Data protection laws and privacy on Facebook

Background: Social networks have changed the way people communicate. Business processes and social interactions revolve more in the cyber space. However, as these cyber technologies advance, users become more exposed to privacy threats. Regulatory frameworks and legal instruments currently lacking a strong cyber presence are required, for the protection of users. Objectives: There is need to explore and evaluate the extent to which users are exposed to vulnerabilities and threats in the context of the existing protection laws and policies. Furthermore, to investigate how the existing legal instruments can be enhanced to better protect users. Method: This article evaluates and analyses these privacy challenges from a legalistic point of view. The study is focused on the South African Facebook users. Poll information gathered from the profile pages of users at North-West University was analysed. A short survey was also conducted to validate the poll results. Descriptive statistics, including measures of central tendency and measures of spread, have been used to present the data. In addition, a combination of tabulated and graphical description data was also summarised in a meaningful way. Results: The results clearly show that the legal frameworks and laws are still evolving and that they are not adequately drafted to deal with specific cyber violation of privacy. Conclusion: This highlights the need to review legal instruments on a regular basis with wider consultation with users in an endeavour to develop a robust and an enforceable legal framework. A proactive legal framework would be the ideal approach unfortunately; law is reactive to cyber-crimes.

[1]  R. V. Krejcie,et al.  Determining Sample Size for Research Activities , 1970 .

[2]  Richard Han,et al.  Solutions to Security and Privacy Issues in Mobile Social Networking , 2009, 2009 International Conference on Computational Science and Engineering.

[3]  Subhasish Dasgupta,et al.  Privacy on the Web: an Examination of User Concerns, Technology, and Implications for Business Organizations and Individuals , 2003, Inf. Syst. Manag..

[4]  H. Jeff Smith Information Privacy and its Management , 2004, MIS Q. Executive.

[5]  Terence Craig,et al.  Privacy and Big Data , 2011 .

[6]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[7]  Steve Mansfield-Devine,et al.  Social Networking: Anti-social networking: exploiting the trusting environment of Web 2.0 , 2008 .

[8]  Mary Beth Rosson,et al.  journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .

[9]  Richard A. Spinello,et al.  Cyberethics: Morality and Law in Cyberspace , 2001 .

[10]  John Warren,et al.  Self-Imposed Violations of Privacy in Virtual Communities , 2008 .

[11]  Bernd Carsten Stahl,et al.  What privacy? The impact of the UK Human Rights Act 1998 on privacy protection in the workplace. , 2007 .

[12]  Norjihan Abdul Ghani,et al.  Personal information and privacy in E-commerce application , 2008 .

[13]  S. E. Kruck,et al.  Protecting personal privacy on the Internet , 2002, Inf. Manag. Comput. Secur..

[14]  A. Mishra Web Privacy: Issues, Legislations, and Technological Challenges , 2008 .