We evaluate the privacy parameters of social networks. Assessing the privacy settings of social networks Your access settings


29.08.2012

Which social network is the easiest to set privacy settings on? And where do they provide the most flexibility? We studied the privacy settings on Facebook, Google+, Twitter, as well as VKontakte and Odnoklassniki.

Nick Mediati. Social Network Privacy Settings Compared. PC World, September 2012, p. 37.

There is no doubt that protecting online privacy is very important. Most users are smart enough not to trust their personal information to any site that requests it. But, unfortunately, the same people, when filling out their Facebook account form, indicate absolutely everything there, from their date of birth to their place of work and residence. But by posting such information on a social network, you expose it not only to advertisers, but also to anyone who wants to see your profile.

However, Facebook, Google+ and Twitter have settings that allow you to determine which parts of your data can be viewed by others. True, setting them up may not be so simple, and not all social networks provide users with full control over confidential information. Let us briefly list what each of the three listed sites allows you to do.

Facebook

Facebook's privacy options provide flexibility that is amazing. The settings are divided into five categories, and each of them is located on a separate screen. You can limit the list of people who are allowed to view your profile, limit the availability of this information through search, prevent people from tagging you in photos, preventing your posts from being flagged, and so on.

To simplify settings, the developers offer two predefined templates: “Available to everyone” - opens your information to all Facebook visitors; “Friends” - allows only those who are included in your circle of friends to view your publications. Additionally, Facebook provides a User Settings option. Here you can limit visibility to the networks you connect to or people from selected lists (so friends are grouped together with work colleagues or family members, for example). In addition, you can prevent certain people from viewing your messages.

The main advantage of Facebook when setting up privacy is also the main weakness of this social network. Its high level of flexibility means you have the means to truly fine-tune your settings, but understanding what's behind those parameters can be difficult. This is not helped by the frequent changes by developers to privacy settings, which means you have to learn them again and periodically return to the settings.

Google+

The downside to Google+ is that anyone can add you to their circles without asking permission, and there's no way to explicitly set who is banned from viewing your profile. However, Google+ allows you to exclude your profile from search results. Going to the privacy settings here is very simple: they are all available in your profile, and you don’t have to wade through many panels and menus.

Twitter

Privacy settings on Twitter are not very complicated, and this social network itself is conceptually much simpler than Facebook and Google+.

Profiles can be private or public. To make your profile private, log into your Twitter account, click the Settings icon in the top right corner of the screen, and select Settings from the menu. On the Account screen, enable the Hide My Tweets option and save your changes. When an account is private, only those who are explicitly allowed to see your tweets will be seen. In this case, no one is allowed to retransmit them. However, your name, bio, and Twitter ID are always visible.

When registering, Twitter asks for a valid email address, but other users don't see it. Additionally, the search by email feature is disabled if you turn off the “Find me by email” feature on the Account page.

If you want your profile to be public, but don't want to reveal your real name, you can change it to something else (however, you should not use the name of a real person, as this will be considered identity theft and intentional impersonation face).

"In contact with"

The creation of Pavel Durov does not lag behind its older brother Facebook. A flexible system of rules for accessing page data is located in the “Privacy” tab of the “My Settings” section of the “VKontakte” profile. The user can select who can see or comment on the content (audio recordings, notes) on his page from the following categories: all users; only friends; friends and friends of friends; nobody; all except (specify exceptions); some friends (specify); some friends lists (specify).

The social network implements a personal approach to indexing pages in search engines, as well as to viewing accounts by Internet users. To do this, in the already mentioned “My Settings” tab there is an item “Who can see my page on the Internet”, in which you can specify the following categories: only to VKontakte users; everyone; everyone except search sites.

If the user is not interested in showing all the changes on his page, he can choose “What updates do my friends see in the news.”

It is also worth noting that each account owner can evaluate the privacy settings of their page using the “See how other users see your page” function.

"Classmates"

The range of opportunities provided to users by the administration of the Odnoklassniki network is significantly inferior to those provided by VKontakte. This also determines the limitations of the publicity settings system. Odnoklassniki does not have a particularly user-friendly interface, and the terms used in this project also leave much to be desired.

As for privacy, publicity settings are available in a special section of the same name. The user is able to show his age, his other half, games and applications, etc. to everyone in general, only to friends or only to yourself; allow comments on your photos, invitations to groups, etc. to everyone in general, only to friends or only to yourself.

The account owner can exclude his profile from the “Now on the site” list, as well as prevent the page from being indexed in search engines.

Russian users, as a rule, are registered in four social networks - Facebook and Twitter, which have already become Russian-language, as well as Odnoklassniki and VKontakte. The privacy settings on each of the portals fully satisfy the requirements of the target audience that gathers on it. The publicity settings systems in the original Russian Odnoklassniki and VKontakte are quite trivial. Slightly more complex are the privacy rules in Mark Zuckerberg's creation. This fact is offset by Facebook’s passion for more advanced users.

The safety of working on social networks is the subject of much controversy and discussion. Despite the huge amount of information about various methods of deception on the Internet, users continue to get caught doing the simplest things. Fake (hacked) accounts and malicious links continue to generate income for cybercriminals. The system of privacy settings can protect, perhaps, only from persecution on the social network and beyond. Otherwise, in their technologies, attackers rely on users to independently carry out the actions suggested to them.

Thus, the solution to the problem can only be the education of “Internet vigilance” in Russian users, sometimes significantly exceeding that which we follow in the real world.

Alexey Kishchenko,

PR and Marketing Specialist at Entensys PR and Marketing Department

On the black market, everything related to the accounts of social network users has a monetary equivalent: personal data is a sought-after commodity, and among the services offered, hacking the accounts of social network users and sending spam to their contacts is very popular. Commercialization contributes to the growing interest of the modern computer underground in social networks and leads to an increase in the number of malicious programs aimed at users of social networks.

It was not by chance that attackers chose social networks as a medium for spreading malware. The reasons for this are their popularity and the high level of trust of users in each other. “Users” willingly follow links that supposedly came from friends, sometimes without even reading the text of the message, and if they do read it, they also often fall into the trap of criminals - social engineering techniques are becoming more and more sophisticated. As a result, according to our estimates, malware is spread through social networks 10 times more efficiently than through email.

Security approaches vary somewhat across networks. For example, Facebook fights the spread of malware and spam not only with technical means, but also actively cooperates with law enforcement agencies to find attackers.

Domestic networks rely more on technology in matters of protection - they introduce advanced privacy settings, authentication using a mobile phone, filter spam and warn when a user tries to follow an external link. However, with this approach, attackers feel impunity.

Yuri Namestnikov ,

antivirus expert at Kaspersky Lab

Each network has its own rules and policies. Any user, creating a profile on the network, automatically agrees to the rules and resource. Sometimes without knowing them at all. Lack of knowledge about your rights, as well as about the rules of a particular service, can cause both small problems and huge misunderstandings. In this post we will touch on the topic VKontakte privacy policy. We'll tell you what it is and what to do to prevent private information from being publicly viewable.

All the basic rules of VK can be found in the resource itself. They are located directly below the menu icons. You will see small link words in pale gray. By touching the “more” button, the “rules” subsection will appear in front of you. This is where you can find important information about your privacy. Already in the first section, VK offers a link to a separate article. Here we briefly present the main provisions that relate to the rights of users and the protection of their data.

  1. The first thing that is important to know when creating a profile on VK is that admins are not responsible for the fact that your pictures, personal posts, tracks uploaded to VK will be used by other users who are online. In other words, if you come across a fake page with your photos, you will need to deal with the owner of the fake account yourself. The same applies to photos or tracks that, without your knowledge, were posted in any created groups. All this is written in section 6. Clause 6.3.3 on the pages about rights in VK.
  2. VK has access to all your data, hidden even from friends who are on the resource. Including your profile password. This is done so that if you are frozen or forget your data, the service will help you quickly restore it. Also, VK openly talks about this in the rules. And he promises not to share this data with anyone.
  3. You can set privacy on the resource and show your data only to certain For example. Or your subscribers and friends. Also, the VK policy allows you to make settings so that no one can add you as a friend. And so that only you can see your page.

These are the main provisions that relate to your rights on the resource. If you are keenly interested in any question. You didn't find it in the rules, maybe you should write it in

New privacy policy for VKontakte

The rules described above have been in effect for a long time. Therefore, there is no new VKontakte privacy policy. Starting from the creation of the resource, this policy exists to this day. It is worth noting that VK uses some of your data for analytics and expanding functionality. These include: history of reposts and views, what you write in discussions in communities and what groups you join.

Firstly, the service needs this so that you can find tips and topics related to your interest. Secondly, there are a lot of services for advertising, promoting your group, “pulling” leads from VK - something that is used by companies and people who work in the field of SMM or run their own business. Naturally, this information about you is not collected as compromising evidence, but in order to more accurately recommend a product or a specific service to you.

VKontakte Privacy Policy 2017

VKontakte Privacy Policy 2017 remained similar compared to last year. To protect yourself from dishonest people using your data, do not post too personal pictures on VK. If you add an article from another source, link to it so that there are no claims of plagiarism against you. Make settings so that only close friends can view your page. At least 3 times a month.

By using Google services, you trust us with your personal information. We do everything to ensure its security and at the same time give you the opportunity to manage your data.

Please review our Privacy Policy carefully to understand what information we collect, for what purposes we use it, and how you can change, export, or delete it.

We offer many services that help millions of people every day learn something new, solve various problems and simply communicate with each other. Here are just a few examples of our products:

  • apps, sites and devices such as Google Search, YouTube and Google Home;
  • platforms such as the Chrome browser and the Android operating system;
  • solutions that can be embedded in applications from other developers and on third-party sites, such as advertising services, built-in Google Maps, etc.

Our services allow you to post personal information and content and manage it in a variety of ways to ensure your privacy. By creating a Google Account, you can chat with friends or colleagues in Gmail or post photos in Google Photos, and Google search results will be more relevant to your queries. At the same time, you can use many services without logging in or even creating an account, such as searching the Internet and watching videos on YouTube. In addition, in Chrome you can visit web pages anonymously - in incognito mode. In all our services, you specify what information about you we can collect and how to use it.

To make our rules as clear as possible, we've included examples, videos, and definitions of key terms. If you have any questions about Google's Privacy Policy, please contact us.

What data do we collect?

Types of information

Google collects user data to improve your experience of our services. Thanks to this, we not only determine in which language you asked the request, but also solve more complex problems, for example, automatically select useful advertisements or interesting videos on YouTube, and also help you find contacts of friends and acquaintances on the Internet. The type of information we collect depends on how you use our products and your privacy settings in your account.

Unless you are signed in to a Google Account, we log information we collect using unique identifiers associated with browsers, applications, and devices. This allows us to remember your settings and other information so that you do not have to enter them again the next time you log in.

If you are signed in, we collect and store information in your Google Account that we treat as personal data.

Content you create or provide to us

When you create a Google Account, you provide us with personal information, including your username and password. You can also provide a phone number or payment information. Even if you are not logged in, you can optionally provide us with some information about yourself, such as your email address, in order to receive news about our services.

We also collect content that you create, upload, or receive from other users when using our products. This includes letters, photographs and videos that you save, documents and tables that you author, your comments on YouTube videos, etc.

Information we collect when you use our services

Apps, browsers and devices

We record information about the applications, browsers and devices you use to access Google services. This enables features such as automatic app updates and screen dimming when the battery is low.

Among other things, we collect unique identifiers, as well as information such as browser and device type and settings, operating system, mobile network (including operator name and phone number) and application version number. We also record information about the interaction of your applications, browsers and devices with our services, including IP address, crash reports, information about system activities, the date and time you visited our resource, and the URL from which you came to it was followed (referral URL).

We receive this data when a Google product accesses our servers from your device, for example when installing an application from the Play Store or checking for updates. Android devices running Google Apps periodically contact Google servers and report their status and connection to our services. This data includes, but is not limited to, device type, mobile operator name, crash reports, and list of installed applications.

Your actions

We collect information about what actions you perform on Google services. This enables various useful features, such as selecting recommended videos on YouTube. Such information includes:

  • Queries you searched for
  • Videos you are watching
  • Audio information transmitted when using voice control functions
  • Purchases
  • Users with whom you communicate or share content
  • Your activities on third-party sites and third-party applications that use Google services
  • Chrome browsing history synced with your Google Account

Why Google collects data

User data allows us to make our services more convenient

Using the data we receive, we can maintain and improve existing services, create new ones, and ensure the security of Google and our users.

User data powers features in Google services

We use users' personal information in the operation of our services. For example, it helps us process your search queries or suggest recipients to whom you want to share content.

User data allows you to maintain and optimize Google services

User information is also necessary to ensure the stable operation of services (for example, it helps to track failures) and to optimize them. In particular, we can determine which search queries are most likely to be misspelled. This allows us to improve the spell checking function.

User data helps develop new services

Thanks to the information collected, we can create new applications. For example, when we studied how users organize photos in Picasa (Google's first photo collection management app), we were able to develop Google Photos.

User data ensures personalization of services, including selection of content and advertising

We use the data we collect to tailor our services to meet user needs and provide personalized recommendations, tailored content and search results. For example, recommendations on the site are related to the Google solutions you use. And based on the applications you have installed and the videos you have watched on YouTube, we offer you applications on Google Play that may interest you.

Unless you have disabled this feature in your account settings, we may also show you tailored advertisements based on your interests. Let's say you search for "mountain bike." After visiting a site with Google advertising, you may see advertisements for sports equipment. So that we know which offers should be shown to you, set up your advertising preferences.

  • We do not show users personalized advertising related to sensitive categories such as race, religion, sexual orientation or health conditions.
  • Google does not share your personal information, such as your name and email address, with advertisers unless you ask us to do so. For example, if you find a flower shop nearby and press the call button, we will connect you to that shop. In this case, your phone number may be transferred to the store.

User data helps measure performance

We use your personal information to track how users interact with our services. Thus, we analyze the statistics of visits to our sites in order to optimize their internal structure. In turn, advertisers can measure the effectiveness of their campaigns based on information about which ads you click on. To do this, we have developed a number of tools, such as Google Analytics. When you visit a site connected to this service, Google and the Google Analytics client receive information about your activities that can be easily correlated with similar information from other sites where our ads are displayed.

User data is needed to keep in touch with you.

We use personal information, such as your email address, to communicate with you. For example, we may send alerts about suspicious login attempts from new devices and changes to our products. And when you contact Google, your messages are saved so we can resolve the issue faster.

User data protects the security of Google, users and others

The information we collect is critical to ensuring the security and reliability of our services. With it in place, we can identify and block threats early to prevent attackers from harming Google, our users, and the public interest.

To perform these tasks we use different data processing technologies. Our automated systems analyze your content and tailor ads, search results, and other features to you based on how you use Google products. In addition, this allows you to promptly stop the spread of spam, malware and illegal content, as well as prevent other illegal activities. We also use algorithms to find patterns in data. For example, Google Translate detects what phrases users type most often to offer more accurate translations.

To achieve the goals described above, we combine data that comes to us from various services and from the devices you use. For example, if you watch videos of guitarists performing on YouTube, you may subsequently see advertisements for guitar lessons on the website where our ads are posted. Unless you have turned this feature off in your settings, we may associate your activities across websites and apps with your personal data to improve the performance of Google services and show you relevant advertising.

If your email address or other identifying information is already known to other users, we may share with them your publicly available Google Account information, including your name and photo. Thanks to this, for example, it will be easier for them to determine which letters they receive from you.

If we require your data to perform activities not covered in the current Privacy Policy, we will always ask for your prior consent to use it.

Your access settings

You can control how Google collects and uses your data

Viewing and changing personal information

You can manage your personal data stored by Google. To do this, you need to log into your account and go to the desired service. For example, you can view your content in Google Photos or Google Drive at any time and make changes to it.

How to view and change your data

My actions

In the My Activity section of your account settings, you can manage the data that is generated when you use Google services, such as information about your searches or visits to the Google Play site. You can search by date and subject and remove all or part of such data.

Even if you are not signed in to your Google Account, you have the ability to manage information associated with your browser and device, such as the following:

  • Personalized search results. , whether your search history should be taken into account when selecting search results and recommendations.
  • YouTube settings. You can delete your history and YouTube, or temporarily stop tracking your activities on this service.
  • Advertising preferences settings. You have the opportunity to determine which ads will be shown to you on Google resources, as well as on other sites and applications of our partners.

Exporting and deleting your information

You can export your Google Account information if you need a copy of it or plan to use this data in a third-party service.

Even if you are not signed in, you still have some control over what information we collect about you. These include the following:

  • Browser settings. For example, you can set a notification to appear when Google stores a cookie, or prevent cookies from being stored from certain or all domains. However, please be aware that cookies are necessary for our services to function correctly, for example so that you do not have to specify your language and other settings each time.
  • Device level settings. Your computer, smartphone or tablet may have its own data collection settings. For example, Android devices allow you to specify how your location information should be processed.

Transfer of your information

When you submit your own information

Many of our services allow you to transfer your information to other users and control this process. For example, you can make your videos on YouTube available to every viewer or prohibit everyone except you from viewing them. It is important to remember that all publicly available materials may be crawled and indexed by search engines, including Google.

If you use Google services while signed in to your account, such as adding comments to a YouTube video or leaving a review for an app on Google Play, your name and photo will appear next to the information you post. In addition, such information may be presented in advertising unless you have disabled this in your Friend Recommendations settings.

When Google shares your information

We do not disclose users' personal information to companies, organizations or individuals not affiliated with Google. The exceptions are the situations listed below.

The user gave his consent to this.

Your personal information may be shared with entities or individuals not affiliated with Google if you consent to this. For example, if you use Google Home to contact a reservation service, we will provide that service with your name or phone number only with your permission. In addition, personal sensitive information will not be shared with anyone without your explicit consent.

The domain administrator has given his consent.

If you study or work at an institution that uses Google services, such as G Suite, your Google account will be accessible by the domain administrator and resellers authorized to manage it. These individuals will be able to do the following:

  • View and save account information, such as your email address;
  • view account statistics, including the number of installed applications;
  • change account password;
  • suspend or block access to your account;
  • obtain account information in accordance with legal requirements, a court order or a request from government agencies;
  • limit your rights to change or delete information or manage your privacy.

For processing by third parties on behalf of Google.

We may provide personal information to Google affiliates and other trusted companies and individuals for processing on Google's behalf. Such processing is subject to our instructions, privacy policy and other applicable privacy and security requirements. In particular, third party companies may provide user support.

As required by law.

We may provide your personal information to entities and individuals not affiliated with Google if we have a good faith belief that those entities have the right to receive, use, retain or disclose the information on the following basis:

  • They enforce legal requirements, implement a court order, or enforce a request from a government agency (we publish information about the number and types of such requests in the Service and Data Availability Report).
  • They enforce the Terms of Use or investigate possible violations of them.
  • They detect, stop, or otherwise seek to prevent fraud, and work to resolve technical or security issues.
  • They protect the rights, property or safety of Google, our users or the public as required by law and as authorized by law.

We may share non-personally identifiable information with all users and our partners, such as publishers, advertisers, developers and rights holders. For example, we provide this information so that users can study trends in the use of our services. We also allow select partners to collect information from your browser or device through their own cookies and other technologies and use it to serve ads and measure their effectiveness.

If Google is involved in a merger, acquisition, or asset sale, we will continue to maintain the confidentiality of all personal information. We will also notify all affected users in the event that their personal information is transferred to another organization or is subject to a different privacy policy.

Protecting your information

To protect your information, our services provide special means

All Google services implement reliable security features to ensure the safety of your data. When we operate our services, we receive information that allows us to detect and automatically fix a wide variety of security issues. If necessary, we will inform you about certain problems and tell you how to avoid them.

We are committed to protecting Google and our users from unauthorized attempts to access, modify, disclose or destroy the data we hold. Among other things, we take the following measures:

  • We use encryption to ensure the confidentiality of data during transmission;
  • We use special account protection tools, such as Security Check and;
  • We continually improve the way we collect, store and process data, including physical security measures, to prevent unauthorized access to our systems;
  • We limit our employees, contractors and agents' access to personal information and subject them to strict contractual obligations, the violation of which may result in sanctions or termination.
  • legislative norms

This personal information privacy policy (hereinafter referred to as the Policy) applies to all information that the legal entity Eda+ and/or its affiliates may receive about the user while using the site https://site/. The Privacy Policy is an integral part of the User Agreement.

Using the site https://site/ means the user’s unconditional consent to this Policy and the conditions for processing his personal information specified therein; in case of disagreement with these conditions, the user must refrain from using this resource.

1. Personal information of users that is received and processed by the site https://site/

1.1. For the purposes of this Policy, “user personal information” means:

1.1.1. Personal information that the user provides about himself when viewing the site, posting a comment, or otherwise using the site.

1.1.2 Data that is automatically transmitted by the site https://site/ during its use using software installed on the user’s device, including IP address, information from cookies, information about the user’s browser (or other program, using which the site is accessed), access time, address of the requested page.

1.1.3. Data that is provided to the site for the purpose of viewing content or other values ​​for site visitors, in accordance with the activities of this resource:

  • Email;
  • location;
  • link to a personal website or social network;
  • ip address.

1.2. This Policy applies only to the site https://site/ and does not control and is not responsible for third party sites that the user can access through links available on the site https://site/. On such sites, other personal information may be collected or requested from the user, and other actions may be taken.

1.3. The site generally does not verify the accuracy of personal information provided by users and does not exercise control over their legal capacity. However, the site https://site/ assumes that the user provides reliable and sufficient personal information on the issues proposed in the forms of this resource and keeps this information up to date.

2. Purposes of collecting and processing personal information of users

2.1. The site collects and stores only those personal data that are necessary to communicate with the users who left them, as well as to provide other values ​​for visitors to the site https://site/.

2.2. The user's personal information may be used for the following purposes:

2.2.1. Communication with the user, including sending notifications, requests and information regarding the use of the site, provision of services, as well as processing requests and applications from the user.

2.2.2. Improving the quality of the site, ease of use, developing new products and services

3. Conditions for processing the user’s personal information and its transfer to third parties

3.1. The website https://site/ stores personal information of users in accordance with the internal regulations of specific services.

3.2. Confidentiality of the user's personal information is maintained, except in cases where the user voluntarily provides information about himself for general access to an unlimited number of persons.

3.3. The site https://site/ has the right to transfer the user’s personal information to third parties in the following cases:

3.3.1. The user expressed his consent to such actions by agreeing to provide such data;

3.3.2. The transfer is necessary as part of the user’s use of a specific website https://site/, subscription to the newsletter, or to provide goods and/or services to the user;

3.3.3. The transfer is provided for by Russian or other applicable legislation within the framework of the procedure established by law;

3.3.4. In order to ensure the possibility of protecting the rights and legitimate interests of the site https://edaplus..

3.4. When processing personal data of users, the site https://site/ is guided by the Federal Law of the Russian Federation “On Personal Data”.

4. User's change of personal information

4.1. The user can at any time change (update, supplement) the personal information provided by him or part of it, as well as its confidentiality parameters, by leaving a statement to the site administration in the following way:

  • Email: admin@site

4.2. The user may at any time withdraw his consent to the processing of personal data by leaving a statement to the site administration in the following way:

  • Email: admin@site

5. Measures taken to protect users’ personal information

The site takes necessary and sufficient organizational and technical measures to protect the user’s personal information from unauthorized or accidental access, destruction, modification, blocking, copying, distribution, as well as from other unlawful actions by third parties.

6. Changes to the Privacy Policy. Applicable Law

6.1. The site has the right to make changes to this Privacy Policy. When changes are made to the current edition, the date of the last update is indicated. The new edition of the Policy comes into force from the moment it is posted, unless otherwise provided by the new edition of the Policy..html

6.2. This Policy and the relationship between the user and the Site arising in connection with the application of the Privacy Policy are subject to the law of the Russian Federation.

7. Feedback. Questions and suggestions

All suggestions or questions regarding this Policy should be sent in the following way:

  • Email: admin@site

The very concept of a privacy policy probably appeared with the advent of the first website that required registration. Obviously, VKontakte, which is the most popular, rapidly developing and visited social network in the Russian segment of the Internet, must take a thorough approach to the issue of privacy. This is exactly what we will be talking about in today’s publication. Get acquainted with VKontakte privacy policy Anyone can do it, even an unregistered user. Of course, you need to carefully study all the VKontakte rules regarding the processing of your data by the network, the terms of use of VK and other similar issues. Many, if not the vast majority of new Vkontakte users simply ignore this recommendation. It’s in vain, because in the process of further use, unpleasant situations may arise, including blocking your VKontakte account for non-compliance with network rules. Knowing the basics of privacy policy will help you minimize risks and.

In order to familiarize yourself with the VK rules, you must find the corresponding link, which is located on the main page at the very bottom (see top screenshot) or type in the address bar of your browser the URL that you see in the figure above. Click on this link to carefully study the rules for using VK. You will see that all the rules are divided into 9 sections, in which all the nuances, rights and responsibilities of users, the capabilities of the administration and all the provided sanctions that may follow due to failure to comply with any of these points are described as informatively as possible.

On the VKontakte “code” page, almost at the very beginning of the document, you will see a link, by clicking on which you can read about the rules for protecting information about VKontakte users (see the picture below). These rules are nothing more than new privacy policy for VKontakte. Or rather, the basis of this policy has been laid for a very long time; only some legal aspects can change. One of the most important points that you must understand is that the VK administration is not responsible for what users publish on their own pages.

It is worth saying that you have the opportunity to configure the privacy of your page at your discretion, for example, music or any other type of content on your page from certain categories of users. At the same time, you need to understand that the administration of the social network still has access to all your materials published in your profile. She even knows your registration information. The administrators themselves talk about this openly. They need all your data to help you restore access to your page if it is lost. Now, as for your posts, photos, documents, subscriptions, reposts, etc. Regarding reposts, you have the opportunity to order the required number of reposts. They help VKontakte collect more information about you and your hobbies in order to recommend relevant content to you in the future.

It's unlikely that VKontakte privacy policy in 2017 will be something radically different from the same policies of previous years. Despite this, if you have any doubts, you can always visit the information protection rules page to once again study all the points, of which there are nine (see the figure below).

For all VKontakte users, the sixth section of the rules will be most interesting. It spells out all their rights and obligations, the fulfillment of which is mandatory. If you think that your rights were violated at any time by the administration, other users, or your subscribers, then you can contact the network support service at any time for qualified help or competent advice, referring to one or another clause of the privacy policy. If you are wrong, they will definitely explain it to you. And it doesn’t matter how many friends and subscribers you have, the number of which you can always replenish socprka.ru.







2024 gtavrl.ru.