Community Guidelines
Inauthentic Behaviour Policy Details
We do not allow:
-
The creation, use, or claimed use of Inauthentic Meta Assets (Accounts, Pages, Groups, etc.) in order to:
-
Deceive Meta or our users about:
-
The identity, purpose, or origin of an audience or the entity that they represent; or
-
the popularity of content or assets on our services; or
-
a Meta asset’s ownership or control network.
-
To Evade enforcement under the Community Standards.
-
Misuse Meta reporting systems to harass, intimidate or silence others.
-
-
Engaging in complex deception through the use of Meta Assets, including:
-
Inauthentic Distribution: Using a connected network of inauthentic Meta assets to increase the distribution of content, in order to mislead Meta or its users about the popularity of the content in question.
-
Inauthentic Audience Building: Using inauthentic Meta assets to increase the viewership or following of network assets, in order to mislead Meta or its users about the origin, ownership or purpose of an asset or assets.
-
Foreign Inauthentic Behavior: Foreign entities using Inauthentic Meta assets to falsely represent a domestic or local voice, in order to deceive an audience about the identity, purpose or origin of the entity they represent.
-
Inauthentic Engagement: Using a connected network of inauthentic Meta assets to deliver substantial quantities of fake engagement in ways designed to look authentic, in order to deceive Meta and its users about the popularity of content.
-
Substantially Similar Deceptions: Other substantially similar claimed or actual efforts by relatively sophisticated, connected networks of inauthentic Meta assets to deceive Meta or its users about the origin, popularity, or purpose of content.
-
For the following Community Standards, we require additional information and/or context to enforce:
We do not allow:
-
Entities to engage in, or claim to engage in Coordinated Inauthentic Behavior, defined as particularly sophisticated forms of Inauthentic Behavior where inauthentic accounts are central to the operation and operators:
-
Use adversarial methods to evade detection or appear authentic; and
-
Use a variety of adversarial and inauthentic techniques to achieve overarching strategic objectives; and
-
Primarily seek to manipulate public debate.
-
-
Entities to engage in, or claim to engage in Foreign Interference, defined as Coordinated Inauthentic Behavior where the network operators are not located in the same country as the audience the operation targets.
-
Entities to engage in, or claim to engage in Government Interference, defined as Coordinated Inauthentic Behavior where the operation is attributable to a government actor.
-
Governments that have instituted sustained blocks of social media to use their official departments, agencies, and embassies to deny the use of force or violent events in the context of an attack against the territorial integrity of another state in violation of Article 2(4) of the UN charter.