SlideShare a Scribd company logo
1 of 52
Policy Primer
NET 303
Davida Aerlic




                Tumblr
                 An overview: Terms of
                Service & Privacy Policy
When using   Tumblr…
“you are   consenting to
thecollection, transfer,
manipulation, storage,
disclosure and other
uses of yourinformation
(Tumblr, 2012).”
Tumblr is a free platform designed to
create and share text, images, audio and video
material.
So who   owns the content you
create on Tumblr?
intellectual
You own all
property rights to the
content you create and Tumblr
    third parties
and/or
retain ownership of
all intellectual property rights in all
material other than
yours (Tumblr, 2012).
A few other things to consider
when posting to Tumblr…
When you make something
publicly available on
the Internet, it becomes
practically IMPOSSIBLE
to take down all copies
of it.
Therefore, when posting you
should consider that all
publicly-posted
material will be available to
other Tumblr users
and users of other social
media sites and this material
can be distributed and
analysed via these sites.
(Tumblr, 2012)
Your   Tumblr
account could be

suspended
or

terminated
at anytime…
Tumblr retains the right to create
limits on and related to use of the services in its
sole discretion at any time with or without
notice. With new products, services, and
features launching all the time, they need the
flexibility to make changes, impose
limits, and occasionally suspend or terminate
certain offerings (like features that flop).
They can also suspend any individual
account at any time (Tumblr, 2012).
Does Tumblr inform
you when it changes it’s
Terms of Service?
Tumblr can modify its Terms
of Service at any time by
posting a revision
through the website and by
providing notice to you
usually via email.
Registration, Tumblr
URLs, and Security
“One of the great features of Tumblr's
products is customizability, and bloggers
have a lot of flexibility in how their blogs
behave. When you visit a blog in our
network, that blog may collect more
information than we do, and may provide
information to third parties that we have
no relationship with, including to
advertisers (Tumblr, 2012)”
Does Tumblr collect
 information from my

       blog?
“One of the great features of Tumblr's
products is customizability, and bloggers have
a lot of flexibility in how their blogs behave.
When you visit a blog in our network, that
blog may collect more information than we
do, and may provide information to third
parties that we have no relationship with,
including to advertisers (Tumblr, 2012)”
What Information does

Tumblr Collect and
How Do They Use It?
Who Does   Tumblr
Share Your
Information with?
Tumblr never shares
information from
you unless…
they have your
permission to
share that
information
Or they have given
you prior notice
that the information
will be shared
Or that information
that does not
identify you
Is Your Information Secure?
Basically your information is as secure
as you make it.
To prevent unauthorized access to
your Tumblr account select and protect
your password appropriately and limit
access to your computer and browser.
And don’t forget to sign out after
you’ve finished using Tumblr’s services.
Can the   Privacy Policy
be   changed at any time like
Terms of Service?
Tumblr can amend their
Privacy Policy
from time to time, using
the process for
modifications
set forth in our Terms of
Service.
The use of information

they   collect now is
subject to the Privacy
Policy in effect at the
time such information is
used (Tumblr, 2012).
Important privacy point
In some cases      Tumblr
collects information about
content you provide to
the services.

For instance, the mobile
device you use and your
phone number might be
collected to improve
services. However, you will
have a choice      as to
whether this information is
collected and store
(Tumblr, 2012).
Also in some cases Tumblr
may choose to buy or   sell
business assets.
In these transactions, user
information is
typically one of the
transferred business
assets (Tumblr, 2012).
Furthermore, if Tumblr’s
assets, were

acquired, or if they
were to go out of
business or enter
bankruptcy, user
information would
be one of the assets that is
transferred or acquired by a

third party(Tumblr,
2012).
It is important for
users to know that such
transfers may occur,
and that any acquirer of
us or our assets may
continue to use your
Personal
Information as set
forth in this policy
(Tumblr, 2012).
A company you may not know
could end up with your Tumblr
information.


How does that   make you feel?
“The real privacy
concerns arise when users
allow people they do not
know and normally
would not trust
to have access to the
personally identifiable
information they have
made available.
(Goettke and Christiana,
2007). “
How   young is too
young for   Tumblr?
You have to be at least
13 years old to
use Tumblr as
Tumblr is based on
U.S. federal and state
legislation.
Deleted your Tumblr
account…. But what happens to the
information shared across
Tumblr blogs?
“Deleting your Account may not fully remove the content you have
published from our systems, as caching of, backups of, copies of,
or references to your Account information may not be
immediately removed (Tumblr, 2012).”

“In addition, given the nature of sharing on the Services,
some of the public activity on your Account prior to deletion (such as
Re-blogs of your blog posts) may remain stored on our servers and
accessible to the public (Tumblr, 2012).”
A few   more interesting   facts

about   Tumblr…
Community   Guidelines




                   As a global platform for creativity and self-
                   expression, Tumblr is deeply committed to supporting
                   and protecting freedom of speech.


                   Tumblr also celebrates creativity so FEEL FREE to express
                   yourself freely and to reflect who you are, and what you
                   love, think, witness, and believe (Tumblr, 2012).
“Unlike democracies, which enable citizens to
express political opposition through the
voting booth, non-democratic regimes
provide little or no formal outlets for political
dissent. In the absence of these formal
outlets, actors that oppose specific policies or
entire regimes must express their opposition
via extra-legal means directed at state
authority (Mclaughlin, 2003).”
However   Tumblr is not for…




                               Malicious bigotry, harm to minors,
                               promotion and glorification of self-harm, gore

                               and  mutilation content, sexually
                               explicit videos, non-genuine social

                               gesture schemes, username and URL
                               abuse, spam
or…




      Mass registration and
      automation, unauthorized contests,
      sweepstakes, or giveaways, third-party

      theme distribution, copyright and

      trademark infringement
or…




      impersonation, stalking, or
              privacy
      harassment,

      violations, and resource abuse,
      unlawful uses and content
“Though they are intended to
positively contribute to
society, negative aspects
invariably surface as by-
products of the development of
new technologies such
as these (Patchin and Hinduja,
2006).”
Termination and Deletion
On termination of your Account
or upon your deletion of
particular pieces of Subscriber
Content from the Services, Tumblr shall
make reasonable efforts to make such
Subscriber Content inaccessible
and cease use of it; however,
you acknowledge and agree that:
caching of, copies of, or
references to the users
content may not be
immediately removed;
such   removed      content
may persist in backups
(not available to others) for a
reasonable period
of time; and
such removed content may
be available (and stored on
our servers) through the
accounts of other users
because of re-blogging
(Tumblr, 2012).
“Censorship is the moral or
legislative process by
which society “agrees” to limit
what an individual can do, say,
think, or see. All societies
have forms of censorship,
effective only with sufficient
threat and severity
of punishment for violating the
censorship rule (Depken, 2006).”
References
Patchin, J., & Hinduja, S. (2006). Bullies Move Beyond the Schoolyard. Youth Violence and Juvenile Justice,
4(2). Retrieved from: Curtin Library Database

Depken, C. (2006). Who Supports Internet Censorship? First Monday, 11(9).
Retrieved from: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1390/1308

Tumblr. 2012. Terms of Service. Retrieved from: http://www.tumblr.com/policy/en/terms_of_service

Tumblr. 2012. Privacy Policy. Retrieved from: http://www.tumblr.com/policy/en/privacy

Tumblr. 2012. Community Guidelines. Retrieved from: http://www.tumblr.com/policy/en/community

Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science
199r: Special Topics in Computer Science Computation and Society: Privacy and Technology. Retrieved
from: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf

Laughlin, S. (2003). The use of Internet for political action by non-state dissident actors in Middle East.
Retrieved from: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1096/1016

More Related Content

Similar to Policy Primer-Davida Aerlic

Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationKenneth Ronkowitz
 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.BarkerCurtin2013
 
Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primerjustbecos
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2Nick Buonvicino
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacySolomben
 
Fireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire SafetyFireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire SafetyHolly Vega
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...CanadaHelps / MyCharityConnects
 
Online policy primer
Online policy primerOnline policy primer
Online policy primer15807539
 
What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?abdullasshalhabsi
 
Designing Communities101507 1192637120231725 1
Designing Communities101507 1192637120231725 1Designing Communities101507 1192637120231725 1
Designing Communities101507 1192637120231725 1tobyo_init
 
The Use of Social Media in Strata Complexes
The Use of Social Media in Strata ComplexesThe Use of Social Media in Strata Complexes
The Use of Social Media in Strata ComplexesTEYS Lawyers
 
Designing Communities101507
Designing Communities101507Designing Communities101507
Designing Communities101507Christina Wodtke
 

Similar to Policy Primer-Davida Aerlic (20)

Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
 
Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primer
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Fireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire SafetyFireman Thank You.Pdf - Google Drive Fire Safety
Fireman Thank You.Pdf - Google Drive Fire Safety
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
Lorraine Fleck - An Ounce of Prevention is Worth a Pound of Cure: Key Element...
 
Online policy primer
Online policy primerOnline policy primer
Online policy primer
 
What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?
 
Ethics By ZAK
Ethics By ZAKEthics By ZAK
Ethics By ZAK
 
Social Media and The Law
Social Media and The LawSocial Media and The Law
Social Media and The Law
 
Designing Communities101507 1192637120231725 1
Designing Communities101507 1192637120231725 1Designing Communities101507 1192637120231725 1
Designing Communities101507 1192637120231725 1
 
The Use of Social Media in Strata Complexes
The Use of Social Media in Strata ComplexesThe Use of Social Media in Strata Complexes
The Use of Social Media in Strata Complexes
 
Designing Communities101507
Designing Communities101507Designing Communities101507
Designing Communities101507
 

Policy Primer-Davida Aerlic

  • 1. Policy Primer NET 303 Davida Aerlic Tumblr An overview: Terms of Service & Privacy Policy
  • 2. When using Tumblr…
  • 3. “you are consenting to thecollection, transfer, manipulation, storage, disclosure and other uses of yourinformation (Tumblr, 2012).”
  • 4. Tumblr is a free platform designed to create and share text, images, audio and video material.
  • 5. So who owns the content you create on Tumblr?
  • 6. intellectual You own all property rights to the content you create and Tumblr third parties and/or retain ownership of all intellectual property rights in all material other than yours (Tumblr, 2012).
  • 7. A few other things to consider when posting to Tumblr…
  • 8. When you make something publicly available on the Internet, it becomes practically IMPOSSIBLE to take down all copies of it.
  • 9. Therefore, when posting you should consider that all publicly-posted material will be available to other Tumblr users and users of other social media sites and this material can be distributed and analysed via these sites. (Tumblr, 2012)
  • 10. Your Tumblr account could be suspended or terminated at anytime…
  • 11. Tumblr retains the right to create limits on and related to use of the services in its sole discretion at any time with or without notice. With new products, services, and features launching all the time, they need the flexibility to make changes, impose limits, and occasionally suspend or terminate certain offerings (like features that flop). They can also suspend any individual account at any time (Tumblr, 2012).
  • 12. Does Tumblr inform you when it changes it’s Terms of Service?
  • 13. Tumblr can modify its Terms of Service at any time by posting a revision through the website and by providing notice to you usually via email.
  • 15. “One of the great features of Tumblr's products is customizability, and bloggers have a lot of flexibility in how their blogs behave. When you visit a blog in our network, that blog may collect more information than we do, and may provide information to third parties that we have no relationship with, including to advertisers (Tumblr, 2012)”
  • 16. Does Tumblr collect information from my blog?
  • 17. “One of the great features of Tumblr's products is customizability, and bloggers have a lot of flexibility in how their blogs behave. When you visit a blog in our network, that blog may collect more information than we do, and may provide information to third parties that we have no relationship with, including to advertisers (Tumblr, 2012)”
  • 18. What Information does Tumblr Collect and How Do They Use It?
  • 19. Who Does Tumblr Share Your Information with?
  • 20. Tumblr never shares information from you unless…
  • 21. they have your permission to share that information
  • 22. Or they have given you prior notice that the information will be shared
  • 23. Or that information that does not identify you
  • 25. Basically your information is as secure as you make it. To prevent unauthorized access to your Tumblr account select and protect your password appropriately and limit access to your computer and browser. And don’t forget to sign out after you’ve finished using Tumblr’s services.
  • 26. Can the Privacy Policy be changed at any time like Terms of Service?
  • 27. Tumblr can amend their Privacy Policy from time to time, using the process for modifications set forth in our Terms of Service. The use of information they collect now is subject to the Privacy Policy in effect at the time such information is used (Tumblr, 2012).
  • 29. In some cases Tumblr collects information about content you provide to the services. For instance, the mobile device you use and your phone number might be collected to improve services. However, you will have a choice as to whether this information is collected and store (Tumblr, 2012).
  • 30. Also in some cases Tumblr may choose to buy or sell business assets. In these transactions, user information is typically one of the transferred business assets (Tumblr, 2012).
  • 31. Furthermore, if Tumblr’s assets, were acquired, or if they were to go out of business or enter bankruptcy, user information would be one of the assets that is transferred or acquired by a third party(Tumblr, 2012).
  • 32. It is important for users to know that such transfers may occur, and that any acquirer of us or our assets may continue to use your Personal Information as set forth in this policy (Tumblr, 2012).
  • 33. A company you may not know could end up with your Tumblr information. How does that make you feel?
  • 34. “The real privacy concerns arise when users allow people they do not know and normally would not trust to have access to the personally identifiable information they have made available. (Goettke and Christiana, 2007). “
  • 35. How young is too young for Tumblr?
  • 36. You have to be at least 13 years old to use Tumblr as Tumblr is based on U.S. federal and state legislation.
  • 37. Deleted your Tumblr account…. But what happens to the information shared across Tumblr blogs?
  • 38. “Deleting your Account may not fully remove the content you have published from our systems, as caching of, backups of, copies of, or references to your Account information may not be immediately removed (Tumblr, 2012).” “In addition, given the nature of sharing on the Services, some of the public activity on your Account prior to deletion (such as Re-blogs of your blog posts) may remain stored on our servers and accessible to the public (Tumblr, 2012).”
  • 39. A few more interesting facts about Tumblr…
  • 40. Community Guidelines As a global platform for creativity and self- expression, Tumblr is deeply committed to supporting and protecting freedom of speech. Tumblr also celebrates creativity so FEEL FREE to express yourself freely and to reflect who you are, and what you love, think, witness, and believe (Tumblr, 2012).
  • 41. “Unlike democracies, which enable citizens to express political opposition through the voting booth, non-democratic regimes provide little or no formal outlets for political dissent. In the absence of these formal outlets, actors that oppose specific policies or entire regimes must express their opposition via extra-legal means directed at state authority (Mclaughlin, 2003).”
  • 42. However Tumblr is not for… Malicious bigotry, harm to minors, promotion and glorification of self-harm, gore and mutilation content, sexually explicit videos, non-genuine social gesture schemes, username and URL abuse, spam
  • 43. or… Mass registration and automation, unauthorized contests, sweepstakes, or giveaways, third-party theme distribution, copyright and trademark infringement
  • 44. or… impersonation, stalking, or privacy harassment, violations, and resource abuse, unlawful uses and content
  • 45. “Though they are intended to positively contribute to society, negative aspects invariably surface as by- products of the development of new technologies such as these (Patchin and Hinduja, 2006).”
  • 47. On termination of your Account or upon your deletion of particular pieces of Subscriber Content from the Services, Tumblr shall make reasonable efforts to make such Subscriber Content inaccessible and cease use of it; however, you acknowledge and agree that:
  • 48. caching of, copies of, or references to the users content may not be immediately removed;
  • 49. such removed content may persist in backups (not available to others) for a reasonable period of time; and
  • 50. such removed content may be available (and stored on our servers) through the accounts of other users because of re-blogging (Tumblr, 2012).
  • 51. “Censorship is the moral or legislative process by which society “agrees” to limit what an individual can do, say, think, or see. All societies have forms of censorship, effective only with sufficient threat and severity of punishment for violating the censorship rule (Depken, 2006).”
  • 52. References Patchin, J., & Hinduja, S. (2006). Bullies Move Beyond the Schoolyard. Youth Violence and Juvenile Justice, 4(2). Retrieved from: Curtin Library Database Depken, C. (2006). Who Supports Internet Censorship? First Monday, 11(9). Retrieved from: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1390/1308 Tumblr. 2012. Terms of Service. Retrieved from: http://www.tumblr.com/policy/en/terms_of_service Tumblr. 2012. Privacy Policy. Retrieved from: http://www.tumblr.com/policy/en/privacy Tumblr. 2012. Community Guidelines. Retrieved from: http://www.tumblr.com/policy/en/community Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in Computer Science Computation and Society: Privacy and Technology. Retrieved from: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf Laughlin, S. (2003). The use of Internet for political action by non-state dissident actors in Middle East. Retrieved from: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1096/1016