that that all your interactions -- including photos, videos, and comments -- are visible to everyone.
"Anyone online or offline, including people off of Rooms, may be able to see this information. When you join a room, your status as a member of the room may also be visible to other Rooms users, such as the moderator of the Room," the app says.
3. You can delete your content and account... sort of
If you confirmed your Rooms account, which entails entering a six-digit code, you can delete any content you posted in the past. To remove individual posts, visit the room, then tap the image, video, or note that you want to delete. Tap the icon with three dots at the top, then select Delete.
If you haven't confirmed your account, you can remove content you have shared in a Room only if you are logged in.
To delete your Rooms account, visit your Settings page and tap Delete Account. As with many mobile apps, however, your data might not actually disappear: The app says that while this action will remove all content you have shared on Rooms, it may save backup copies and logs "for a period of time" -- though did not disclose how long.
4. Rooms may share your data with other Facebook apps
Even though Facebook developed the Rooms app, it doesn't allow you to connect the two accounts. That doesn't mean, however, that your data stays only with the Rooms team.
"We may share information about you within the company and services operated by Facebook to understand and improve our services, but the information you share on Rooms will never be posted to your Facebook account, and the information you share on Facebook will never be posted to your Rooms account," the company said.
5. Rooms adheres to Facebook's policies
Rooms abides by the same Data Use Policy and Cookies Policy as Facebook, which means the app may track and store information about you in the same way that Facebook does.
Rooms hasn't disclosed exactly what information it collects or how it may use it, though it could include using your data to target advertising, for example, or your IP address and location information to suggest localized groups to join.
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data. In the Partners' Role In Perimeter Security report, we'll discuss concrete strategies such as setting standards that third-party providers must meet to keep your business, conducting in-depth risk assessments -- and ensuring that your network has controls in place to protect data in case these defenses fail (free registration required).