Facebook's Internal Content Rules Revealed

A secretly leaked Facebook document has revealed how users are allowed to call for the death of public figures and can praise mass murders, based on company's own vague definitions of what constitutes a crime. This 300-page Facebook document explains what sentences and phrases are ethically unacceptable to publish on Facebook’s 2.8 billion monthly users’ site.

The guidelines seen by the Guardian show how the company controls its mainly outsourced moderators’ work down to the smallest detail, defining its rules so precisely that contractors are told which emojis constitute “praise” and which count as “condemnation”.

A particular area of contention surrounds what are defined as dangerous individuals and organisations. In the leaked documents dating from December 2020, moderators for Facebook and Instagram are instructed how to define “support” for terrorist groups and other “dangerous individuals”, whether to distinguish between “explaining” and “justifying” the actions of terrorists, and even in what contexts it is acceptable to call for the use of “gas chambers”.

While Facebook’s community guidelines which have in a short report been publicly available since 2018 but these newly leaked 300 page documents are different. 

These much more detailed guidelines explain what the published rules mean in practice. Facebook has long argued that to publish the full documents would be counterproductive since it would let malicious users avoid a ban for deliberately borderline behaviour.

According to the internal guidelines, Facebook bans users from “expressing a belief in the stated goals, methods, etc of an organisation or individual.” According to the company they do protect the public figures in some ways. Any posts which seems to have an extremely severe attack is removed while posts containing threats in which the directed person is tagged is also removed. However, for the private citizens this security goes a lot deeper and further and they are protected in several other ways with greater measures. 

Facebook, which also owns Instagram, has changed its policies in response to the criticism, introducing new rules to cover abuse sent through direct messages and committing to cooperate with law enforcement over hate speech.

These new guidelines say public figures can be targeted in ways that the company bans for those classed as private individuals, although they cannot be tagged in the content and its policy protects them from direct threats of severe physical harmIt comes as social networks face renewed criticism over abuse on their platforms from people in the public eye, including  the Duke and Duchess of Sussex and black sports stars like soccer player Marcus Rashford. 

In response to the Guardian, a Facebook spokesperson said: “We think it’s important to allow critical discussion of politicians and other people in the public eye. But that doesn’t mean we allow people to abuse or harass them on our apps.

“We remove hate speech and threats of serious harm no matter who the target is, and we’re exploring more ways to protect public figures from harassment.... We regularly consult with safety experts, human rights defenders, journalists and activists to get feedback on our policies and make sure they’re in the right place.”

Facebook:    Guardian:      ITV:      Daly Mail:     MacObserver:    Digital Information World:     Image: Unsplash

You Might Also Read: 

Facebook To Pay $650m For Facial Recognition Lawsuit:

 

« Avoiding Arrest: Cyber Criminals Share Dark Web Secrets
Investigating Fake News With Google, YouTube & Facebook »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

Laneden

Laneden

Laneden specialise in helping organisations identify security concerns and quantify the risks you may have across your assets, using Penetration Testing, Threat Simulation and Compliance Testing.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.