Facebook's Internal Content Rules Revealed

A secretly leaked Facebook document has revealed how users are allowed to call for the death of public figures and can praise mass murders, based on company's own vague definitions of what constitutes a crime. This 300-page Facebook document explains what sentences and phrases are ethically unacceptable to publish on Facebook’s 2.8 billion monthly users’ site.

The guidelines seen by the Guardian show how the company controls its mainly outsourced moderators’ work down to the smallest detail, defining its rules so precisely that contractors are told which emojis constitute “praise” and which count as “condemnation”.

A particular area of contention surrounds what are defined as dangerous individuals and organisations. In the leaked documents dating from December 2020, moderators for Facebook and Instagram are instructed how to define “support” for terrorist groups and other “dangerous individuals”, whether to distinguish between “explaining” and “justifying” the actions of terrorists, and even in what contexts it is acceptable to call for the use of “gas chambers”.

While Facebook’s community guidelines which have in a short report been publicly available since 2018 but these newly leaked 300 page documents are different. 

These much more detailed guidelines explain what the published rules mean in practice. Facebook has long argued that to publish the full documents would be counterproductive since it would let malicious users avoid a ban for deliberately borderline behaviour.

According to the internal guidelines, Facebook bans users from “expressing a belief in the stated goals, methods, etc of an organisation or individual.” According to the company they do protect the public figures in some ways. Any posts which seems to have an extremely severe attack is removed while posts containing threats in which the directed person is tagged is also removed. However, for the private citizens this security goes a lot deeper and further and they are protected in several other ways with greater measures. 

Facebook, which also owns Instagram, has changed its policies in response to the criticism, introducing new rules to cover abuse sent through direct messages and committing to cooperate with law enforcement over hate speech.

These new guidelines say public figures can be targeted in ways that the company bans for those classed as private individuals, although they cannot be tagged in the content and its policy protects them from direct threats of severe physical harmIt comes as social networks face renewed criticism over abuse on their platforms from people in the public eye, including  the Duke and Duchess of Sussex and black sports stars like soccer player Marcus Rashford. 

In response to the Guardian, a Facebook spokesperson said: “We think it’s important to allow critical discussion of politicians and other people in the public eye. But that doesn’t mean we allow people to abuse or harass them on our apps.

“We remove hate speech and threats of serious harm no matter who the target is, and we’re exploring more ways to protect public figures from harassment.... We regularly consult with safety experts, human rights defenders, journalists and activists to get feedback on our policies and make sure they’re in the right place.”

Facebook:    Guardian:      ITV:      Daly Mail:     MacObserver:    Digital Information World:     Image: Unsplash

You Might Also Read: 

Facebook To Pay $650m For Facial Recognition Lawsuit:

 

« Avoiding Arrest: Cyber Criminals Share Dark Web Secrets
Investigating Fake News With Google, YouTube & Facebook »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

One82

One82

Serving emerging small and medium-sized businesses in California and neighboring regions for over 20 years, One82 has established itself as the most dependable provider of IT support services.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.