In a modern healthcare setting, the stethoscope and the blood pressure cuff aren’t the only…
Read More
Twitter Bans Sharing Private Images and Video Without Consent
In a change to its Private Information Policy, Twitter has banned the sharing of personal media, such as images or videos without the subject’s consent.
Why?
Twitter says that as part of its ongoing work to align its safety policies with human rights standards, it needs to take action to tackle the possible misuse of media and information that is not available elsewhere online as a tool to harass, intimidate, and reveal the identities of individuals. Twitter says that it is particularly concerned about how sharing images or videos, without consent, could have a disproportionate effect on women, activists, dissidents, and members of minority communities in terms of violating their privacy or even leading to emotional or physical harm.
Existing Policies and Rules Not Enough
Twitter’s existing policies and rules only cover explicit instances of abusive behaviour. The update to the Private Information Policy, however, means that Twitter can now take action on media that is shared without any explicit abusive content, but is posted without the consent of the person depicted.
What Can’t You Share Anyway?
The existing aspects of Twitter’s policies mean that users can’t share the following media or information without the consent of the subject / the person it belongs to:
– Home address or physical location information, including street addresses and GPS coordinates.
– Any identity documents e.g., government-issued IDs and social security or other national identity numbers.
– Contact information, including non-public personal phone numbers or email addresses.
– Any financial account information e.g., bank account details or credit card details; other private details such as biometric data or medical records.
How Will The Change Work?
The change to the Private Information Policy means that if Twitter is notified by the individuals depicted (or by an authorised representative) that they did not consent to having their private image or video shared, Twitter will remove it.
Exceptions
Twitter has said, however, that the policy is not applicable to:
– Media featuring public figures or individuals when media and accompanying Tweet text are shared in the public interest or add value to public discourse.
– Situations where images or videos of private individuals are shared in an effort to help someone involved in a crisis situation e.g., the aftermath of a violent event.
– Situations where the ‘context’ dictates that the image/video should stay e.g., where the image/video has been made publicly available and/or is being covered by mainstream/traditional media.
Criticism
The policy change received criticism online for lacking clarity e.g., about who is considered to be a public figure and what can be defined as “private” images. Some critics also questioned how the policy would be enforced and suggested that the policy may end up disproportionately affecting those marginalised individuals that Twitter claims it will protect. Twitter sought to clarify its position by posting on its own platform to say that images/videos showing people participating in public events such as large-scale protests, sporting events, etc. would not generally violate the policy and that they would require a first-person report of the photo/video in order to review the media before any enforcement action could be taken.
What Does This Mean For Your Business?
With the strengthening of data protection laws (e.g. GDPR in Europe) and social media companies now under serious scrutiny over how they protect their users (e.g. the recent Facebook Whistleblower allegations), it is not surprising to see social media platforms announcing new safety measures. For Twitter, this strengthening of an existing policy to deal more effectively with image and video privacy and security issues sounds helpful and responsible but, as critics have said, needs further clarification and still relies upon Twitter’s own judgements about context, public interest, and other (often grey) areas. This illustrates how complex the matter of sharing, consent, and social platform self-policing and policies have become. This expansion of an existing policy is one in what is likely to become a long line of incremental changes for Twitter to try and show that it can keep its own house in order, dodge being cast as a ‘publisher’ rather than a ‘platform’, and thereby avoid the need for more regulation.
About Us
J700 Group are a Lancashire-based, family-run, Managed Solutions Provider helping Businesses, the Education Sector, and the Healthcare Sector to utilise Innovative IT Consultancy Services, Cloud Solutions, Cyber Security, Microsoft 365, Telecoms, Web Design and SEO solutions to propel their organisation to the next level and beyond.
As an experienced professional and responsive, IT Support Provider, helping businesses across Lancashire & Manchester, if you need any assistance with your IT including IT Hardware, a Disaster Recovery Policy or Managed Backup Solutions; Contact Us today on 0333 7721 700 to see how we can help your business.
#tech #technews #technology #j700group #biztips #b2b #sme #lancashire #itsupport
Where to find us: Prinny Mill Business Centre, 68 Blackburn Road, Haslingden, Lancashire, BB4 5HL
#tech #technews #technology #j700group #itsupport #lancashire #twitter #gdpr #dataprotection
When people hear the word cybersecurity, they often imagine complex systems, expensive software and specialist…
Read MoreAs we count down to midnight, most of us are thinking about gym memberships or…
Read MoreIt’s Christmas Eve in Lancashire. The Preston bypass is a nightmare, the last-minute dash to…
Read MoreFor many businesses, the Christmas period means quieter offices, reduced staffing and systems left running…
Read MoreOr: Why we’d like to have a word with Tim Cook this Christmas. There are…
Read MoreHackers Love Christmas: Learn Why your Business Could be at Risk This Holiday SeasonThe festive…
Read MoreIn recent months, high-profile companies like Land Rover and Co-op have made headlines due to…
Read MoreExplore 7 essential tips for effective cloud solutions comparison to find the best fit for…
Read MoreLearn how to secure business data for UK SMEs with this step-by-step guide focused on…
Read MoreCybersecurity basics explained for UK businesses—core concepts, major threats, essential safeguards, and compliance requirements. A…
Read MoreDiscover the essential role of IT support desks, core functions, key benefits, types of support,…
Read MoreDiscover 10 microsoft 365 alternatives for UK SMEs, comparing features and benefits to help your…
Read MoreDiscover the best microsoft 365 alternatives in our comparison of 10 top products to enhance…
Read MoreDiscover a business connectivity checklist with 7 actionable steps to boost IT reliability, security, and…
Read MoreDiscover 7 essential business continuity planning steps to protect your SME. Learn practical strategies for…
Read MoreSmall Business Office 365 comprehensive guide for UK SMEs: core features, setup process, security essentials,…
Read MoreSmall Business Office 365 guide for UK firms. Learn core features, setup, security, costs, and…
Read MoreSmall business Office 365 guide covering essential features, security, costs, local support, and practical benefits…
Read MoreFollow this cybersecurity checklist for SMEs to secure your business in Lancashire and Manchester. Step-by-step…
Read MoreFollow this cybersecurity checklist for SMEs to boost protection, reduce risks, and secure business data…
Read MoreCloud security explained: A comprehensive guide for UK businesses covering threat types, protection strategies, compliance,…
Read MoreData protection strategies for UK SMEs—types, key components, GDPR compliance, business risks, and best practices…
Read MoreWhy cybersecurity matters for UK businesses: core concepts, main risks, common threats, legal requirements, and…
Read MoreComprehensive guide to IT issues Lancashire businesses face, including security threats, system downtime, cloud solutions,…
Read MoreComprehensive guide on cyber security threats in the UK. Learn common types, key characteristics, real-world…
Read MoreFollow this IT security checklist for a step-by-step process to secure your business effectively in…
Read MoreExplore the benefits of managed IT services for businesses in Manchester and Lancashire, enhancing efficiency…
Read MoreExplore the role of cybersecurity in business. Understand its importance, how it works, and key…
Read MoreDiscover 7 key advantages of Microsoft 365 for SMEs that can enhance productivity, collaboration, and…
Read MoreExplore why use managed IT services and how they benefit businesses. Gain comprehensive insights on…
Read MoreComprehensive guide explaining cyber threats, focusing on their importance, how they work, and the key…
Read MoreDiscover what is business continuity and why it matters for your business's resilience, sustainability, and…
Read MoreDiscover effective ways to secure business data through a step-by-step process, ensuring the safety and…
Read MoreDiscover 7 key advantages of Microsoft 365 that can enhance your business operations and productivity…
Read MoreExplore local IT services explained in detail, focusing on their importance and how they work…
Read MoreExplore cloud application hosting, its importance, how it operates, and the key concepts behind it…
Read MoreExplore why choose cloud solutions for your business. Discover how they work, their importance, and…
Read MoreExplore cyber security services for small business, their importance, and how they protect against online…
Read MoreFollow this IT support checklist for a systematic approach to IT maintenance. Ensure smooth operations…
Read More