Meta Using Your Facebook & Instagram Images for AI

Meta is Using Your Images for AI

Social media platforms have become central to our daily lives, but new updates from Meta highlight an important consideration for users: your photos could be used to train AI systems.


Meta’s AI and Your Images

Meta has confirmed that images uploaded to Facebook and Instagram may be accessed to improve and train their AI models. This applies to:

  • Profile pictures and cover photos
  • Posts shared publicly or with friends
  • Photos uploaded but never deleted

Even if you’re not actively posting, images in your account could be included if they meet the platform’s terms.


Why This Matters

AI image systems are growing rapidly, and the data they train on shapes what they can generate. Using personal photos without explicit consent can raise:

  • Privacy concerns – Your likeness could appear in AI-generated content
  • Consent issues – You may not have knowingly agreed for your images to be used
  • Reputational risks – AI tools trained on personal images could be misused or misattributed

How to Protect Yourself

While platforms like Meta provide controls, user awareness is key. Here are some practical steps:

    1. Remove Privacy Settings
    2. Remove Old Photos you don’t want Shared
    3. Opt-Out of Facial Recognition
    4. Limit App & Third-Party Permissions
    5. Manage Public Sharing
    6. Regularly Review Settings

          Step 1: Update Privacy Settings

          Facebook

          1. Log in to Facebook on desktop or mobile.
          2. Click the arrow (desktop) or menu (mobile) → Settings & Privacy → Settings.
          3. Go to PrivacyYour Activity.
          4. Review who can see your posts, photos, and albums.
            • Set past posts to Friends only or Only me.
          5. Review Profile and Tagging settings to limit who can post or tag you.

          Instagram

          1. Open Instagram → tap your profile picture → menu (☰).
          2. Tap Account Privacy.
          3. Enable Private Account.
          4. Limit who can comment, tag, or mention you in posts.

          Step 2: Remove Old Photos You Don’t Want Shared

          1. Go through your photo library or albums.
          2. Delete images that are public or could be sensitive.
          3. Remember that even deleted content may remain in backups temporarily.

          Step 3: Opt-Out of Facial Recognition / AI Features

          Facebook

          1. Go to Settings → Face Recognition.
          2. Set “Do you want Facebook to recognize you in photos and videos?” to No.
            • This helps limit AI from associating your face with content.

          Instagram

          1. Instagram doesn’t currently have a public opt-out for AI usage, but keeping your account private and limiting public posts helps reduce exposure.

          Step 4: Limit App & Third-Party Permissions

          1. Go to Settings → Apps and Websites on Facebook/Instagram.
          2. Revoke access for apps that you don’t trust or don’t use.
          3. Remove permissions for third-party AI tools if linked to your account.

          Step 5: Manage Public Sharing

          • Avoid posting sensitive images publicly.
          • Use Stories with close friends only instead of public posts.
          • Consider watermarking or reducing identifiable features in photos before posting.

          Step 6: Regularly Review Settings

          • Privacy policies and AI usage may change.
          • Schedule a quarterly review of your account privacy and photo sharing settings.

          Why Businesses Should Care

          This isn’t just about personal accounts, business pages and employee posts can also feed AI models. Companies should:

          • Train staff on social media awareness
          • Develop policies for public-facing content
          • Monitor corporate accounts to ensure brand safety

          The Bottom Line

          AI is evolving quickly, and so is the way platforms use your data. Being proactive about what you share and how your images are handled is the first step in protecting both personal privacy and corporate reputation.

          At Technicalities, we advise businesses and individuals on cyber awareness and data safety, helping you stay informed and secure in a rapidly changing digital landscape.


          Other news & articles

          Why choose Technicalities as your MSP?

          Why choose Technicalities as your MSP? Technicalities is a Managed Service Provider (MSP) that provides a range of IT services to organisations of all sizes. With years of experience in the industry, Technicalities has established itself as a market leader, and reliable MSP. Technicalities is a great MSP for many reasons. We have technical expertise,…

          Meta’s Hidden Study

          Meta’s Hidden Study What the Courts Are Saying About Social Media & Mental Health Recent court filings have uncovered a troubling narrative: Meta (the company behind Facebook and Instagram) may have downplayed or even buried its own research showing negative mental health effects, especially among teens. What the Court Case Reveals A deeper dive into…

          The Rise of SMS Phishing: Why Your Phone Is the New Frontline in Cybersecurity

          The Rise of SMS Phishing Why your phone is the new frontline in Cyber-security Cybercriminals follow one simple rule: attack where people are paying the least attention. Right now, that target is your mobile phone. SMS phishing has surged across Australia and globally, becoming one of the fastest-growing cyber threats affecting individuals and businesses alike.…

          The Hidden Risk of Outdated Website Plugins: Why WordPress Sites Are Vulnerable

          The issue with old WordPress plugins Your website is more than a digital storefront, it’s an asset that threat actors actively target. Recently, a large-scale exploitation campaign has exposed how dangerous unpatched WordPress plugins really are. New Real-World Threat: Mass Exploitation Campaign A recent wave of attacks is exploiting critical vulnerabilities in two popular WordPress…

          Why choose Technicalities as your MSP?

          Why choose Technicalities as your MSP? Technicalities is a Managed Service Provider (MSP) that provides a range of IT services to organisations of all sizes. With years of experience in the industry, Technicalities has established itself as a market leader, and reliable MSP. Technicalities is a great MSP for many reasons. We have technical expertise,…

          Meta’s Hidden Study

          Meta’s Hidden Study What the Courts Are Saying About Social Media & Mental Health Recent court filings have uncovered a troubling narrative: Meta (the company behind Facebook and Instagram) may have downplayed or even buried its own research showing negative mental health effects, especially among teens. What the Court Case Reveals A deeper dive into…

          The Rise of SMS Phishing: Why Your Phone Is the New Frontline in Cybersecurity

          The Rise of SMS Phishing Why your phone is the new frontline in Cyber-security Cybercriminals follow one simple rule: attack where people are paying the least attention. Right now, that target is your mobile phone. SMS phishing has surged across Australia and globally, becoming one of the fastest-growing cyber threats affecting individuals and businesses alike.…

          The Hidden Risk of Outdated Website Plugins: Why WordPress Sites Are Vulnerable

          The issue with old WordPress plugins Your website is more than a digital storefront, it’s an asset that threat actors actively target. Recently, a large-scale exploitation campaign has exposed how dangerous unpatched WordPress plugins really are. New Real-World Threat: Mass Exploitation Campaign A recent wave of attacks is exploiting critical vulnerabilities in two popular WordPress…

          Technicalities Hosted servers v AWS

          Why Technicalities Hosted Servers Outperform AWS for Australian Businesses For many organisations, Amazon Web Services (AWS) has become the default name in cloud hosting. But “industry standard” doesn’t always mean “best fit.”At Technicalities, we specialise in high-performance, fully managed hosted server environments built for reliability, security, and predictable pricing, without the hidden surprises of hyperscale…

          Cyber-security Starts with You

          Cyber-security Starts with You; Why Smart Habits Matter as Much as Cyber Tools When it comes to cyber-security, businesses often invest in the latest tools, from firewalls and EDR to advanced monitoring systems. These tools are vital, but here’s the truth: no matter how many security layers are in place, they can’t replace common sense…

          Future Proofing Your Business IT in 2026

          Future Proofing Your Business IT in 2026 As we approach 2026, the pace of technological change continues to accelerate. Businesses that fail to adapt risk falling behind competitors, while those that strategically plan their IT infrastructure can improve efficiency, security, and long-term growth. Future-proofing your IT isn’t about buying the latest gadgets or software, it’s…

          Cybersecurity: Protecting Against Holiday Season Scams

          Protecting Against Holiday Season Scams The holiday season is a busy and exciting time for businesses, but it’s also a prime target for cybercriminals. Increased online shopping, end of year invoices, and holiday promotions create the perfect storm for phishing emails, fake delivery notifications, and social engineering attacks. For small and medium-sized businesses, a single…

          Unlocking Productivity: 5 Ways to Get More from Microsoft 365

          Most businesses only scratch the surface of Microsoft 365, using it for email and documents while overlooking powerful tools that boost productivity. From Teams and Power Automate to Power BI, OneDrive, and Copilot, discover five ways to get more from your subscription and transform the way your business works.

          Australia’s Social Media Ban for Under 16s

          Australia stands on the verge of a sweeping transformation in the way its youngest citizens interact with social media. As lawmakers debate a groundbreaking proposal to ban under-16s from major platforms, the nation wrestles with questions of safety, freedom, and technological change. With industry players, educators, and families all having a stake in the outcome, the months ahead promise robust public discussion and policy innovation. The ultimate challenge will be to protect children from online harms while empowering them to navigate an increasingly digital world with confidence and resilience.

          How is Your Wi-Fi?

          Technicalities, Your Partner in Wireless Excellence In a world where reliable connectivity drives every facet of business, Technicalities stands as a vigilant guardian against wireless interference and network downtime. Armed with cutting-edge spectrum analysers and proactive detection tools, our team ensures that disruptive signals—from office gadgets to neighbouring networks—never compromise your productivity. By continually embracing the latest advances in wireless technology and tailoring scalable solutions to each client, Technicalities transforms complex environments into seamless hubs of efficiency. When uninterrupted connectivity is essential, trust our expertise to keep your business moving forward.

          Why Choose a Technicalities Hosted Server

          Dedicated to excellence, Technicalities Hosted Servers offer Melbourne-based 24/7 expert support, ensuring smooth and reliable hosting tailored to local business needs. Powered by the globally acclaimed Equinix Data Centre in Melbourne, our infrastructure guarantees world-class security, scalability, and reduced latency. With transparent pricing that outperforms AWS, we deliver unmatched value without hidden costs. Partner with Technicalities for innovative storage solutions, cutting-edge technologies, and a competitive edge in server hosting. Elevate your IT infrastructure today.

          Unlocking Efficiency with Office Door Access Systems

          Unlocking Efficiency with Office Door Access Systems How Modern Access Control Enhances Security and Productivity Office door access systems have emerged as a vital solution for managing entry to office spaces, offering convenience, security and logging. Technicalities have worked with numerous companies and systems and provide the coding background to either application based, or fob…

          Maximising Efficiency with SharePoint and OneDrive

          The importance of securely backing up data cannot be overstated. This article delves into the features of Microsoft OneDrive and SharePoint, highlighting the critical role cloud backup plays in protecting your valuable information. By leveraging these powerful tools, businesses can ensure seamless collaboration and safeguard their data against unforeseen events.

          Cyber Training Partnership – Phished

          Cyber Training Partnership – Phished Enhancing Security Awareness Through Strategic Collaboration. We are thrilled to announce our strategic partnership with Phished, a leading provider of cyber security training solutions, to offer our customers advanced cyber training modules. This collaboration aims to fortify our customers’ defences against cyber threats by leveraging Phished’s cutting-edge training platform and…

          Latest Cyber Threat Trends

          Latest Cyber Threat Trends As we navigate the digital landscape of 2025, the world of cyber security continues to evolve at a rapid pace. With cyber threats becoming increasingly sophisticated, it is imperative for individuals and organisations to stay informed about the latest trends in order to protect their digital assets. Here, we outline some…

          The Vital Role of Geo-blocking

          The Vital Role of Geo-blocking In the digital age where connectivity knows no bounds, the concept of geo-blocking has emerged as a pivotal tool in the realm of IT security. Geo-blocking refers to the practice of restricting access to internet content based on the user’s geographical location. While often associated with content distribution and regional…

          What to Expect from Windows 12

          What to Expect from Windows 12 Exploring the Future of Microsoft’s Operating System As the end of life for Windows 10 approaches, anticipation is building for the next iteration of Microsoft’s operating system: Windows 12. While Microsoft has yet to officially announce all the details, several features and enhancements are expected to revolutionise the user…

          How Secure is your Data?

          In an increasingly digital world, safeguarding your data has never been more critical. From understanding common threats like phishing and weak passwords to adopting practical solutions like encryption and multi-factor authentication, this guide equips you with the tools to protect what matters most. Don’t wait until it’s too late. Secure your data today!

          Boosting Productivity in Teams Meetings with Microsoft Copilot

          Microsoft Copilot is transforming how businesses conduct Teams meetings by automating tasks, summarising discussions, and tracking action items. This AI-powered assistant helps teams stay organised, improve collaboration, and save time, making it an essential tool for modern hybrid work environments.

          The Cost of Cybersecurity Negligence: Lessons from 2024 Breaches

          In 2024, Australian businesses faced a surge in cyberattacks, exposing the costly consequences of cybersecurity negligence. From financial losses to regulatory fines and reputational damage, the impact was felt across industries. This article explores key lessons from the year’s major breaches and offers strategies to help organizations strengthen their cybersecurity defenses.

          Quishing Scams are on the Rise

          Quishing Scams are on the Rise! One of the latest threats in the world of cybercrime is quishing—a form of phishing that uses QR codes to lure individuals into scams. As the use of QR codes has surged in recent years for everything from digital payments to contactless check-ins, so too has the opportunity for…

          Windows 10 End of Life

          Windows 10 End of Life Microsoft’s Windows 10 operating system has been a staple for businesses and individuals alike since its launch in 2015. However, like all software, Windows 10 is approaching the end of its lifecycle, and Microsoft has officially set the end-of-life (EOL) date for October 14, 2025. This means that after this…

          Cyber Security Awareness Month 2024

          October is Cybersecurity Awareness Month, a time to highlight the importance of online safety and data protection. Learn how to safeguard your digital presence with practical tips and best practices to defend against cyber threats.

          Safeguard your data with 3-2-1 Backup

          Safeguard your data with 3-2-1 Backup Data is the lifeline for businesses. Losing access to important files, customer information, or critical systems can be devastating, both financially and operationally. That’s why a robust backup strategy is essential for protecting your business from data loss, corruption, or cyberattacks. One of the most reliable methods used by…

          Taking Cyber Security to a new Level with MDR

          Taking Cyber Security to a new Level with MDR All of Technicalities’ managed customers have now been moved away from AntiVirus and on to EDR (Endpoint Detection and Response). EDR’s Machine Learning capability is essential for a more accurate detection of viruses, malware and ransomware, as well as action should something happen. We have now…

          Spotify Phishing Scam Warning

          Spotify Phishing Scam Warning Beware of Cyber Threats from Fake Spotify Emails: What to Look Out For and How to Protect Yourself With over 600 million users worldwide, Spotify is one of the most popular music streaming platforms. Unfortunately, its vast user base makes it a prime target for cybercriminals. One common tactic used by…

          CrowdStrike: The crash and Repercussions

          CrowdStrike: The crash and Repercussions In mid July, nearly everything ground to a halt. Microsoft computers started crashing which caused an outage that globally stopped 5,000 flights from taking off, supermarket checkouts to stop working, and Marvel Stadium to only allow patrons in based on viewing membership cards; like back in the 1990s. Who are…

          The AI Future: What is Microsoft Copilot?

          The AI Future: What is Microsoft Copilot? Microsoft Copilot is an AI-powered assistant integrated into Microsoft Office applications, designed to enhance productivity and streamline workflows. Leveraging advanced machine learning and natural language processing capabilities, Copilot can help draft documents, create presentations, analyse data, and automate repetitive tasks. Key features of Microsoft Copilot include: By harnessing…

          How Copilot Handles Your Data in Microsoft 365

          How Copilot Handles Your Data in Microsoft 365 In an era where digital collaboration and productivity tools have become essential, understanding how your data is managed and protected is crucial. Microsoft 365’s Copilot feature is designed to enhance productivity by integrating AI-driven assistance across various applications. This blog delves into how Copilot handles your data…

          Embracing the Future with Pure Storage

          Embracing the Future with Pure Storage In the ever-evolving landscape of data management, staying ahead of the curve is essential. As part of Technicalities’ commitment to providing top-tier services and maintaining operational excellence, we have recently upgraded our data centre infrastructure with Pure Storage. This strategic investment underscores our dedication to leveraging cutting-edge technology to…

          Cyber Awareness Training: Our Partnership with Phished

          Cyber Awareness Training: Our Partnership with Phished In today’s digital age, cybersecurity threats are an ever-present concern for individuals and organizations alike. Among these threats, phishing remains one of the most prevalent and damaging. As cybercriminals continually refine their techniques, it is imperative that we stay ahead of the curve to protect our sensitive information…

          Protect Yourself Online – A recommendation for safer browsing

          Protect Yourself Online – A recommendation for safer browsing In today’s digital age, we are more connected than ever. The internet is an invaluable tool for staying in touch with loved ones, learning, socialising, playing games or life management such as banking. However it also exposes us to online threats such as identity theft, scams…

          Cyber Security Review: Microsoft 365

          Cyber Security Review: Microsoft 365 Cyber Security is a rapidly evolving space. What works today could be exploited tomorrow. On a daily basis we at Technicalities are researching the latest scams, viruses and vulnerabilities within both software and hardware. Many of our customers live in the Microsoft 365 world due to its ease of communication…

          Microsoft 365 Backups

          Microsoft 365 Backups By default, Microsoft does not offer backup. If an email or file is deleted, it will likely sit in the ‘Deleted Items’ folder or Recycle Bin for a limited amount of time, often 30 days. Technicalities offers a backup solution that covers all Microsoft 365 emails, and files from OneDrive and SharePoint.…

          The Need for a Good Firewall

          The Need for a Good Firewall As businesses increasingly rely on digital infrastructure to operate and grow, safeguarding this infrastructure from malicious attacks becomes paramount. At Technicalities Group Consulting, we understand the critical role that a well-configured firewall plays in protecting your organization’s digital assets. Understanding the Basics: What is a Firewall? A firewall is…

          SIEM as a Service

          SIEM as a Service Technicalities now offers (Security Information & Event Management) as a hosted service. Networks that sit behind a firewall appear to be safe, however the firewall (in its basic form) is meant to block incoming and outgoing connections. However, there must be some openings in order to allow in certain traffic such…

          Callback Phishing Avoids Filters

          Callback Phishing Avoids Filters A new form of phishing is appearing and it has the ability to avoid email filtering programs. Phishing is the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to entice individuals to reveal personal information, such as passwords and credit card numbers. Unlike…

          Application Whitelisting

          Application Whitelisting In today’s digital age, Application Whitelisting has become an increasingly popular security measure. So much so that it is the Number 1 recommendation on the Australian Government’s ‘Essential Eight’ list of recommendations.. The concept behind application whitelisting is simple: Rather than trying to block every potential threat, you simply allow only authorised applications…

          The Importance of Endpoint Detection and Response (EDR)

          The Importance of Endpoint Detection and Response (EDR) Endpoint detection and response (EDR) is a crucial element in the modern cybersecurity landscape. As organisations are moving more of their business online and relying on digital data storage and communication, the risk of cyberattacks has increased significantly. Endpoint Detection and Response provides the necessary tools to…

          The Essential Eight

          The Essential Eight While it may sound a little boring, and it may never be required, the ‘Essential Eight’ is something that needs to be on every business’ radar. In today’s fast-paced and interconnected world, cyber threats are becoming increasingly sophisticated and frequent. Organizations are at constant risk of losing critical data or being disrupted…

          Cybercriminals double down on Ransomware boom

          Cybercriminals double down on Ransomware boom Ransomware is one of the biggest forms of cybercrime that businesses of any size face today, so how can we protect against it? Cyberattacks, in particular Ransomware, are on the increase in Australia. The average remediation cost of a ransomware attack in Australia is $1.12 million The Essential 8,…