communities, while also protecting against discriminatory uses,” Facebook said in a blogpost. “We believe in the power of our advertising products to create opportunities for people from all backgrounds, so we are committed to working with these groups toward that goal.”

Guardian

Facebook To Introduce Fake News Tools:     Social Media & The New Advertising Model (£):

« ‘Cyber War’ Is Fast Becoming Just ‘War’
Banks Around The World Hit With Fileless Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

Aspire Technology Solutions

Aspire Technology Solutions

Aspire is an award-winning IT Managed Service and Cyber Security Provider. We specialise in cyber security, cloud, connectivity, managed services, unified communications and IT support.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.