Instagram Allows Users To Download Everything Shared

Instagram has confirmed it will let users download their personal data, including previously shared photos, videos and messages, as it prepares for the European data regulation GDPR.

While its parent company, Facebook, had announced a suite of GDPR controls, which Mark Zuckerberg emphasised during his testimony to Congress, Instagram had been quiet on the issue.

GDPR (General Data Protection Regulation) brings with it a number of rights for individuals, including to demand deletion of data, to opt out of future data collection, and to view the personal data a company possesses and to download it in a format that can be moved over to competitors.

These were the requirements Instagram would fulfil shortly, the company confirmed to TechCrunch. “We are building a new data portability tool,” a spokesperson said. “You’ll soon be able to download a copy of what you’ve shared on Instagram, including your photos, videos and messages.”

The tool will be helpful for users who want to extract what they have uploaded to Instagram. Treasured photos and videos can sometimes get lost in their original form, but currently there are few ways to easily access the high-resolution originals if they have been posted on the social network.

It is unclear whether the company will also include details of a user’s advertising profiling in its data download.

The wealth of information included in Facebook’s equivalent service shocked some users, who were unhappy to discover that the company had tracked metadata of their text and phone conversations.

GDPR comes into effect on 25 May, which means the coming month will probably include a flurry of announcements similar to Instagram’s. Many large tech companies, including Google, have yet to confirm whether they are altering their products to comply with the regulation.

A number of data breaches may also be made public next month as companies race to beat the GDPR deadline. When the regulation comes into effect, the maximum penalty for a breach multiplies vastly from £600,000 to €20m (£17m), or 4% of global turnover.

The European commission intends to police that deadline according to the date of disclosure, not the date of the underlying breach. This means any company that has been withholding knowledge of a successful hack will need to disclose that fact sooner rather than later, or risk a hefty penalty.

Guardian

You Might Also Read: 

Instagram Launches Story Search:

GDPR Countdown:

 

« Six Benefits From Artificial Intelligence & Machine Learning
Facebook Could Save Your Life »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija (Slovenia Accreditation) is the national standards accreditation body for Slovenia.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

North East Business Resilience Centre (NEBRC)

North East Business Resilience Centre (NEBRC)

The North East Business Resilience Centre is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.