Meta To Use Facebook & Instagram Posts To Develop AI Tools

Meta is to go ahead with controversial plans to use millions of British Facebook and Instagram posts to train its Artificial Intelligence (AI) technology, in a practice that is effectively outlawed under EU privacy laws. 

The company will use public posts, including photos, captions and comments to train its generative artificial intelligence models, although the training content will not include private messages or information from accounts of users under the age of 18.

Meta said it had “engaged positively” with the Information Commissioner’s Office (ICO) over the plan, after it delayed similar proposals earlier this year. The pause came after the ICO warned AI firms to respect users privacy when using generative AI. 

The ICO has made it clear it has not provided regulatory approval for the plan, but will instead monitor the experiment after Meta agreed changes to its approach.

These include making it easier for users to opt out of allowing their posts to be processed for AI. Privacy campaigners, including the Open Rights Group (ORG) and None of Your Business (NOYB), are alarmed at the plans. When the plans were first discussed ORG accused Meta of “turning all of us into involuntary (and unpaid) test subjects for their experiments”. Alongside NOYB it urged the ICO and the EU to block them.

Meta has said that the EU is delaying AIO development by refusing to allow EU citizens’ posts to be used for AI training.

In a statement Meta said: “This means that our generative AI models will reflect British culture, history and idiom, and that UK companies and institutions will be able to utilise the latest technology. We’re building AI at Meta to reflect the diverse communities around the world and we look forward to launching it in more countries and languages later this year.” 

In comment, Stephen Almond, the ICO’s executive director for regulatory risk, said: “We have been clear that any organisation using its users’ information to train generative AI models should be transparent about how people’s data is being used... Organisations should put effective safeguards in place before they start using personal data for model training, including providing a clear and simple route for users to object to the processing.”

 “The ICO has not provided regulatory approval for the processing and it is for Meta to ensure and demonstrate ongoing compliance.” Almond added.

Facebook   |    Open Rights Group   |   Reuters   |   Guardian   |    Standard   |   Techcrunch  

Image: Pixabay

You Might Also Read: 

Grok Faces Prosecution For Misusing AI Training Data:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« US Healthcare Provider Fails To Protect Customer Data
Cristiano Ronaldo Has A Billion Social Media Followers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Alyne

Alyne

Alyne is a Munich based 2B RegTech offering organisations risk insight capabilities through a Software as a Service.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.