9.2 Navigating Privacy and Confidentiality Issues on Social Media
6 min read•august 15, 2024
Social media platforms collect vast amounts of user data, creating privacy concerns for journalists and sources. Information shared online can be easily spread beyond its intended audience, potentially exposing sensitive details or compromising confidentiality.
Journalists must navigate these risks carefully, obtaining and protecting source identities. Using secure communication channels, being transparent about intentions, and following ethical guidelines are crucial for maintaining trust and safeguarding information in the digital age.
Privacy and Confidentiality Concerns
Data Collection and Potential Breaches
Top images from around the web for Data Collection and Potential Breaches
After Massive Data Breach, Equifax Directed Customers To Fake Site - Creative Commons Bilder View original
Is this image relevant?
Facebook prepares for an FTC fine and bans personality quizzes over data scandal : Peoples Dispatch View original
Is this image relevant?
Cambridge Analytica access to Facebook messages a privacy violation - EDRi View original
Is this image relevant?
After Massive Data Breach, Equifax Directed Customers To Fake Site - Creative Commons Bilder View original
Is this image relevant?
Facebook prepares for an FTC fine and bans personality quizzes over data scandal : Peoples Dispatch View original
Is this image relevant?
1 of 3
Top images from around the web for Data Collection and Potential Breaches
After Massive Data Breach, Equifax Directed Customers To Fake Site - Creative Commons Bilder View original
Is this image relevant?
Facebook prepares for an FTC fine and bans personality quizzes over data scandal : Peoples Dispatch View original
Is this image relevant?
Cambridge Analytica access to Facebook messages a privacy violation - EDRi View original
Is this image relevant?
After Massive Data Breach, Equifax Directed Customers To Fake Site - Creative Commons Bilder View original
Is this image relevant?
Facebook prepares for an FTC fine and bans personality quizzes over data scandal : Peoples Dispatch View original
Is this image relevant?
1 of 3
Social media platforms collect vast amounts of user data, including personal information, location data, and browsing habits, which can be accessed by third parties or leaked in data breaches
Platforms like Facebook and Twitter track user activity, interests, and relationships to create detailed profiles for targeted advertising ()
Data breaches can expose sensitive user information to hackers or malicious actors (Equifax affecting 147 million users)
Journalists must be aware that information shared on social media, even in private or closed groups, can be screenshotted, shared, or made public without the original poster's consent
Private Facebook groups or Instagram stories can be easily screenshotted and shared beyond the intended audience
Closed Twitter accounts can still have tweets shared by approved followers
Risks to Sources and Digital Trails
Sources may not fully understand the public nature of social media or the potential consequences of sharing sensitive information online, putting them at risk of exposure or retaliation
Whistleblowers or individuals in vulnerable positions may face professional or personal repercussions if their identities are revealed (Reality Winner NSA leak case)
Sources from marginalized communities or oppressive regimes may face severe consequences for speaking out on social media (Arab Spring activists targeted by governments)
Engaging with sources or sharing information on social media can create digital trails that may compromise the privacy and confidentiality of both the journalist and their sources
Direct messages, comments, or likes can be used to establish connections between journalists and sources, potentially exposing confidential relationships
Metadata from social media interactions, such as timestamps or location tags, can reveal sensitive details about a journalist's activities or sources (EXIF data in photos revealing location of a protected source)
Ethical Guidelines for Social Media
Informed Consent and Protecting Identities
Journalists should obtain informed consent from sources before sharing or publishing any information or content obtained through social media interactions
Sources should be fully aware of how their information will be used and the potential risks of being identified (obtaining written or verbal consent, explaining publication process)
Journalists should respect sources' requests for or confidentiality and take steps to protect their identities (using pseudonyms, blurring faces in photos)
When reporting on sensitive topics or vulnerable populations, journalists must take extra precautions to protect the identities and personal information of sources on social media
Survivors of sexual assault, minors, or individuals in dangerous situations may require additional safeguards to prevent re-traumatization or harm (avoiding identifying details, using content warnings)
Marginalized communities or activists may face disproportionate risks for speaking out and require extra protection (using secure communication channels, consulting with community leaders)
Transparency and Ethical Communication
Journalists should use secure communication channels, such as encrypted messaging apps or email, when discussing confidential information with sources via social media
Apps like Signal or WhatsApp provide end-to-end to prevent interception of sensitive messages (Edward Snowden's use of encrypted communications with journalists)
Encrypted email services like ProtonMail or Tutanota can be used for more secure document sharing or longer conversations
If a source requests anonymity, journalists must take steps to remove any identifying information, including names, usernames, and profile pictures, before publishing content obtained from social media
Redacting or blurring screenshots of social media posts to remove identifying details
Using generic descriptions or pseudonyms when quoting anonymous sources ("a senior official," "a former employee")
Journalists should be transparent about their identity and intentions when contacting sources through social media and should not use deceptive tactics to obtain information
Clearly identifying oneself as a journalist and explaining the purpose of the communication
Avoiding the use of fake profiles, impersonation, or other misleading tactics to solicit information (Sacha Baron Cohen's use of disguises to deceive interviewees)
Risks and Benefits of Private Messaging
Assessing Security and Confidentiality
Private or direct messaging can provide a more secure and confidential channel for communicating with sources compared to public posts or comments on social media
One-on-one conversations are less likely to be seen by unintended audiences or attract unwanted attention
Private messaging allows for more candid or sensitive discussions without fear of public scrutiny
However, private messages can still be screenshotted, forwarded, or accessed by third parties, such as hackers or government agencies, compromising the confidentiality of the conversation
Messages can be screenshotted by recipients and shared without the sender's knowledge or consent (Jeff Bezos's private messages leaked by National Enquirer)
Government surveillance programs or court orders may compel social media companies to turn over private message data (NSA's PRISM program)
Journalists should assess the sensitivity of the information being discussed and the trustworthiness of the source before engaging in private messaging on social media platforms
Evaluate the potential risks and benefits of discussing confidential information over private messaging
Consider the source's credibility, motives, and potential for deception or manipulation
Precautions and Secure Alternatives
When using private messaging, journalists should still take precautions to protect the identity of sources, such as using pseudonyms or avoiding sharing personal details
Use code names or initials instead of full names when discussing sensitive topics or individuals
Avoid exchanging personal information, such as phone numbers or email addresses, that could be used to identify sources
Journalists should consider using encrypted messaging apps or other secure communication channels for highly sensitive or confidential conversations with sources
Apps like Signal or Telegram offer self-destructing messages and other privacy features for added security
Secure email or file-sharing platforms like SecureDrop can be used for exchanging confidential documents or tips (The New Yorker's Strongbox system for anonymous sources)
Protocols for Secure Information Management
Secure Storage and Access Control
Journalists should establish clear guidelines for securely saving and storing any information, content, or data obtained through social media interactions with sources
Create a standardized system for organizing and labeling files or documents related to social media sources
Implement access controls, such as strong passwords or two-factor authentication, to prevent unauthorized access to stored information
Sensitive information should be encrypted and stored on secure devices or servers with limited access to prevent unauthorized access or data breaches
Use encryption software like VeraCrypt or BitLocker to protect confidential files or folders
Store sensitive data on external hard drives or offline devices, rather than cloud storage or networked computers (air-gapped computers for highly classified information)
Journalists should avoid saving or storing personal information or content from sources on public or shared devices, such as office computers or cloud storage accounts
Use dedicated, password-protected devices for handling sensitive information from social media sources
Avoid syncing or backing up confidential files to shared cloud storage accounts (iCloud hack exposing celebrity photos)
Sharing and Updating Protocols
Protocols should include guidelines for securely sharing or transferring sensitive information obtained through social media with editors, colleagues, or other relevant parties
Establish secure methods for sharing files or documents, such as encrypted email or secure file transfer services (Firefox Send for encrypted file sharing)
Limit access to sensitive information to only those who need it and ensure all parties follow the same security protocols
Journalists should regularly review and update their security protocols to ensure they are using the most up-to-date and effective methods for protecting information obtained through social media
Stay informed about new security threats, vulnerabilities, or best practices related to social media and communication technologies
Conduct periodic audits or risk assessments to identify potential weaknesses or areas for improvement in information security practices (regular security training for journalists and newsroom staff)