Facebook cuts off user data access for thousands of apps
The deadline for app developers to re-submit their apps for approval has passed
Facebook has revealed it's going to cut off access to its user data API for developers that haven't submitted their third-party apps for review as part of its mission to clamp down on those abusing its data.
In May, the company said it would be insisting all businesses and app developers using its API to connect their apps to the social media service would need to have them re-approved to ensure they weren't misusing user data. This decision was made following the Cambridge Analytica scandal that saw thousands of users' data being misused by the data firm.
But, the company said it hasn't received submissions from hundreds upon thousands if developers connecting to it via the API and it would therefore cut off access to those that haven't been re-verified.
"We'd encourage apps that are still being used but have not been submitted for app review to do so now," the company said. "However, to ensure all apps currently in use go through our review process, we will be proactively queueing up apps for review."
The company had previously offered a deadline of 1 August for developers to submit their apps for approval, although there was a grace period if the app is in the queue to be reviewed or if Facebook has requested more information from the developer.
Any company or developer that doesn't respond to Facebook's requests for further information within a given time will also lose access to the API.
"Our goal with all these changes is to ensure that we better protect people's Facebook information while also enabling developers to build great social experiences like managing a group, planning a trip or getting concert tickets for your favorite band," said Ime Archibong, vice president of product partnerships at Facebook.
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency planDownload now
Trends in modern data protection
A comprehensive view of the data protection landscapeDownload now
How do vulnerabilities get into software?
90% of security incidents result from exploits against defects in softwareDownload now
Delivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.Download now