Feeds

Facebook vote a 'massive con trick' says privacy advocate

Conspiracy theory? No-one saw that coming

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Facebook has deliberately changed the rules around its much-hyped "user vote" to ensure that it won't have to follow decisions made.

The company originally said that if 25 per cent of users voted in favour of a change in its terms and conditions it would consider that binding. But that percentage has now gone up to 30 per cent.

Simon Davies of lobby group Privacy International said: "the idea of establishing a thirty percent participation threshold is a complete joke. It will never be reached, and Facebook knows it. Earlier this year the figure had been set at 25 percent, and it was edged up because of concerns that users might actually succeed in changing the terms and conditions”.

Davies, who originally supported the move, said specifying active users as those who have used their accounts in the last 30 days made reaching the target even more difficult. Indeed Davies is so confident that he and other senior staff members have promised to eat their shorts if the threshold is ever reached.

The process was established because of the row that broke out when Facebook changed its T&Cs in February to grant itself licence to all users' content forever, even if they deleted their accounts. Chief exec Mark Zuckerberg was later forced to reinstate the old terms.

Facebook users who joined before 26 February and have logged into the site at least once in the 30 days previous to that are entitled to vote. Voting ends 23 April at midday PDT.

There's more info, and voting for members, here.

This reminds us of the 1979 referendum on Scottish independence, which was scuppered by an amendment requiring any vote in favour to equal at least 40 per cent of the registered electorate. In the event 51 per cent voted in favour. This was only 33 per cent of the total electorate so independence was rejected. ®

SANS - Survey on application security programs

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.