Associated Press
- In April 2018 Facebook implemented new rules restricting the amount of personal data third-parties could access following the Cambridge Analytica scandal.
- These rules precluded app developers from gaining access to individuals' data through Facebook groups.
- Facebook admitted on Tuesday a recent review has revealed some 100 app developers still had access to users' data through private groups.
- Visit Business Insider's homepage for more stories.
More than a year after Facebook clamped down on how much personal data third parties could see, the company has found some app developers still had access to people's data through Facebook Groups.
In the wake of the Cambridge Analytica scandal Facebook tightened its rules on what personal data app developers could access. Following broad changes made in 2018, app developers' access to groups was restricted to content, as opposed to the data of individuals belonging to those groups such as names and profile pictures.
In a blog published on Tuesday Facebook's director of platform partnerships Konstantinos Papamiltiadis admitted this new rule hadn't been uniformly implemented. Roughly 100 app developers retained access to group members' personal data, although Papamiltiadis said Facebook has now cut them off.
Papamiltiadis said there was "no evidence of abuse," but that at least 11 of these developers accessed the data in the last 60 days. Facebook is asking them to delete all relevant data.
He didn't name any of the apps, but said they were "primarily social media management and video streaming apps, designed to make it easier for group admins to manage their groups more effectively and help members share videos to their groups." He was also unspecific on exactly what personal data was accessed.
Facebook did not immediately respond to Business Insider's request for additional information.
Do you work at Facebook? Contact this reporter via email at ihamilton@businessinsider.com or iahamilton@protonmail.com. You can also contact Business Insider securely via SecureDrop.