Fact-Checking Comes To Instagram

Facebook has owned Instagram for seven years and is now expanding its 3rd party fact checker to Instagram. 
“The potential to prevent harm is high here, particularly with the widespread existence of health misinformation on the platform,” Facebook fact-checking partner Full Fact said in a recent Report. 
 
“Since starting work with Facebook on the Third Party Fact Checking programme in January, the first three months were Full Fact’s familiarisation period. The following three months were focused on trying to expand our coverage in specific areas that we identified as important, notably health information.” 
 
The report finds that Facebook’s Third Party Fact Checking programme is worthwhile in helping to counter misinformation online, and includes work of clear social value. We are encouraged by some signs that Facebook is continuing to improve the initiative, but further development is needed.
 
The report sets out 10 recommendations for Facebook on actions to be taken to improve the programme. It calls for Facebook to share more data with fact checkers to better evaluate impact; to develop its tools to better identify potentially harmful false content; and for the programme to be expanded to other platforms. 
 
It also calls on the US government to review responsibilities for providing authoritative public information on topics where harm may result from inaccurate information, in particular in areas such as public health and the law.
 
This is Full Fact's first report, covering the first half of 2019 in which it lays out a list of protection standards: 
 
• Facebook has no control over what is checked and what rating they give.
• Once a fact check happens, it is automatically uploaded to the platform. No Facebook staff member sees it before it goes live.
• All fact checks under this project are on on Full Fact’s website and they will evaluate the project continually.
• The project has been designed to protect free expression. It gives people more information about the accuracy of an article, image or video, but doesn’t stop anyone sharing anything they want to.
 
Major Incident procedure 
“One of the areas where we believe the Third Party Fact Checking programme can play a useful role is in responding quickly to emergency situations where rumours and inaccurate information may be spreading online, for example after terrorist attacks or during natural disasters. In these situations, the risk of harm from misleading information can be very high.” 
 
FullFact:         NiemanLab
 
You Might Also Read: 
 
Five Tech Giants Promise To Stop Terrorist Content:
 
Jamie Bartlett: Tech Will Change Us:
 
 
 
« US Army To Focus On Information Warfare
Its Your People Who Contribute To Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.