Data Protocol Docs Logo

guide

Data Security

Check out the Meta Horizon Channel

For more on this topic, take the Course: Submitting a Data Protection Assessment

In partnership withpartner logo

10 min read

Share this doc:


A key component of the Data Protection Assessment (DPA) is evaluating how you protect the User Data you use, share, and store. To prevent the unauthorized access or loss of User Data and/or Device User Data, you are expected to have access management, change management, and operational safeguards in place.

This guide will walk you through five initial steps to begin evaluating and considering your data and information security processes.

lightbulb icon

This guide is not exhaustive, and does not guarantee you are in compliance with Meta's terms and policies. If you collect User Data and/or Device Data, you must comply with the requirements outlined in Developer Data Use Policy (DDUP). For more best practices, reference Meta's Developer Data Security Best Practices.

1/6

Step 1: Set a Strong Foundation

Information Security Standard

If you store or transmit User Data and/or Device User Data, you need to take steps to protect the confidentiality, integrity, and availability of that data. You should also understand the risks related to storing and/or transmitting User Data and/or Device User Data. To comply with this section of the Developer Data Use Policy, your organization should have information security practices in place that consider your people, processes, technology, assets, and risks.

You are not required to follow a particular Information Security Standard or obtain a particular data security certification, such as ISO27001. But, these information security standards should inform your practice as you design, enact, and operate effective security for your organization.

When you define your Information Security practices, document them and be prepared to provide that description to Meta upon request. If you or your service providers have obtained a data security certification, you should also be prepared to provide a copy to Meta.

For more information about Information Security Standards, check out this section of the Data Protection Assessment document.

Disclaimer: This resource does not guarantee compliance with Meta policies, nor applicable data privacy laws. Review Meta Horizon's Developer Data Use Policy for a comprehensive overview of Meta's requirements.

For more on this topic, take the Course:


Data Protocol Course

Submitting a Data Protection Assessment

The Data Protection Assessment evaluates whether you are complying with Meta’s policies surrounding prohibited uses of data, data security and deletion, and sharing data with third parties. This course will provide you with the guidance you need to successfully complete your annual DPA.

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.