Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceGovernment: Federal, State and Local

Why banning TikTok will not solve data security challenges

By Rich Vibert
Phone displaying TikTok app logo

Image via Unsplash

April 26, 2024

TikTok, the social media platform owned by the Beijing-based company ByteDance, has come under fire from Washington, D.C. lawmakers. Legislation signed into effect on April 24 includes a provision that requires ByteDance to sell the social media app in the next nine to twelve months or be banned in the United States. According to the Associated Press, the ban would not go into effect for at least a year and will likely take longer due to legal challenges. 

Those arguing for TikTok to be banned cite multiple reasons with national security at the top of the list. Another reason they want TikTok banned: data security.

The fact that the platform is owned by a Chinese company and that it could be exploited by the Chinese government is a valid national security concern. But the idea that TikTok is a data security threat simply doesn’t hold water when there are so many other apps with just as much — if not more — access to user data.

How much data does TikTok have?

TikTok currently has approximately 170 million U.S. users. When someone opens an account, TikTok collects personally identifiable information such as the user’s name, age, language, email, phone number, social media account information and profile image — very similar to other popular social media apps like Facebook and Instagram. 

Also, like other social media apps, TikTok is saving user activity data and collects information on purchases that happen on the app, contact lists and messages sent via the platform. On its privacy policy page, TikTok confirms it automatically collects usage and device information, location data, image and audio information, metadata and cookies.

TikTok: A drop in the bucket when it comes to data collection

Yes, TikTok may be capturing a lot of data, but if you’re comparing TikTok’s data policies to Meta’s policies for Facebook and Instagram, it all sounds strikingly similar. What’s not similar are the user numbers. According to Meta’s Q4 2023 earnings report, Facebook had 205 million daily active users in the U.S. and Canada at the end of last year. Add to that the more than 150 million U.S. users on Instagram — not to mention Threads and WhatsApp — and one immediately realizes just how much more data Meta has.

And that’s just one company. Google, Apple, Amazon and the thousands of consumer apps that Americans use for entertainment, shopping and wellness — not to mention the collaborative work apps so many of us have on our phones — all of these platforms are collecting user data. TikTok accounts for barely even a drop in this ocean of data collection. In fact, when grading the largest tech companies on their data policies, Security.org gave Google an F: “Out of all the companies on this list, Google collects and stores most of your information by far.” (Worth noting that Facebook earned a C and Apple received an A+). 

As Representative Sara Jacobs from California made clear after briefings on the bill, “Not a single thing that we heard in today’s classified briefing was unique to TikTok.”

What the data security and tech experts have to say

The primary issue when it comes to the amount of data that TikTok has compared to these other leading tech platforms and social media giants is that TikTok is owned by China. But the reality is that China can just as easily access Americans’ data without the app.

In a recent report from Scientific American, Kate Ruane, an attorney for the Center for Democracy and Technology, emphasized just how ineffective a TikTok ban would be in terms of data security: “Banning access to one application does not create safety or security for Americans’ data from China or from any other country,” said Ruane. “So many applications and social media services collect our data and sell it or leak it all over the world, all the time.”

In the same article, Callie Schroeder, senior counsel for the nonprofit organization Epic.org (Electronic Privacy Information Center), called the ban a form of security theater and said that legislators are smart enough to know banning TikTok doesn’t address the real problem. “You could get rid of TikTok today, and China would not lose any significant [amount] of personal information on Americans,” said Schroeder.

If banning TikTok isn’t the answer, what is? 

There may be valid arguments for U.S. lawmakers to ban or force the sale of the social media app — national interests and regulatory issues being among them — but banning TikTok for data privacy protections against China won’t work.

So, what’s the answer? There is an argument to be made for stricter consumer privacy laws that apply to all social media sites and tech platforms. Transparency is a must for any platforms that collect user data — informing the user on exactly what data is being collected and how it is used. For businesses, it’s crucial IT or security teams have complete visibility into what data is being uploaded, saved and shared across the company’s cloud-based app environment. 

Ultimately, the digital ecosystem is so massive and contains so much personally identifiable information that banning a single social media app over data security concerns would have zero impact. It may even cause further harm, opening the door to more bans without any efforts going toward policies and tactics that could actually create positive change. 

KEYWORDS: data concerns data privacy data security legislation social media social media risk social media security TikTok

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rich vibert headshot

Rich Vibert is the CEO and Co-Founder of Metomic. Image courtesy of Vibert

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • computer

    More solutions will not solve cybersecurity and data protection challenges, study reveals

    See More
  • Tiktok

    Banning TikTok and Chinese apps is a national security red herring

    See More
  • TikTop-App-on-Phone.jpg

    Montana Governor signs bill banning TikTok

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing