Know what social networking applications have access to your personal data

0
5

ESET Latin America explains step by step what type and quantity of information are shared in some of the most used social networks; Both with companies and/or application developers, as well as with your contacts and how to take care of it.

Facebook applications developed by third parties: Facebook allows other developers to use the social network to add additional functionality. To check the user is already using applications developed by third parties, you only have to go to the option “Settings” and then click on the “Applications” option. Once there you can see the list of third-party applications that you have accepted within your profile. Finally, when you click on each of the applications, you can find out the information about the user accessed by the application.

Restrict information that is shared with applications — users can restrict the type of information they share with each application. In any case, it is important to mention that there is information that the application requires in a compulsory way so that the user can use it. In that case, each user should be aware if they want to share the information in order to make use of the application.

It is worth clarifying that in case the user wants to delete any application, the information that has already been shared with the developer company could remain on their servers.

Other social networks, similar behaviors: While Facebook is the network that has been in the eye of the hurricane for all the scandal that was generated, there are other social networks that also allow third-party applications to add functionalities to the experience of the User in exchange for certain information of the users.

In the case of Instagram, for example, you can enter from a browser to the account and in the section of the configuration “authorized applications” you will find the details of the permissions that as user grants to access certain personal information; and the possibility of revoking access to it.

With Twitter something very similar happens, because in the configuration part of the account it is possible to access the information of the applications that have access to the information.

To finish, it should be noted that this situation not only touches the social networks, but there are also third-party applications that seek to add functionality to the experience as users and may be getting data. A case of this are the navigators.

Two of the most popular, such as Firefox and Chrome, allow to download extensions, which request permissions at the time of installation. In the case of Firefox, before installing any of those extensions from the official Firefox Add-ons store, it allows to see at the end of the page the permissions that it requests. Once installed, the Add-In Manager option can see all those that are active.