SlideShare a Scribd company logo
1 of 36
Download to read offline
Policy Primer 
By Alan Hall 
NET 303 Internet Politics and Power ā€“Curtin University. 
This work is made available under a Creative Commons Licence CC BY-SA 
Terms of Service
This page (one of two) intentionally left blank (to accommodate clickable links)
This page (two of two) intentionally left blank (to accommodate clickable links)
Tumblris a ā€œfree blogging platform and hosting service ā€¦ā€ (Duffy, 2011, review, para. 1) that claims to ā€œlet you share anythingā€ (Tumblr, 2014a), and in any format that you would like. 
In fact, users post, and create content that caters to a wide variety of audiences. 
Topics that can be found on Tumblr include, but are not limited to ā€¦ 
Image source: 
CC0 Public Domain. 
Unsplash(2014). 
Alan Hall
TRAVEL 
Image source: 
ā€œTravelā€ (Tumblr, 2014b). 
Alan Hall
FOOD 
Image source: 
ā€œFoodā€ (Tumblr, 2014c). 
Alan Hall
HOBBIES 
Image source: 
ā€œHobbiesā€ (Tumblr, 2014d). 
Alan Hall
FANDOM 
Image source: 
ā€œFandomā€ (Tumblr, 2014e). 
Alan Hall
ADULT 
Image source: 
OpenClips(2013a). 
Not Suitable for Work (NSFW) 
CC0 Public Domain. 
Alan Hall
In fact, there exists over 200 million blogs and 90 billion posts on Tumblr(Tumblr, 2014a). 
Now, thatā€™s a lot of content people are sharing on Tumblr. 
I wonder if they have all read and understood Tumblrā€™s ā€˜terms of serviceā€™, ā€˜community guidelinesā€™, and ā€˜privacy policyā€™, that they agreed to so that they can use the service? 
Image source: 
Stuart Frisby(2008). 
Image source: 
CC0 Public Domain. 
geralt(2014a). 
Alan Hall
Image source: 
CC0 Public Domain. 
geralt(2014b). 
Alan Hall
Tumblr states that it only takes 30 seconds to join (Tumblr, 2014f), yet this is only possible if the registrant does not read the policies. 
Becauseā€¦chances are many have not, and without reading the terms of service they cannot be aware of what their rights and responsibilities are, or how their personal data may be used or acquired. 
YOU SEE ā€¦ 
ā€¦ and given that the average person has a reading speed of 200-250 words per minute (ExecuRead, n.d.), and with all three policy documents totalling close to 11,000 words, it would take the average person ā€¦ 
Alan Hall 
Image source: 
CC0 Public Domain. 
30754(2013).
and this is without any further analyses of definitions or terms, or even consultation of the Digital Millennium Copyright Act to understand what it means for them. 
Alan Hall 
Image source: 
CC0 Public Domain. 
Monelgonel(2014). 
45-55 minutes to read ā€¦ 
It is the length and ubiquity of these policy documents online that cause many people to fling their arms up in despair and rationalise that the possible ramifications of interacting with the site without reading the policies is worth the risk for the time that it saves (McDonald & Cranor, 2008) .
ā€œWe estimate that reading privacy policies carries costs in time of approximately 201 hours per year ā€¦ [per person]ā€ (McDonald & Cranor, 2008, p. 565) . 
Alan Hall
It is the purpose of this policy primer to highlight a few key points regarding the use of Tumblr, with a focus on: 
ā€¢ 
Privacy 
ā€¢ 
Freedom of Expression 
ā€¢ 
Copyright 
Alan Hall
ā€¢ 
Therefore, to register you must be at least 13 years of age (Tumblr, 2014g). 
Since Tumblr is based in the United Statesā€¦ 
ā€¢ 
It is subject to ā€œU.S. laws and jurisdiction ā€¦ā€(Tumblr, 2014g). 
Alan Hall 
ā€¢ 
If you are over 13 years of age, then you can only register if you are not legally prevented from doing so (Tumblr, 2014g). 
CC0 Public Domain. 
Bykst(2014). 
AND 
Image source:
Alan Hall 
And when you register you are required to provide Tumblr withā€¦ 
ā€¢ 
Your first and last name, age, and email address. The information must be accurate, complete, and kept updated during your use of the service (Tumblr, 2014g). 
This information requirement may appear negligible, but DID YOU KNOW that Tumblr access and collate data about you through other means: 
For example, if you connect your account to a social networking site such as Facebook, Tumblr may get access to all of your personal data that you have made available within that particular network? 
CC0 Public Domain. 
geralt(2013). 
Image source:
Furthermore to use Tumblr, you must allow them to install cookieson your computer, that is, text-files that will enable them to monitor your online behaviour (Chaffey & Ellis-Chadwick, 2012, p. 653) 
These services include, but are not limited to Google Analytics and Yahoo Web Analytics which may also put their own cookies onto your computer to collate data (Tumblr, 2014h). 
CC0 Public Domain. 
Image source: Nemo(2014a). 
Alan Hall 
ā€¦ and ā€œIf you disable cookies, you wonā€™t be able to log into your Account, and so wonā€™t be able to use the vast majority of our servicesā€ (Tumblr, 2014h).
Whilst cookies do have a positive benefit, such as recognising a visitor and providing a personally tailored experience, the data can also be easily obtained by anyone who knows how to access the cookie text file on a computer hard drive ( Hormozi, 2005, p. 7) which puts personal data at risk. 
The vagueness of which services in fact will place cookies is deeply concerning, because one cannot be sure of who is monitoring their online activities, what personal data is being collected, and how their data is being used. Additionally, as these cookies are not subject to Tumblrā€™s Privacy Policy a user is inadequately informed to effectively manage their privacy. 
Alan Hall 
CC0 Public Domain. 
Image source: OpenClips(2013b).
Alan Hall 
Tumblr states that this is to improve the overall service experience for the user (Tumblr, 2014h), but the user is not provided with an option to opt-outof such data aggregation. 
Instead a user is forcedto either accept the data aggregation, or not use the service. 
It is this lack of powerthat a user has to control their personal data that is unsettling. 
CC0 Public Domain. 
Image source: parameciorecords(2014). 
Tumblr also acquires data relating to your web browser, your mobile phone if you access Tumblr with it, IP address that displays your approximate geographic location, and information that is attached to images such as EXIF content, and may share this information with third-parties (Tumblr, 2014h).
And should your data be compromised due to occurrences such as an error on their end, hardware failure, or the server is hacked then Tumblr restricts their liability to the greater of $100 or the cost of your subscription (Tumblr, 2014g). 
So, the value of your personal data being released to the world for which you have little control is $100, no matter how damaging such a release of information may be personally. 
CC0 Public Domain. 
Image source: PublicDomainPictures(2012). 
Alan Hall 
Because ā€¦ 
Tumblr make no mention as to how they protect user data, only that they take security seriously; but this does not allow a user to make an informed decision about the appropriateness of the security precautions (if any) in place to protect your data.
Alan Hall 
Furthermore and perhaps most importantly ā€¦ 
Tumblr ā€œā€¦ reserve the right to access, preserve, and disclose any information [about a user] that they believe is necessary, in [their] sole discretionā€ (Tumblr, 2014h) to anyone, government, legal and corporate under the guise of their protection and the protection of others. 
The Organisation for Economic Co-operation and Development (2011, p. 103) classify such monitoring as a violation of user right[s] and is a threat to Internet freedom. 
This monitoring standard displays a lack of transparency and accountability that can result in self- censorship. 
CC0 Public Domain. 
Image source: geralt(2014c).
ā€¢ 
Malicious Speech. 
ā€¢ 
Harm to minors. 
ā€¢ 
Promotion or Glorification of Self-Harm. 
ā€¢ 
Gore, Mutilation, Bestiality, or Necrophilia. 
ā€¢ 
UnflaggedNSFW Blogs. 
ā€¢ 
Unflaggedsexually Explicit Video. 
ā€¢ 
Non-Genuine Social Gesture Schemes. 
ā€¢ 
Deceptive or Fraudulent Links. 
ā€¢ 
Misattribution or Non-Attribution. 
ā€¢ 
Username/URL Abuse or Squatting. 
ā€¢ 
Spam. 
ā€¢ 
Mass Registration or Automation. 
ā€¢ 
Unauthorized Contests, Sweepstakes, or Giveaways. 
ā€¢ 
Themes Distributed by Third Parties 
ā€¢ 
Copyright or Trademark Infringement. 
ā€¢ 
Confusion or Impersonation. 
ā€¢ 
Harassment. 
ā€¢ 
Privacy Violations. 
ā€¢ 
Disruptions, Exploits, or Resource Abuse. 
ā€¢ 
Unlawful Uses or content. 
Alan Hall 
Tumblr encourage freedom of expression 
But donā€™t engage in: 
Source: Tumblr (2014i)
Itā€™s enough to make your head spin. 
Alan Hall 
Letā€™s take a closer look at the restrictions regarding ā€˜Harm to Minorsā€™; 
Harm to Minors. ā€œDonā€™t post ā€¦ anything relating to minors that is sexually suggestive or violentā€ (Tumblr, 2014i). 
Superficially, the meaning of this statement may appear straightforward. But it in fact involves a broad categorisation. For we may ask, what about Tumblr Fandom groups built around Manga comics such as ā€˜Sundomeā€™ that has sexualised images of schoolgirls? Or gifs such as those from the cartoon series ā€˜South Parkā€™, where the child characters also have a propensity to elicit sexual displays as well as violence? 
Technically, these would fail the Tumblr guidelines, yet due to them being on Tumblr it then leads to confusion of what is or isnā€™t allowed. 
CC0 Public Domain. 
Image source: Nemo(2012a).
Alan Hall 
Tumblr ā€œā€¦ reserve the right to enforce, or not enforce, [their] guidelines ā€¦ā€ (Tumblr, 2014i). 
IN FACT 
AND 
ā€œā€¦ suspend accounts, or remove content, without notice, for any reason ā€¦ā€(Tumblr, 2014i) .
For example, given that Tumblr are owned by Yahoo!, a potential conflict of interest may arise between what is allowed to remain on the site and what isnā€™t. Blogs that are, for example, critical of Yahoo! could be removed without notice which then encroaches upon freedom of expression rights (Brown, 2007, p. 8). 
Alan Hall 
WHICH RAISES 
ā€¦ significant concerns over transparency and accountability issues when removal of content is conducted in secrecy (Villeneuve, 2006 Introduction, para. 8) 
CC0 Public Domain. 
Image source: Fuzz(2014). 
The ā€œā€¦ Terms of Service contracts effectively shield the government [and others] from constitutional scrutiny of [their] take-down requestā€ (Fradette, 2013, p. 949)
For copyright protection, Tumblr enforces the Digital MilleniumCopyright Act (DCMA). 
Alan Hall 
NOW LETā€™S LOOK AT COPYRIGHT 
Should an entity, government, corporate or private, notify them that content breaches copyright, then Tumblr will remove it immediately(Tumblr, 2014g). 
CC0 Public Domain. 
Image source: Nemo(2012b).
This is regardless of whether such content does in fact breach copyright! 
Alan Hall
There have been a number of cases in the past whereby content creators have had their works unfairly claimed under the DMCA on the Web. 
Such examples include: 
Warner Brothers automatically issuing takedown notices without review of content, which in many cases turned out not to in fact be Warner Brothers content (Electronic Frontier Foundation, 2012). 
Or the case of the ā€¦ 
Music Publishers Association demanding web host ā€˜Go Daddyā€™ to remove a website that hosted Public Domain content, of which ā€˜Go Daddyā€™ obliged (Wilson, 2011). 
Alan Hall 
PLEASE EXPLAIN
Alan Hall 
AND THIS IS CONCERNING 
Because people are presumed guilty before innocentwith ā€œā€¦ no due process of law [to] protect [them] before they are disconnected or their sites are blockedā€ (Berners-Lee, 2010, p. 85). 
If people want to challenge the take-down request then the complainant gets given first right to decide if your content should be re-instated, and if unsuccessful the only avenue that remains is legal action, which is costly in both time and money for the average person (Tumblr, 2014g). 
CC0 Public Domain. 
Image source: Nemo(2014b).
Alan Hall 
THE NET RESULT IS ā€¦ 
Free Speech that is 
(Von Lohmann, 2010, p. 2) 
CC0 Public Domain. 
ā€˜Chilledā€™ Image: Alan Hall (2014).
Alan Hall 
IN CLOSINGā€¦ 
By accepting Tumblrā€™s ā€˜Terms of Serviceā€™, Tumblr (and others) will monitor your online activities and build a unique profile on you that may be shared with others at their sole discretion. 
Your content may be removed for any reason, without notification which has the potential to limit freedom of expression, and be abused by Tumblr and others for their own motives.
References 
30754. (2013). glasses-reader-frames-optical-143762 [Image]. Retrieved http://pixabay.com/en/glasses-reader-frames-optical-143762 
Berners-Lee, T. (2010, December). Long Live the Web. Scientific American. Retrieved from http://jblomo.github.io/webarch253/slides/Long_Live_the_Web.pdf 
Brown, I. (2007). Internet censorship: be careful what you ask for. In S. Kirca, & L. Hanson (Eds.), Freedom and Prejudice: Approaches to Media and Culture(pp. 74-91). 
Instanbul: BahcesehirUniversity Press. 
bykst. (2014). judge-flag-justice-law-adler-317290 [Image]. Retrieved from http://pixabay.com/en/judge-flag-justice-law-adler-317290 
Chaffey, D., & Ellis-Chadwick, F. (2012). Digital Marketing: Strategy, Implementation and Practice. Harlow, ES: Pearson. 
Duffy, J. (2011, June 14). Tumblr. Retrieved from http://www.pcmag.com/article2/0%2c2817%2c2195458%2c00.asp 
Electronic Frontier Foundation. (2012). EFF Calls Foul on Robo-Takedowns. Retrieved from https://www.eff.org/press/releases/eff-calls-foul-robo-takedowns 
ExecuRead. (n.d.). Speed Reading Facts. Retrieved from http://www.execuread.com/facts 
Fradette, J. (2013). Online terms of service: a shield for First Amendment scrutiny of government action. Notre Dame Law Review, 89(2), 947-984. Retrieved from 
http://home.heinonline.org 
Frisby, S. (2008). tumblr.com/share as a fluid application [Image]. Retrieved from https://www.flickr.com/photos/36-degrees 
Fuzz. (2014). monkey-sculpture-carving-speaking-236861 [Image]. Retrieved from http://pixabay.com/en/monkey-sculpture-carving-speaking-236861 
geralt. (2014a). question-mark-punctuation-marks-358177 [Image]. Retrieved from http://pixabay.com/en/question-mark-punctuation-marks-358177 
Alan Hall
Alan Hall 
geralt. (2014b). why-question-gorilla-monkey-234596 [Image]. Retrieved from http://pixabay.com/en/why-question-gorilla-monkey-234596 
geralt. (2014c). monitor-man-men-shaking-hands-376211 [Image]. Retrieved from http://pixabay.com/en/monitor-man-men-shaking-hands-376211 
geralt(2013). woman-stylish-at-internet-network-163426 [Image]. Retrieved from http://pixabay.com/en/woman-stylish-at-internet-network-163426 
Hormozi, A. M. (2005). Cookies and Privacy. EDPACS, 32(9), 1-13. Retrieved from http://www.proquest.com 
McDonald, A. M., & Cranor, L. F. (2008). The Cost of Reading Privacy Policies. I/S (Online): a journal of law and policy for the information society, 4(3), 543-568. Retrieved from http://www.heinonline.org 
Monelgonel. (2014). justice-scales-balance-lawyer-423446 [Image]. Retrieved from http://pixabay.com/en/justice-scales-balance-lawyer-423446 
Nemo. (2014a). cookie-chocolate-chip-blurred-307960 [Image]. Retrieved from http://pixabay.com/en/cookie-chocolate-chip-blurred-307960 
Nemo. (2014b). law-justice-justizia-blind-scale-311363 [Image]. Retrieved from http://pixabay.com/en/law-justice-justizia-blind-scale-311363 
Nemo. (2012a). head-paper-reading-bug-insect-46204 [Image]. Retrieved from http://pixabay.com/en/head-paper-reading-bug-insect-46204 
Nemo. (2012b). copyright-symbol-intellectual-30343 [Image]. Retrieved from http://pixabay.com/en/copyright-symbol-intellectual-30343 
OpenClips. (2013a). silhouette-human-woman-sex-sexy-147166 [Image]. Retrieved from http://pixabay.com/en/silhouette-human-woman-sex-sexy-147166 
OpenClips. (2013b). hal-9000-camera-optical-computer-157883 [Image]. Retrieved from http://pixabay.com/en/hal-9000-camera-optical-computer-157883 
Organisation for Economic Co-operation and Development. (2011). The Role of Internet Intermediaries in Advancing Public Policy Objectives. http://dx.doi.org/10.1787/9789264115644-en 
parameciorecords. (2014). anonymous-mask-bogotĆ”-protest-275868 [Image]. Retrieved from http://pixabay.com/en/anonymous-mask-bogot%C3%A1-protest-275868 
PublicDomainPictures. (2012). dollar-100-dollars-money-currency-15328 [Image]. Retrieved from http://pixabay.com/en/dollar-100-dollars-money-currency-15328 
Tumblr.(2014a).About.Retrievedfrom https://www.tumblr.com/about 
Tumblr. (2014b). Travel [Image]. Retrieved from https://www.tumblr.com/search/Travel 
Tumblr. (2014c). Food [Image]. Retrieved from https://www.tumblr.com/search/Food
Alan Hall 
Tumblr. (2014d). Hobbies [Image]. Retrieved from https://www.tumblr.com/search/Hobbies 
Tumblr. (2014e). Fandom [Image]. Retrieved from https://www.tumblr.com/search/Fandom 
Tumblr.(2014f).Tumblr.Retrievedfrom https://www.tumblr.com 
Tumblr. (2014g). Terms of Service: Last Modified: 2014-01-27. Retrieved from https://www.tumblr.com/policy/en/terms-of-service 
Tumblr. (2014h). Privacy Policy: Last Modified: 2014-01-27. Retrieved from https://www.tumblr.com/policy/en/privacy 
Tumblr. (2014i). Community Guidelines: Last Modified: 2014-01-27. Retrieved from https://www.tumblr.com/policy/en/community 
Unsplash. (2014). home-office-workstation-macbook-air-336581 [Image]. Retrieved from http://pixabay.com/en/home-office-workstation-macbook-air-336581 
Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday, 11(1-2). Retrieved from 
http://firstmonday.org/ojs/index.php/fm/article/view/1307/1227 
Von Lohmann, F. (2010). Unintended Consequences: Twelve Years under the DMCA. Retrieved from https://www.eff.org/files/eff-unintended-consequences-12-years.pdf 
Wilson, D. (2011). Public Domain Website Forced Offline Over Copyright Complaint. Retrieved from http://www.zeropaid.com/news/93191/public-domain-website-forced-offline-over- copyright-complaint
NET 303 Internet Politics and Power ā€“Curtin University. 
Thank you for your attention. 
An Alan Hall, Internet Communications student presentation for 
Alan Hall

More Related Content

Viewers also liked

2009 hattori metagenomics
2009 hattori metagenomics2009 hattori metagenomics
2009 hattori metagenomics
drugmetabol
Ā 
[2013.10.29] albertsen genomics metagenomics
[2013.10.29] albertsen genomics metagenomics[2013.10.29] albertsen genomics metagenomics
[2013.10.29] albertsen genomics metagenomics
Mads Albertsen
Ā 
[13.07.07] albertsen mewe13 metagenomics
[13.07.07] albertsen mewe13 metagenomics[13.07.07] albertsen mewe13 metagenomics
[13.07.07] albertsen mewe13 metagenomics
Mads Albertsen
Ā 
Gut microbiota
Gut microbiotaGut microbiota
Gut microbiota
Saurav Das
Ā 
Microbiome 2013
Microbiome 2013Microbiome 2013
Microbiome 2013
Elsa von Licy
Ā 
Metagenomics
MetagenomicsMetagenomics
Metagenomics
Rahul Sahu
Ā 

Viewers also liked (20)

Parallella seminar ppt
Parallella seminar pptParallella seminar ppt
Parallella seminar ppt
Ā 
Metagenomics: An overview
Metagenomics: An overviewMetagenomics: An overview
Metagenomics: An overview
Ā 
2009 hattori metagenomics
2009 hattori metagenomics2009 hattori metagenomics
2009 hattori metagenomics
Ā 
metagenomics
metagenomicsmetagenomics
metagenomics
Ā 
[2013.10.29] albertsen genomics metagenomics
[2013.10.29] albertsen genomics metagenomics[2013.10.29] albertsen genomics metagenomics
[2013.10.29] albertsen genomics metagenomics
Ā 
Introduction to 3D and Modeling
Introduction to 3D and ModelingIntroduction to 3D and Modeling
Introduction to 3D and Modeling
Ā 
[13.07.07] albertsen mewe13 metagenomics
[13.07.07] albertsen mewe13 metagenomics[13.07.07] albertsen mewe13 metagenomics
[13.07.07] albertsen mewe13 metagenomics
Ā 
Human nutrition, gut microbiome and immune system
Human nutrition, gut microbiome and immune system Human nutrition, gut microbiome and immune system
Human nutrition, gut microbiome and immune system
Ā 
Clinical Metagenomics for Rapid Detection of Enteric Pathogens and Characteri...
Clinical Metagenomics for Rapid Detection of Enteric Pathogens and Characteri...Clinical Metagenomics for Rapid Detection of Enteric Pathogens and Characteri...
Clinical Metagenomics for Rapid Detection of Enteric Pathogens and Characteri...
Ā 
3D Modelig presentation (.ppt) 371 SE
3D Modelig presentation (.ppt) 371 SE3D Modelig presentation (.ppt) 371 SE
3D Modelig presentation (.ppt) 371 SE
Ā 
Gut microbiota
Gut microbiotaGut microbiota
Gut microbiota
Ā 
Next Generation Sequencing of Fish Microbiome- AquaCyprus 2014
Next Generation Sequencing of Fish Microbiome- AquaCyprus 2014Next Generation Sequencing of Fish Microbiome- AquaCyprus 2014
Next Generation Sequencing of Fish Microbiome- AquaCyprus 2014
Ā 
Microbiome 2013
Microbiome 2013Microbiome 2013
Microbiome 2013
Ā 
Metagenomics newer approach in understanding Microbes
Metagenomics newer approach in understanding Microbes  Metagenomics newer approach in understanding Microbes
Metagenomics newer approach in understanding Microbes
Ā 
Introduction to Metagenomics. Applications, Approaches and Tools (Bioinformat...
Introduction to Metagenomics. Applications, Approaches and Tools (Bioinformat...Introduction to Metagenomics. Applications, Approaches and Tools (Bioinformat...
Introduction to Metagenomics. Applications, Approaches and Tools (Bioinformat...
Ā 
Metagenomics
MetagenomicsMetagenomics
Metagenomics
Ā 
Tools for Metagenomics with 16S/ITS and Whole Genome Shotgun Sequences
Tools for Metagenomics with 16S/ITS and Whole Genome Shotgun SequencesTools for Metagenomics with 16S/ITS and Whole Genome Shotgun Sequences
Tools for Metagenomics with 16S/ITS and Whole Genome Shotgun Sequences
Ā 
Marine Virus Presentation
Marine Virus PresentationMarine Virus Presentation
Marine Virus Presentation
Ā 
Introduction to Metagenomics Data Analysis - UEB-VHIR - 2013
Introduction to Metagenomics Data Analysis - UEB-VHIR - 2013Introduction to Metagenomics Data Analysis - UEB-VHIR - 2013
Introduction to Metagenomics Data Analysis - UEB-VHIR - 2013
Ā 
Metagenomics
MetagenomicsMetagenomics
Metagenomics
Ā 

Similar to Tumblr Terms of Service Policy Primer: an Internet Communications student perspective.

True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
BarkerCurtin2013
Ā 

Similar to Tumblr Terms of Service Policy Primer: an Internet Communications student perspective. (20)

Tumblr - What did you agree to?
Tumblr - What did you agree to?Tumblr - What did you agree to?
Tumblr - What did you agree to?
Ā 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
Ā 
Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primer
Ā 
Do you want to know more about Tumblr and use it for business?
Do you want to know more about Tumblr and use it for business? Do you want to know more about Tumblr and use it for business?
Do you want to know more about Tumblr and use it for business?
Ā 
What lies behind twitterā€™s terms of service?
What lies behind twitterā€™s terms of service?What lies behind twitterā€™s terms of service?
What lies behind twitterā€™s terms of service?
Ā 
Sadaf ahmadi web503
Sadaf ahmadi web503Sadaf ahmadi web503
Sadaf ahmadi web503
Ā 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
Ā 
Michael Whitford - Net 503 Policy Primer
Michael Whitford - Net 503 Policy PrimerMichael Whitford - Net 503 Policy Primer
Michael Whitford - Net 503 Policy Primer
Ā 
Vine Policy Primer
Vine Policy PrimerVine Policy Primer
Vine Policy Primer
Ā 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
Ā 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
Ā 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake White
Ā 
From Convicts to Pirates: Illegal Downloading in Australia
From Convicts to Pirates: Illegal Downloading in Australia From Convicts to Pirates: Illegal Downloading in Australia
From Convicts to Pirates: Illegal Downloading in Australia
Ā 
Tumblr 2014 - statistical overview and comparison with popular social services
Tumblr 2014 - statistical overview and comparison with popular social servicesTumblr 2014 - statistical overview and comparison with popular social services
Tumblr 2014 - statistical overview and comparison with popular social services
Ā 
Free Sites For Essay Writing
Free Sites For Essay WritingFree Sites For Essay Writing
Free Sites For Essay Writing
Ā 
Dark Patterns Research Paper
Dark Patterns Research PaperDark Patterns Research Paper
Dark Patterns Research Paper
Ā 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
Ā 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
Ā 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
Ā 
The War on Attention Poverty: Measuring Twitter Authority
The War on Attention Poverty: Measuring Twitter AuthorityThe War on Attention Poverty: Measuring Twitter Authority
The War on Attention Poverty: Measuring Twitter Authority
Ā 

Recently uploaded

Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
SofiyaSharma5
Ā 
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
soniya singh
Ā 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
Ā 
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
shivangimorya083
Ā 
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
soniya singh
Ā 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
Ā 
Lucknow ā¤CALL GIRL 88759*99948 ā¤CALL GIRLS IN Lucknow ESCORT SERVICEā¤CALL GIRL
Lucknow ā¤CALL GIRL 88759*99948 ā¤CALL GIRLS IN Lucknow ESCORT SERVICEā¤CALL GIRLLucknow ā¤CALL GIRL 88759*99948 ā¤CALL GIRLS IN Lucknow ESCORT SERVICEā¤CALL GIRL
Lucknow ā¤CALL GIRL 88759*99948 ā¤CALL GIRLS IN Lucknow ESCORT SERVICEā¤CALL GIRL
imonikaupta
Ā 

Recently uploaded (20)

Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Ā 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Ā 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
Ā 
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
Ā 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Ā 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
Ā 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
Ā 
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Ā 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
Ā 
Call Now ā˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ā˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Ā 
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Stand
Ā 
VVVIP Call Girls In Connaught Place āž”ļø Delhi āž”ļø 9999965857 šŸš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place āž”ļø Delhi āž”ļø 9999965857 šŸš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place āž”ļø Delhi āž”ļø 9999965857 šŸš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place āž”ļø Delhi āž”ļø 9999965857 šŸš€ No Advance 24HRS...
Ā 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
Ā 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Ā 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Ā 
Lucknow ā¤CALL GIRL 88759*99948 ā¤CALL GIRLS IN Lucknow ESCORT SERVICEā¤CALL GIRL
Lucknow ā¤CALL GIRL 88759*99948 ā¤CALL GIRLS IN Lucknow ESCORT SERVICEā¤CALL GIRLLucknow ā¤CALL GIRL 88759*99948 ā¤CALL GIRLS IN Lucknow ESCORT SERVICEā¤CALL GIRL
Lucknow ā¤CALL GIRL 88759*99948 ā¤CALL GIRLS IN Lucknow ESCORT SERVICEā¤CALL GIRL
Ā 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Ā 

Tumblr Terms of Service Policy Primer: an Internet Communications student perspective.

  • 1. Policy Primer By Alan Hall NET 303 Internet Politics and Power ā€“Curtin University. This work is made available under a Creative Commons Licence CC BY-SA Terms of Service
  • 2. This page (one of two) intentionally left blank (to accommodate clickable links)
  • 3. This page (two of two) intentionally left blank (to accommodate clickable links)
  • 4. Tumblris a ā€œfree blogging platform and hosting service ā€¦ā€ (Duffy, 2011, review, para. 1) that claims to ā€œlet you share anythingā€ (Tumblr, 2014a), and in any format that you would like. In fact, users post, and create content that caters to a wide variety of audiences. Topics that can be found on Tumblr include, but are not limited to ā€¦ Image source: CC0 Public Domain. Unsplash(2014). Alan Hall
  • 5. TRAVEL Image source: ā€œTravelā€ (Tumblr, 2014b). Alan Hall
  • 6. FOOD Image source: ā€œFoodā€ (Tumblr, 2014c). Alan Hall
  • 7. HOBBIES Image source: ā€œHobbiesā€ (Tumblr, 2014d). Alan Hall
  • 8. FANDOM Image source: ā€œFandomā€ (Tumblr, 2014e). Alan Hall
  • 9. ADULT Image source: OpenClips(2013a). Not Suitable for Work (NSFW) CC0 Public Domain. Alan Hall
  • 10. In fact, there exists over 200 million blogs and 90 billion posts on Tumblr(Tumblr, 2014a). Now, thatā€™s a lot of content people are sharing on Tumblr. I wonder if they have all read and understood Tumblrā€™s ā€˜terms of serviceā€™, ā€˜community guidelinesā€™, and ā€˜privacy policyā€™, that they agreed to so that they can use the service? Image source: Stuart Frisby(2008). Image source: CC0 Public Domain. geralt(2014a). Alan Hall
  • 11. Image source: CC0 Public Domain. geralt(2014b). Alan Hall
  • 12. Tumblr states that it only takes 30 seconds to join (Tumblr, 2014f), yet this is only possible if the registrant does not read the policies. Becauseā€¦chances are many have not, and without reading the terms of service they cannot be aware of what their rights and responsibilities are, or how their personal data may be used or acquired. YOU SEE ā€¦ ā€¦ and given that the average person has a reading speed of 200-250 words per minute (ExecuRead, n.d.), and with all three policy documents totalling close to 11,000 words, it would take the average person ā€¦ Alan Hall Image source: CC0 Public Domain. 30754(2013).
  • 13. and this is without any further analyses of definitions or terms, or even consultation of the Digital Millennium Copyright Act to understand what it means for them. Alan Hall Image source: CC0 Public Domain. Monelgonel(2014). 45-55 minutes to read ā€¦ It is the length and ubiquity of these policy documents online that cause many people to fling their arms up in despair and rationalise that the possible ramifications of interacting with the site without reading the policies is worth the risk for the time that it saves (McDonald & Cranor, 2008) .
  • 14. ā€œWe estimate that reading privacy policies carries costs in time of approximately 201 hours per year ā€¦ [per person]ā€ (McDonald & Cranor, 2008, p. 565) . Alan Hall
  • 15. It is the purpose of this policy primer to highlight a few key points regarding the use of Tumblr, with a focus on: ā€¢ Privacy ā€¢ Freedom of Expression ā€¢ Copyright Alan Hall
  • 16. ā€¢ Therefore, to register you must be at least 13 years of age (Tumblr, 2014g). Since Tumblr is based in the United Statesā€¦ ā€¢ It is subject to ā€œU.S. laws and jurisdiction ā€¦ā€(Tumblr, 2014g). Alan Hall ā€¢ If you are over 13 years of age, then you can only register if you are not legally prevented from doing so (Tumblr, 2014g). CC0 Public Domain. Bykst(2014). AND Image source:
  • 17. Alan Hall And when you register you are required to provide Tumblr withā€¦ ā€¢ Your first and last name, age, and email address. The information must be accurate, complete, and kept updated during your use of the service (Tumblr, 2014g). This information requirement may appear negligible, but DID YOU KNOW that Tumblr access and collate data about you through other means: For example, if you connect your account to a social networking site such as Facebook, Tumblr may get access to all of your personal data that you have made available within that particular network? CC0 Public Domain. geralt(2013). Image source:
  • 18. Furthermore to use Tumblr, you must allow them to install cookieson your computer, that is, text-files that will enable them to monitor your online behaviour (Chaffey & Ellis-Chadwick, 2012, p. 653) These services include, but are not limited to Google Analytics and Yahoo Web Analytics which may also put their own cookies onto your computer to collate data (Tumblr, 2014h). CC0 Public Domain. Image source: Nemo(2014a). Alan Hall ā€¦ and ā€œIf you disable cookies, you wonā€™t be able to log into your Account, and so wonā€™t be able to use the vast majority of our servicesā€ (Tumblr, 2014h).
  • 19. Whilst cookies do have a positive benefit, such as recognising a visitor and providing a personally tailored experience, the data can also be easily obtained by anyone who knows how to access the cookie text file on a computer hard drive ( Hormozi, 2005, p. 7) which puts personal data at risk. The vagueness of which services in fact will place cookies is deeply concerning, because one cannot be sure of who is monitoring their online activities, what personal data is being collected, and how their data is being used. Additionally, as these cookies are not subject to Tumblrā€™s Privacy Policy a user is inadequately informed to effectively manage their privacy. Alan Hall CC0 Public Domain. Image source: OpenClips(2013b).
  • 20. Alan Hall Tumblr states that this is to improve the overall service experience for the user (Tumblr, 2014h), but the user is not provided with an option to opt-outof such data aggregation. Instead a user is forcedto either accept the data aggregation, or not use the service. It is this lack of powerthat a user has to control their personal data that is unsettling. CC0 Public Domain. Image source: parameciorecords(2014). Tumblr also acquires data relating to your web browser, your mobile phone if you access Tumblr with it, IP address that displays your approximate geographic location, and information that is attached to images such as EXIF content, and may share this information with third-parties (Tumblr, 2014h).
  • 21. And should your data be compromised due to occurrences such as an error on their end, hardware failure, or the server is hacked then Tumblr restricts their liability to the greater of $100 or the cost of your subscription (Tumblr, 2014g). So, the value of your personal data being released to the world for which you have little control is $100, no matter how damaging such a release of information may be personally. CC0 Public Domain. Image source: PublicDomainPictures(2012). Alan Hall Because ā€¦ Tumblr make no mention as to how they protect user data, only that they take security seriously; but this does not allow a user to make an informed decision about the appropriateness of the security precautions (if any) in place to protect your data.
  • 22. Alan Hall Furthermore and perhaps most importantly ā€¦ Tumblr ā€œā€¦ reserve the right to access, preserve, and disclose any information [about a user] that they believe is necessary, in [their] sole discretionā€ (Tumblr, 2014h) to anyone, government, legal and corporate under the guise of their protection and the protection of others. The Organisation for Economic Co-operation and Development (2011, p. 103) classify such monitoring as a violation of user right[s] and is a threat to Internet freedom. This monitoring standard displays a lack of transparency and accountability that can result in self- censorship. CC0 Public Domain. Image source: geralt(2014c).
  • 23. ā€¢ Malicious Speech. ā€¢ Harm to minors. ā€¢ Promotion or Glorification of Self-Harm. ā€¢ Gore, Mutilation, Bestiality, or Necrophilia. ā€¢ UnflaggedNSFW Blogs. ā€¢ Unflaggedsexually Explicit Video. ā€¢ Non-Genuine Social Gesture Schemes. ā€¢ Deceptive or Fraudulent Links. ā€¢ Misattribution or Non-Attribution. ā€¢ Username/URL Abuse or Squatting. ā€¢ Spam. ā€¢ Mass Registration or Automation. ā€¢ Unauthorized Contests, Sweepstakes, or Giveaways. ā€¢ Themes Distributed by Third Parties ā€¢ Copyright or Trademark Infringement. ā€¢ Confusion or Impersonation. ā€¢ Harassment. ā€¢ Privacy Violations. ā€¢ Disruptions, Exploits, or Resource Abuse. ā€¢ Unlawful Uses or content. Alan Hall Tumblr encourage freedom of expression But donā€™t engage in: Source: Tumblr (2014i)
  • 24. Itā€™s enough to make your head spin. Alan Hall Letā€™s take a closer look at the restrictions regarding ā€˜Harm to Minorsā€™; Harm to Minors. ā€œDonā€™t post ā€¦ anything relating to minors that is sexually suggestive or violentā€ (Tumblr, 2014i). Superficially, the meaning of this statement may appear straightforward. But it in fact involves a broad categorisation. For we may ask, what about Tumblr Fandom groups built around Manga comics such as ā€˜Sundomeā€™ that has sexualised images of schoolgirls? Or gifs such as those from the cartoon series ā€˜South Parkā€™, where the child characters also have a propensity to elicit sexual displays as well as violence? Technically, these would fail the Tumblr guidelines, yet due to them being on Tumblr it then leads to confusion of what is or isnā€™t allowed. CC0 Public Domain. Image source: Nemo(2012a).
  • 25. Alan Hall Tumblr ā€œā€¦ reserve the right to enforce, or not enforce, [their] guidelines ā€¦ā€ (Tumblr, 2014i). IN FACT AND ā€œā€¦ suspend accounts, or remove content, without notice, for any reason ā€¦ā€(Tumblr, 2014i) .
  • 26. For example, given that Tumblr are owned by Yahoo!, a potential conflict of interest may arise between what is allowed to remain on the site and what isnā€™t. Blogs that are, for example, critical of Yahoo! could be removed without notice which then encroaches upon freedom of expression rights (Brown, 2007, p. 8). Alan Hall WHICH RAISES ā€¦ significant concerns over transparency and accountability issues when removal of content is conducted in secrecy (Villeneuve, 2006 Introduction, para. 8) CC0 Public Domain. Image source: Fuzz(2014). The ā€œā€¦ Terms of Service contracts effectively shield the government [and others] from constitutional scrutiny of [their] take-down requestā€ (Fradette, 2013, p. 949)
  • 27. For copyright protection, Tumblr enforces the Digital MilleniumCopyright Act (DCMA). Alan Hall NOW LETā€™S LOOK AT COPYRIGHT Should an entity, government, corporate or private, notify them that content breaches copyright, then Tumblr will remove it immediately(Tumblr, 2014g). CC0 Public Domain. Image source: Nemo(2012b).
  • 28. This is regardless of whether such content does in fact breach copyright! Alan Hall
  • 29. There have been a number of cases in the past whereby content creators have had their works unfairly claimed under the DMCA on the Web. Such examples include: Warner Brothers automatically issuing takedown notices without review of content, which in many cases turned out not to in fact be Warner Brothers content (Electronic Frontier Foundation, 2012). Or the case of the ā€¦ Music Publishers Association demanding web host ā€˜Go Daddyā€™ to remove a website that hosted Public Domain content, of which ā€˜Go Daddyā€™ obliged (Wilson, 2011). Alan Hall PLEASE EXPLAIN
  • 30. Alan Hall AND THIS IS CONCERNING Because people are presumed guilty before innocentwith ā€œā€¦ no due process of law [to] protect [them] before they are disconnected or their sites are blockedā€ (Berners-Lee, 2010, p. 85). If people want to challenge the take-down request then the complainant gets given first right to decide if your content should be re-instated, and if unsuccessful the only avenue that remains is legal action, which is costly in both time and money for the average person (Tumblr, 2014g). CC0 Public Domain. Image source: Nemo(2014b).
  • 31. Alan Hall THE NET RESULT IS ā€¦ Free Speech that is (Von Lohmann, 2010, p. 2) CC0 Public Domain. ā€˜Chilledā€™ Image: Alan Hall (2014).
  • 32. Alan Hall IN CLOSINGā€¦ By accepting Tumblrā€™s ā€˜Terms of Serviceā€™, Tumblr (and others) will monitor your online activities and build a unique profile on you that may be shared with others at their sole discretion. Your content may be removed for any reason, without notification which has the potential to limit freedom of expression, and be abused by Tumblr and others for their own motives.
  • 33. References 30754. (2013). glasses-reader-frames-optical-143762 [Image]. Retrieved http://pixabay.com/en/glasses-reader-frames-optical-143762 Berners-Lee, T. (2010, December). Long Live the Web. Scientific American. Retrieved from http://jblomo.github.io/webarch253/slides/Long_Live_the_Web.pdf Brown, I. (2007). Internet censorship: be careful what you ask for. In S. Kirca, & L. Hanson (Eds.), Freedom and Prejudice: Approaches to Media and Culture(pp. 74-91). Instanbul: BahcesehirUniversity Press. bykst. (2014). judge-flag-justice-law-adler-317290 [Image]. Retrieved from http://pixabay.com/en/judge-flag-justice-law-adler-317290 Chaffey, D., & Ellis-Chadwick, F. (2012). Digital Marketing: Strategy, Implementation and Practice. Harlow, ES: Pearson. Duffy, J. (2011, June 14). Tumblr. Retrieved from http://www.pcmag.com/article2/0%2c2817%2c2195458%2c00.asp Electronic Frontier Foundation. (2012). EFF Calls Foul on Robo-Takedowns. Retrieved from https://www.eff.org/press/releases/eff-calls-foul-robo-takedowns ExecuRead. (n.d.). Speed Reading Facts. Retrieved from http://www.execuread.com/facts Fradette, J. (2013). Online terms of service: a shield for First Amendment scrutiny of government action. Notre Dame Law Review, 89(2), 947-984. Retrieved from http://home.heinonline.org Frisby, S. (2008). tumblr.com/share as a fluid application [Image]. Retrieved from https://www.flickr.com/photos/36-degrees Fuzz. (2014). monkey-sculpture-carving-speaking-236861 [Image]. Retrieved from http://pixabay.com/en/monkey-sculpture-carving-speaking-236861 geralt. (2014a). question-mark-punctuation-marks-358177 [Image]. Retrieved from http://pixabay.com/en/question-mark-punctuation-marks-358177 Alan Hall
  • 34. Alan Hall geralt. (2014b). why-question-gorilla-monkey-234596 [Image]. Retrieved from http://pixabay.com/en/why-question-gorilla-monkey-234596 geralt. (2014c). monitor-man-men-shaking-hands-376211 [Image]. Retrieved from http://pixabay.com/en/monitor-man-men-shaking-hands-376211 geralt(2013). woman-stylish-at-internet-network-163426 [Image]. Retrieved from http://pixabay.com/en/woman-stylish-at-internet-network-163426 Hormozi, A. M. (2005). Cookies and Privacy. EDPACS, 32(9), 1-13. Retrieved from http://www.proquest.com McDonald, A. M., & Cranor, L. F. (2008). The Cost of Reading Privacy Policies. I/S (Online): a journal of law and policy for the information society, 4(3), 543-568. Retrieved from http://www.heinonline.org Monelgonel. (2014). justice-scales-balance-lawyer-423446 [Image]. Retrieved from http://pixabay.com/en/justice-scales-balance-lawyer-423446 Nemo. (2014a). cookie-chocolate-chip-blurred-307960 [Image]. Retrieved from http://pixabay.com/en/cookie-chocolate-chip-blurred-307960 Nemo. (2014b). law-justice-justizia-blind-scale-311363 [Image]. Retrieved from http://pixabay.com/en/law-justice-justizia-blind-scale-311363 Nemo. (2012a). head-paper-reading-bug-insect-46204 [Image]. Retrieved from http://pixabay.com/en/head-paper-reading-bug-insect-46204 Nemo. (2012b). copyright-symbol-intellectual-30343 [Image]. Retrieved from http://pixabay.com/en/copyright-symbol-intellectual-30343 OpenClips. (2013a). silhouette-human-woman-sex-sexy-147166 [Image]. Retrieved from http://pixabay.com/en/silhouette-human-woman-sex-sexy-147166 OpenClips. (2013b). hal-9000-camera-optical-computer-157883 [Image]. Retrieved from http://pixabay.com/en/hal-9000-camera-optical-computer-157883 Organisation for Economic Co-operation and Development. (2011). The Role of Internet Intermediaries in Advancing Public Policy Objectives. http://dx.doi.org/10.1787/9789264115644-en parameciorecords. (2014). anonymous-mask-bogotĆ”-protest-275868 [Image]. Retrieved from http://pixabay.com/en/anonymous-mask-bogot%C3%A1-protest-275868 PublicDomainPictures. (2012). dollar-100-dollars-money-currency-15328 [Image]. Retrieved from http://pixabay.com/en/dollar-100-dollars-money-currency-15328 Tumblr.(2014a).About.Retrievedfrom https://www.tumblr.com/about Tumblr. (2014b). Travel [Image]. Retrieved from https://www.tumblr.com/search/Travel Tumblr. (2014c). Food [Image]. Retrieved from https://www.tumblr.com/search/Food
  • 35. Alan Hall Tumblr. (2014d). Hobbies [Image]. Retrieved from https://www.tumblr.com/search/Hobbies Tumblr. (2014e). Fandom [Image]. Retrieved from https://www.tumblr.com/search/Fandom Tumblr.(2014f).Tumblr.Retrievedfrom https://www.tumblr.com Tumblr. (2014g). Terms of Service: Last Modified: 2014-01-27. Retrieved from https://www.tumblr.com/policy/en/terms-of-service Tumblr. (2014h). Privacy Policy: Last Modified: 2014-01-27. Retrieved from https://www.tumblr.com/policy/en/privacy Tumblr. (2014i). Community Guidelines: Last Modified: 2014-01-27. Retrieved from https://www.tumblr.com/policy/en/community Unsplash. (2014). home-office-workstation-macbook-air-336581 [Image]. Retrieved from http://pixabay.com/en/home-office-workstation-macbook-air-336581 Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday, 11(1-2). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/1307/1227 Von Lohmann, F. (2010). Unintended Consequences: Twelve Years under the DMCA. Retrieved from https://www.eff.org/files/eff-unintended-consequences-12-years.pdf Wilson, D. (2011). Public Domain Website Forced Offline Over Copyright Complaint. Retrieved from http://www.zeropaid.com/news/93191/public-domain-website-forced-offline-over- copyright-complaint
  • 36. NET 303 Internet Politics and Power ā€“Curtin University. Thank you for your attention. An Alan Hall, Internet Communications student presentation for Alan Hall