{"id":2589,"date":"2022-09-09T17:07:33","date_gmt":"2022-09-09T12:07:33","guid":{"rendered":"https:\/\/testing.dicecamp.com\/insights\/?p=2589"},"modified":"2022-09-09T17:14:05","modified_gmt":"2022-09-09T12:14:05","slug":"instagram-found-guilty-of-leaking-childrens-data","status":"publish","type":"post","link":"https:\/\/testing.dicecamp.com\/insights\/instagram-found-guilty-of-leaking-childrens-data\/","title":{"rendered":"Instagram found guilty of leaking children\u2019s data"},"content":{"rendered":"\n<p>It\u2019s 2nd September 2022, the decision of an inquiry against Instagram\u2019s loose handling of children data finally arrives two years after it started in 2020.&nbsp;<\/p>\n\n\n\n<p>The European Union\u2019s data regulators including the Irish Data Protection Commission (DPC) indicted Instagram for going against EU\u2019s General Data Protection Regulations (GDPR) for children&#8217;s online safety.&nbsp;<\/p>\n\n\n\n<p>The charge amount was not disclosed until it reached Instagram in a news leak, and turned out to be the highest received to date, about $402m.<\/p>\n\n\n\n<p>The media agency, <a href=\"https:\/\/techcrunch.com\/2022\/09\/05\/instagram-gdpr-fine-childrens-privacy\/\">TechCrunch,<\/a> reached out to the DPC to confirm the fine amount, finding out that it was correct.&nbsp;<\/p>\n\n\n\n<p>&#8220;We adopted our final decision last Friday and it does contain a fine of \u20ac405m [\u00a3349m],&#8221; quoted Ireland&#8217;s Data Protection Commissioner (DPC).<\/p>\n\n\n\n<p>On the other hand, Instagram owner Meta, in a response to the conviction, contested the court&#8217;s decision saying:<\/p>\n\n\n\n<p>&nbsp;&#8220;This inquiry focused on old settings that we updated over a year ago and we&#8217;ve since released many new features to help keep teens safe and their information private\u201d.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">What does data leak mean on Instagram?<\/h1>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full td-caption-align-center\" id=\"image\" style=\"max-width:500px\"><img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"530\" src=\"https:\/\/testing.dicecamp.com\/insights\/wp-content\/uploads\/2022\/09\/Screenshot-41.png\" alt=\"how Instagram leaks data, anonymity data\" class=\"wp-image-2592\" srcset=\"https:\/\/testing.dicecamp.com\/insights\/wp-content\/uploads\/2022\/09\/Screenshot-41.png 671w, https:\/\/testing.dicecamp.com\/insights\/wp-content\/uploads\/2022\/09\/Screenshot-41-300x237.png 300w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><figcaption><em>A screen shot demonstrates how teenager\u2019s personal information gets displayed within the \u2018Email\u2019 feature\/ Image by <\/em><a href=\"https:\/\/davidjstier.medium.com\/instagram-shows-kids-phone-num-in-plain-sight-d03c8ab9d168\"><em>David J. Stier<\/em><\/a><\/figcaption><\/figure>\n<\/div>\n\n\n<p>A data leak on Instagram exposes the user&#8217;s personal information; such as phone number and email address, in two ways.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Hackers scrape your data from social media<\/strong><\/li><\/ol>\n\n\n\n<p>If the user&#8217;s private information is embedded within the <strong>HTML code<\/strong> of the social media website or mobile application, a hacker can easily set up to steal info by scraping. Scrapping is the collection of large data from an application for reuse.<\/p>\n\n\n\n<p>Surprisingly, in 2019, Instagram had been making such HTML code in its mobile application for four months, until a data scientist <a href=\"https:\/\/www.cnet.com\/news\/privacy\/instagram-website-leaked-phone-numbers-and-emails-for-months-researcher-says\/\" target=\"_blank\" rel=\"noreferrer noopener\">David J. Stier<\/a> exposed it.&nbsp;<\/p>\n\n\n\n<p>There\u2019s a possibility, if a hacker knew this vulnerability, they would have actively scraped personal information from Instagram further selling it to marketing companies.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cnet.com\/news\/privacy\/instagram-website-leaked-phone-numbers-and-emails-for-months-researcher-says\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Read the Instagram\u2019s scrape story here!<\/em><\/a><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>You encounter lengthy and difficult to understand security policies<\/strong>.<\/li><\/ol>\n\n\n\n<p>The second way of a data breach is in the form of making vague security policies.&nbsp;<\/p>\n\n\n\n<p>Users who are less aware of their privacy rights, or those who don\u2019t understand how the cybersecurity system works; such as children, would remain unaware of the policies.&nbsp;<\/p>\n\n\n\n<p>For the case of Instagram, the second data leak scenario was discovered in the same year by the same data scientist, when in a response to his earlier <a href=\"https:\/\/davidjstier.medium.com\/instagram-shows-kids-phone-num-in-plain-sight-d03c8ab9d168\" target=\"_blank\" rel=\"noreferrer noopener\">email<\/a> on data breach, Instagram mentioned that children\u2019s business accounts were already showing personal phone numbers and emails.<\/p>\n\n\n\n<p>Within this scenario, when the audience went on to \u2018contact information\u2019 on a child\u2019s business account, the personal contact details were clearly displayed instead of <strong>anonymized data <\/strong>(<a href=\"#image\">see attached graphic<\/a> for demonstration).&nbsp;<\/p>\n\n\n\n<p>While secure apps always apply a \u2018data anonymization\u2019 method for business communication, Instagram didn\u2019t just think of using this privacy method.&nbsp;<\/p>\n\n\n\n<p>An application of anonymized contact is in the <strong>Careem Car booking app<\/strong> where there\u2019s a safe option of keeping your contact information hidden from drivers by using the \u2018Call Anonymously\u2019 option.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted has-white-background-color has-background\">\"This was a major breach that had significant safeguarding implications and the potential to cause real harm to children using Instagram,\"\nquotes Andy Burrows, head for making children-safety-online policies at the National Society for the Prevention of Cruelty to Children (NSPCC).&nbsp;<\/pre>\n\n\n\n<p><em>The Cybersecurity landscape has seen massive vulnerabilities by tech giants in the past years, but fortunately cybersecurity heroes (aka white hackers) always came to the rescue.&nbsp;<\/em><\/p>\n\n\n\n<p><em>Learn about one such hero who\u2019s a <\/em><a href=\"https:\/\/testing.dicecamp.com\/insights\/ispr-awards-cyber-security-researcher-rafeh-baloch\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Pakistani ethical hacker<\/em><\/a><em>: Rafay Baloch. The cybersecurity expert used penetration testing and found a nasty bug in Chrome back in 2014.<\/em><\/p>\n\n\n\n<p><em>Learn ethical hacking with Dice Analytics\u2019 affordable, 8 weeks training program.&nbsp;<\/em><br><em>We empower the digital economy of Pakistan by offering affordable tech education for the youth. Find details on our course offering <\/em><a href=\"https:\/\/diceanalytics.pk\/school\/courses-and-workshops\/cybersecurity-and-ethical-hacking\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>here<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instagram breaches EU&#8217;s strict guidelines of &#8216;privacy by design&#8217; for children.<br \/>\nAs a result, it exposed minor&#8217;s personal contact when placing orders at their business accounts.<\/p>\n","protected":false},"author":7,"featured_media":2593,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[105,73,106],"class_list":{"0":"post-2589","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"tag-cyber-security","9":"tag-news","10":"tag-social-media-data-leak"},"_links":{"self":[{"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/2589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/comments?post=2589"}],"version-history":[{"count":8,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/2589\/revisions"}],"predecessor-version":[{"id":2601,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/2589\/revisions\/2601"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/media\/2593"}],"wp:attachment":[{"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/media?parent=2589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/categories?post=2589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/tags?post=2589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}