Social Distancing on Social Media

Serious Risks to Consider When Socializing Distantly

In today’s crazy world of staying home instead of visiting friends, we’ve all been inclined to share a little more of ourselves on social media. There are more pictures of baking adventures with kids, selfies of good health and shared lists with a rundown of your personal information. Let me explain why sharing life information without precautions can be bad for real life.

Security Questions are Passwords

Decades ago, banks added extra questions to bank signature cards. This included information – such as a mother’s maiden name – to help verify customers needing account services. In the early 2000’s security questions became the norm for every account you set up online. Security questions are often required as an extra security layer to grant account access or to request a password reset. Questions range from asking your mother’s maiden name to the details of your first vehicle to the street you grew up on. The answers to these questions are additional passwords to access your accounts.

Breaches Handing Out Your Secrets

Security breaches happen every day, but in 2016 Yahoo admitted their security breach leaked over 3 billion users’ security answers to hackers, yes 3 BILLION accounts. This shed light on an even more serious issue – you can’t change your mom’s maiden name or the street you grew up on. But those now-public answers have the power to grant access to your accounts.

Fun But Harmful Social Media Posts

The Yahoo breach and other breaches may have spread some traditional security question answers around, but many people use social media to willingly spread the rest of them. Social media serves as a medium to help us connect to others (or argue with them, but that’s a different article). It was made for these things, but sharing such information publicly also opens users up to account hacking.

  • Who doesn’t get a kick out of discovering that our soft-spoken, sweet friend that we met in church has a list of favorite concerts that includes hardcore rap?
  • Why not gather “Likes” from posting pictures of us restoring our first vehicle on social media or reminiscing over old 1st grade class photos?
  • How many have competed to see who’s moved the most times with lists of former hometowns?
  • What other sharing have you seen that includes security question answers?

We’ve all enjoyed these posts, but all of these items are answers to many of the traditional security questions that secure our accounts. It’s hard to remember what we’ve used for our security questions around the internet, so we should assume we’ve used our personal information somewhere. Your privacy settings on your account may be high, but social media is stored in an online database that has certainly been hacked more than once.

Other Options for Security Questions

It’s not likely that you’ll switch over to posting fake information to social media to avoid giving up your security question answers. However, you do have the option to make up fake answers to security questions on your accounts. But how do you remember your fake answers? What if you mess up the exact spelling? A lot of people use a paper notebook to keep track of passwords and security answers. If this is you, please stop. With this strategy, one spilled glass or stolen laptop bag creates a whole new disaster in your life. Instead, look into a free password keeper like LastPass where you can add extra notes to your entries and only have to remember one password. With ever-present malware key-stroke loggers hiding silently on many computers, typing in passwords and security question answers still hands the keys over to hackers.

Upgrading To Two Factor Authentication (2FA)

Two factor authentication (2FA) is one of the most popular alternatives to security questions. 2FA requires two steps to allow you account access. The first step is usually your account password. According to PC World,  “two-factor authentication is basically a combination of two of the following factors:

  • Something you know – such as your password.
  • Something you have – some options include getting a text on your phone, iCloud verification, email verification code, authentication app, or a physical security key.
  • Something you are – such as a fingerprint reader or retina/face scanner.

There are no specific regulations requiring a business to have or request security questions. However, there have been increasing regulations requiring the safe storage of a user’s personal identifying information, such as the data which can be gleaned from stored security question answers. With this in mind, it’s a no brainer to set up 2FA if it is offered by your vendor. If your vendor does not offer 2FA yet, let them know you want better security on your account.

If you enjoy social media, then keep an eye out for our upcoming blog article – How to Stop My Social Media Account From Being Hacked.

Social Media After Death

Social Media After Death

Social Media After DeathAs of this year, at least 2.34 billion people worldwide are social media users. In the United States alone, 79% of people have a social media profile. Something we don’t really think about when signing up for these accounts is what will happen to them when we pass away. Should we write your passwords down somewhere? Can someone gain access to them after we’re gone? What happens to your social media after death? It is reported that around 8,000 Facebook users die every day. It’s important that policies and protocols are put into place.

Facebook & Instagram

Facebook and Instagram are the only major social media platforms that “memorialize” your account.

Memorialized Facebook

With Facebook, you can set up a “legacy contact”. This is the person who will manage your account after you’re gone. To set up your legacy contact, go into your Facebook general settings and select Manage Account and choose the person to take this role. As seen in this screenshot, the person you choose to be your legacy contact will not be able to post as you or read your messages. If you don’t want to have a legacy contact, you can also request for your account to be deleted when the time comes. To request for an account to be memorialized, contact Facebook here.

Instagram does things a little bit different. There is no legacy contact that can manage your account for you when you die. Once a family or friend sends a report and the account is memorialized, it appears mostly the same. However, the account will not show up as a recommendation anywhere on the app (such as in the explore section). Nothing can be deleted or changed on the account after it is memorialized.

Other Platforms

For most other social media platforms (including Twitter), there are no memorialized profiles, therefore a family member has to request the removal of a deceased user’s account. In general, social media platforms will never give login details to anyone but the account owner, even immediate family members. This would violate most terms of service. If you want someone to have full access to your social media, it may be smart for you to put this in writing with something like a digital will. This will hand over ownership of your accounts after you pass away. This helps avoid violating any terms of service.

Computers and Devices

That great password you’ve set up on your computer or device to keep others out will do just that after your death. As a rule, device manufacturers will not grant access to others to get around your pass codes and passwords. Keep in mind many of your online accounts also have 2-factor authentication too. Banks and other service providers are happy to work with whoever holds your power of attorney posthumously, but email accounts and other online accounts will need to be accessed with the information you leave in your digital will.

Though it may be odd, it is important to have a plan for what happens to your social media and online accounts after death. Set up your legacy contact on Facebook today. Also, inform your friends and family by sharing this with them! Subscribe to our bi-weekly e-newsletter for more helpful information like this!

 

Business Social Media

Maintaining Your Company’s Social Media

Business Social Media

Being active on social media is almost required to run a successful business these days. We also know that it can be difficult to gain and maintain an active following. This is why it is extremely important to make sure you create and approach your social media accounts in a professional manner.

Creating Business Social Media Accounts

One of the most important things to do when creating profiles for your business is to use a business email address (for example: marketing@companyname.com). Do not allow an employee to use their own email when setting up social media accounts. We’ve seen companies let go of employees and lose access to accounts because they hadn’t been set up using a business-owned email address.

Employee retaliation can even result in the account being deleted with no option for recovery. This means you would lose access to the audience you worked so hard to build up. You’ll have to start all over which can be a large waste of time and money. Make sure to use a company email and keep track of your passwords!

Posting to Your Business Social Media

Nowadays, there are too many social media platforms to keep up with. It is time-consuming to jump from platform to platform and make individual posts. Thankfully, there are tools available which make this process much faster and easier. Using a program like Hootsuite helps by enabling you to schedule posts to almost any social media platform from one location, all at the same time. It will also allow you to schedule posts out for days when you aren’t going to be at the office. Scheduling ahead like this also gives you time to proof each post before it goes live. You can even send the draft around internally to get another set of eyes on it before any embarrassing mistakes go out to your audience. If Hootsuite isn’t your cup of tea, there are many other alternatives for you to choose from.

Having Social Media Guidelines

Making sure you have a company social media policy in place is important. Your social media policy should outline that an employee’s online activity reflects on the company and employee. It should remind employees of your company’s privacy and confidentiality rules. Setting rules in a policy ensure that nothing gets posted that shouldn’t. Your policy should educate and train your employees about using social media on behalf of the company while presenting a consistent corporate image. Keeping your posts on-brand and relevant will help them stand out from the crowd.

Conclusion

To maintain the security and longevity of your social media accounts, make sure they are created with company credentials. Use a scheduling program like Hootsuite to plan and proof posts before they go live. Lastly, have a clear social media policy in place to ensure the appropriateness of the content being posted. You can always call in a professional to handle your company’s social media. Appletree MediaWorks has an on-staff Social Media Specialist that is experienced in managing social media accounts for businesses like yours.

Get weekly tech tips and helpful products by subscribing to our bi-weekly newsletter for free (at the top of the article)!

Facebook login page

How Does Facebook Know Everything About Me?

You may have noticed Facebook and its subsidiaries (Instagram, Messenger, etc.) seem to know exactly what you’re thinking and saying. It’s almost like Facebook is listening in on our private lives. There are a few resources that Facebook uses to achieve this level of creepiness.

Facebook Has Its Sources

Privacy International conducted a report in December 2018 on apps that instantly send information to Facebook whether you’re logged in or even have an account at all. Research in the past has shown that up to 42.55% of free apps on the Google Play store alone share data with Facebook.

The report addresses how app developers use Facebook’s software development kit (SDK) to track and transmit your information to them. 34 apps, all with between 10 and 500 million installs each, were analyzed for this report. All were found to transmit data to Facebook. 61% of the apps send information as soon as they’re launched. This data is sent to Facebook along with a unique Google Advertising ID which can be used to link user behavior between different apps to build an in-depth profile. All of the info sent from the apps you use combined with your internet browsing habits can flesh out an extremely detailed profile.

Permission Granted

Let’s be honest, most of us have taken at least one of those “harmless” Facebook quizzes before. You see your friends and family sharing their results constantly. It plagues your time line. But is it just the results to the quiz that are being shared, strictly with friends? You would think so – and hope so.

NameTests is a huge Facebook quiz platform. It was found that up to 120 million people’s information was being exposed due to a security flaw. This was the case for years. Information like names, birth dates, photos, and statuses were all exposed. This flaw is demonstrated here. A random website linked to NameTests with an access token from Facebook would be able to pull information for up to two months, even after the user deleted NameTests from their profile.

Turn Off Facebook Permissions

To protect yourself as much as possible, it is probably smart to clean up your Facebook permissions periodically. This will help you know exactly what each app and game you use with Facebook has permission to do.

  1. Next to the notification and quick help button in the top right corner of Facebook, hit the dropdown and click Settings (second from the bottom).Click dropdown button
  2. On the sidebar to the left, the last section contains Apps and Websites, Instant Games, and Business Integration. Click on each and complete steps 3 and 4 for all of them.
    Look at enabled apps
  3. Go through all the apps and websites displayed and get rid of the ones you don’t use.Remove app
  4. Click View and edit to review what the apps you use have permission to do.View and edit permissions
    Edit current permissions

Another thing to look out for is permissions that mobile apps ask for. Most people don’t think twice before giving the OK to install an app on their phone. A lot of apps these days will randomly request access to your microphone, camera, contacts, and more when it’s not really necessary. Usually, you will be able to turn some of those permissions off. Google Play Store users have to be especially careful. This is because it is easier for a malicious app to get listed on Google’s Play Store than it is with Apple’s App Store.

Should You Leave Facebook?

With everything we’ve talked about here AND last year’s security fiasco, it is completely reasonable to contemplate this. Facebook has always been a fantastic tool for keeping in touch with friends and family. It’s useful when looking for old friends or trying to read the latest update from your favorite restaurant. Businesses can connect and networking has never been easier than it is now. The cons are the security risks. Can we trust Facebook to keep our information private? Can we trust Facebook to tell us when there is a security issue? For some people, these problems are huge. If you’re looking to leave Facebook, you have a couple of options.

How to Deactivate Your Facebook Profile

This option is for those who may contemplate returning to the site someday. Deactivating will hide your profile entirely, apart from your name in your friends’ friend lists and previous messages that you’ve sent to friends. You can reactivate just by logging back in.

To deactivate your account, click this link and select the FIRST option that says “Deactivate Account”. You’ll be prompted to type in your password to continue.

How to Delete Your Facebook Profile

Before you go through with deleting your account, you might want to download your information. There is no getting it back after you click that final button. Also, any apps or websites you log into with Facebook may also be deleted. Change your login information on those sites first, if possible.

When you’re ready to proceed, Click this link, and at the bottom, click Delete Account. Facebook gives you a few day grace period to log back in and cancel your deletion. After that, they say it can take up to 3 months to fully erase your information from Facebook servers, although you’re completely untraceable on the platform.

In the end, we can’t be sure exactly what is happening to our information beyond deletion since this only removes your data from Facebook’s servers and not 3rd parties which may have already saved it off site. The best thing to do is to be selective about what you share, what you download and what information you hand over to 3rd party websites and apps.

Google Plus Tombstone

Google Plus Will Soon Be Negative

Google Plus has remained unpopular since its start in 2011. After multiple security flaws, the social media platform is shutting down….for consumers at least.

Security ProblemsGoogle Plus Tombstone

In October, 2018, it was found that the information of over 500,000 accounts was made vulnerable to app developers, even though the information was marked as private. This included the names, email addresses, occupation, gender, and age of users. The bug went unnoticed for about three years. With that, Google claimed they found no proof that any developers misused the private information or even knew about the bug. Google then announced the initial plan to shut down Google Plus in August of 2019. Then in December of 2018, they announced that a software update done the previous month exposed the private information of users again. This time, 52.5 million users were affected. The bug was found in November of 2018 and fixed within a week. The shutdown of Google Plus for consumers moved up to April.

The Future of Google Plus?

Amid the shutdown of Plus, Google will be investing more into the enterprise version of the platform for corporate users. Google Plus will remain part of G Suite. G Suite is described by Google as a group of “intelligent apps that make working together easier, for faster decisions and better business results.” Google Plus will be a social network strictly for internal business, and it will be completely rebranded from before.

Save Your Data

If you are one of the few people who spends more than 5 seconds on the site (yes, really), although there is no rewinding its demise, there is a way to save your data. You can learn how to do that here. Make sure to jump on that before April 2nd, when Google begins deleting data.

Tips for Businesses on Google Plus

Some people may say it has been a good run for Google+. Others may say they still don’t know what it is. Either way, it’s time to say goodbye to this social media beast as it’s laid to rest for consumers.

Courts Challenge Internet Speech

Many people view the Internet as a vast playground where they are free to express their online speech without consequence. Recent legal trends, however, seem to be leading us down a different path. US Corporations have been coming down hard with litigation – and often winning – against individuals for offenses as seemingly harmless as writing negative reviews or downloading public information.

It has become more important than ever to track these cases and understand what can get you in trouble. We’ve been compiling a list of recent and classic cases regarding your online freedom of speech.

Sticks and Stucko

Since June, Zillow has been threatening to sue a blogger, McMansion Hell, for using some of its images for parody. The blog pokes fun at the poorly conceived architecture often featured throughout Zillow’s real estate listings. Although the blogger was not even badmouthing Zillow itself, the company still took offense, stating in an absurd cease-and-desist letter that the blog may interfere “with Zillow’s business expectations and interests.”

This is frighteningly broad language from a legal perspective. Must citizens consider the ‘business expectations and interests’ of any company they happen to discuss in public? Furthermore, the images technically fell under “fair use” because they were used for parody.

For now, this exchange has been limited to threatening letters, but keep an eye on this issue. Facebook, Instagram, and Twitter have made similar claims about their content. Several social media giants have even claimed that uploading content to their service transfers ownership to them.

Like It or Shut It

[pullquote align=”right”]…courts may interpret negative online reviews as full on defamation.[/pullquote]Another recent case began when it appeared that a wedding photographer was holding a customer’s photos hostage, pending payment of a disputed fee. Rather than paying the fee, the newlyweds took to social media and began publishing negative reviews about the photographer. In short, the bad reviews ruined the photographer’s reputation and she eventually had to close up shop.

The photographer then came back and sued the couple for publishing the negative reviews, stating that the reviews amounted to defamation. Sure enough, the court sided in the photographer’s favor and awarded more than $1 million in damages. This sets precedent going forward that courts may interpret negative online reviews as full on defamation.

Before you write that negative review, make sure to read through any contracts you may have signed with the company. Lately, vendors have been including verbiage in their contracts which waive your rights to write online reviews – good or bad. Specifically, keep an eye out for phrases such as “non-disparagement” or “agreement not to disparage.”

Really Silly Syndication

Generally, companies publish information on the web to spread the word – usually to as many people as possible. To this end, web gurus developed RSS (Really Simple Syndication) as a standard way of sharing information across websites. People can also subscribe to these feeds to receive updates. So what’s the problem with consuming all this free information? Generally, nothing – but if a company doesn’t like what you do with their information, they may have grounds to sue.

Take the 2011 California court case of Craigslist vs. 3Taps for example. In this case, 3Taps had been feeding publicly syndicated information from Craigslist to its own service. Craigslist decided that they didn’t like what 3Taps was doing with their information and blocked their IP addresses from accessing Craigslist. In response, 3Taps simply changed its IP addresses to get around the block. This eventually lead to a court ruling that changing your IP address in order to access a public website from which you had been blocked is illegal.

A similar court ruling determined that Power.com had violated an anti-hacking law when it changed its IP addresses in order to regain access to Facebook.

Don’t Scrape Me

Presently, a small company called hiQ is locked in a high-stakes battle over its practice of “scraping” information from LinkedIn. Scraping is a type of activity whereby bots gather and index large amounts of information for use elsewhere. Archive.org, for example, scrapes millions of pages of information from all around the web and indexes them for tomorrow’s nostalgia.

When LinkedIn sent hiQ a cease-and-desist letter warning that their behavior violated the Computer Fraud and Abuse Act (CFAA), a controversial 1986 law that makes computer hacking a crime, hiQ responded by suing LinkedIn.

This lawsuit could determine whether courts can use the CFAA to curtail the use of scraping tools across the web. The CFAA makes it a crime to “access a computer without authorization or exceed authorized access.” Courts have been struggling to figure out what this means ever since Congress passed it more than 30 years ago.

One plausible reading of the law – the one LinkedIn is advocating – is that once a website operator asks you to stop accessing its site, you are committing a crime if you don’t comply. The contrary interpretation is that by running a public website, a company is implicitly giving the general public authorization to access it and those permissions cannot be rescinded on a case-by-case basis. Both are plausible interpretations of the law, which makes this a very interesting case to track.

UPDATE: A judge ruled in hiQ’s favor, saying that LinkedIn cannot block the startup from accessing its public profile data. Furthermore, the judge ordered LinkedIn to quit blocking hiQ’s IP addresses. The fight isn’t over yet, however – LinkedIn plans to challenge the decision.

Social Media Copyright Issues: Fair Use or Infringement?

Social media copyright issues have become a hot topic in recent months. Nearly everyone has shared something on social media that was copyrighted by someone else. But what is fair to use on social media and what infringes on the rights of the copyright holder?

Is it fair use or infringement?

If you do not get a license from the copyright holder then the only way to use the content is through something called “fair use”.

What is fair use?

Generally, fair use covers any copyrighted material that was shared with a “transformative” purpose. This might constitute a comment, criticism, or parody accompanying material. Such sharing can take place without permission from the copyright owner.

Categories of Fair Use

  1. Commentary and Criticism – Commenting upon or critiquing copyrighted material. Examples include online reviews, news reports, education courses, or court case.
  2. Parody – A parody takes copyrighted material and ridicules it in a comedic way.

 

Fair Use Checklist

Not sure if you’re allowed to share something under “fair use”? Run it through this checklist to be sure before you post.

☐ Purpose and Nature of Use

The use of copyrighted material must be “transformative”. This means you took the time to add new meaning or value to the copyrighted material with new information, aesthetics, insights, or understandings.

Example of Fair Use: Google images – All Google images are copyrighted by the owner. Google’s use is considered “transformative” because it displays pictures in a different way, for a new purpose.
Example of Fair Use: Scary Movie Series – This movie series is a parody which borrows copyrighted material in order to ridicule it. Producers added value using new information, aesthetics, insights, and understandings.
Example of Infringement: Posting a copyrighted image on social media is for aesthetic or entertainment purposes. This is likely NOT a different use than the copyright holder intended and does not transform the work.

☐ Nature of the Work

Using copyrighted information has more leeway in fair use than copyrighted creative works. Also, there is more leeway in using published work rather than unpublished work.

☐ Amount and Substantiality of the Portion Used

Less is more. Meaning the less you use of the copyrighted material the more likely it will be considered fair use.

Exception: Using the most memorable (although small) part of a copyrighted work, such as the opening riff of “Sweet Child O’ Mine” by Guns N’ Roses.
Exception: Parodies – Quite a bit of a copyrighted material, even the heart of the material, can be used for parody. The Supreme Court acknowledges that “the heart is also what most readily conjures up the [original] for parody, and it is the heart at which parody takes aim,” as decided in Campbell v. Acuff-Rose Music,510 U.S. 569 (1994)

☐ Effect of Use Upon Market or Value

If you deprive the copyright holder income or undermine copyrighted work that could have potential market it is not fair use and you are most likely looking at a lawsuit. This holds true even if you are not using the copyrighted work directly.

Example of Infringement: An artist used a copyrighted photo to produce wood sculptures and earned a lot of money selling them. Even though the photographer did not plan on make sculptures it was considered a potential market and the court ruled in favor of the photographer.

[alertbox color=”blue”]MYTH
If you list a source, using copyrighted material is permissible.[/alertbox]

This is probably the most popular myth about copyrighted material. Even if you list your source, using copyrighted work without permission is still an infringement, especially if you are making income from it.

☐ Check Original Source

Sometimes the original source will have copyright notices. If you are unsure, be safe and obtain a license from the copyright holder.

terms and conditions☐ Check Social Media Terms and Conditions

When someone posts original work on social media, you should check the authorization to re-post, re-tweet, or re-pin that content. Read our blog article Social Media Content Rights for more detail.

Example: Pinterest’s term of service states that if a user posts content on Pinterest they are providing a license to all other users to use that content on Pinterest.

☐ Post a link instead of content

On social media, post a link to the original source of the material instead of the material itself. While this is still infringement, the chances of a complaint are much lower (especially since everyone does it). This does support a fair use defense.

☐ Keep Sharing Within Network

When you find content on social media you want to share, keep it within that network. Always read the terms and services before sharing.
[alertbox color=”blue”]

MYTH
Content posted on social media is fair game.

[/alertbox]

Some may think that if the content is on social media then it is fair game to use. This is not the case – the copyright still belongs to the copyright holder.

stolen copyrightYou can be held at fault for posting copyrighted material or even sharing something someone else posted that was copyrighted. This seems to happen so frequently on social media that the chances of litigation are low, but it’s still a risk.

U.S. Copyright Office Fair Use contains comprehensive information if you’d like additional information.

Facebook Business Tools

Facebook Tools for Your Business

phone facebookFacebook has made some updates that benefit small and medium sized businesses. These include improvements to the call-to-action button, new sections, and a soon to come new mobile layout. All of these improvements to Facebook can greatly improve your business if used correctly. They can cause more users to buy your products, download your games/apps, and general interest in your business which can bring more customers.

Call-To-Action Buttons

Facebook has made improvements to the call-to-action buttons. They  are much more prominent on your page and are displayed directly under the page cover photo. Some most popular options include ‘call now’, ‘send message’ and ‘contact us’. Here is a breakdown of more buttons:call to action

  • Book now – this can be helpful for any business that makes any sort of appointments such as hair stylists or hotels
  • Use app – this is a unique one for those that have a mobile app and may increase the downloads of your app
  • Play game – this is another unique one and is driven mostly for gaming businesses and can redirect the user to play a game demo or to the game online
  • Shop now – this is for any business that sells any products and redirects the user to your ecommerce website (Also see ‘shop’ section below to improve this feature)
  • Sign up – this can be used for any business that has an email subscription, or to sign up for the service such as Uber
  • Watch video – this can be used for any company that has a video about their business or maybe their products. It’s a good way to get users more interested in your business
  • Donate now – this is the most recent and is for non-profit organizations only

Send Messagemessage

Almost all the call-to-action buttons are pretty self-explanatory but the ‘send message’ button has to be used carefully. Once you have the ‘send message’ on your customers expect you to be responsive. Remember your goal is to have a high ‘Response Signal’ (more below). If you respond to 90 percent of messages within five minutes, you’ll earn a “Very Responsive to Messages” badge that tells page visitors that you can be reached effectively through messaging.

Once you know you are ready to be responsive to messages you get you need to know how to respond.

  • Don’t be a robot – In your response write to the customer as if you were talking to them and not a robot using an automatic response. This makes a more personal connection with your customer.
  • Short and informative not long and boring – There is not a limit of characters on Facebook messenger but you still should make it short and to the point. When using saved replies (more on this below) try to limit them to only frequently asked questions.
  • Use Private responses when necessary – There are new options to respond privately when including sensitive information such as billing questions, order statuses, and sensitive customer complaints.

New Sections

New sections on the business page include ‘shop’ and ‘services’.  The new ‘Shop’ section lets the business put their products on their page while the new ‘Service’ section lets the business list out services offered at the business.

Mobile Layout

A new mobile layout will make customers more easily find what they are looking for with your business by using tabs instead of endless scrolling should be coming out soon.

More Featuressend

More features include ‘Saved Replies’ and ‘Response Signals’.

The ‘Saved Replies’ lets a company save a response to a common question “like ‘What are your hours?’ or ‘Do you have a certain product in stock?’ so companies can pre-write those answers and respond more efficiently.” (CNBC)

The ‘Response Signals’ lets companies identify which pages are more responsive (live Mint).  This will show a response rate to the admin and show on the page if a high enough rate.