ONLINE POLICY PRIMER Assignment 3 Helen Carroll Student ID 13579551
What and Who <ul><li>Twitter is a “real-time short messaging service that works over multiple networks and devices”. </li></ul><ul><li>You are able to follow celebrities, friends, and receive news updates. </li></ul><ul><li>This is a simplified version of other social networking sites like FaceBook and MySpace. </li></ul>
Terms of Service <ul><li>http://twitter.com/tos </li></ul><ul><li>The Twitter terms of service covers all the basic areas of copyright, contents, punishments and liability. </li></ul><ul><li>These terms are important and need to be read very carefully, do not accept any terms and conditions you do not agree with and will not adhere to. </li></ul>
Copyright <ul><li>You own your content, but it can be spread anywhere on various platforms, and applications, you must b aware of this if you use this platform to transmit your pictures, information etc. </li></ul><ul><li>Users must be aware of no compensation made or permission asked if your content is used elsewhere in other platforms. </li></ul>
Copyright con. <ul><li>How are you able to own it when it can be used anywhere and everywhere and you are not told about this distribution? </li></ul><ul><li>As twitter is not liable for this, it is important you use your own discretion when posting items. </li></ul><ul><li>By controlling what you post, you can control who has copyright, do not post anything that you do not want copied by those who are unknown. </li></ul>
Content/Control <ul><li>Zittrain (2009) mentioned if you entrust your data to others, they can let you down and outright betray you. </li></ul><ul><li>By accepting the Terms of Service Twitter has to offer you must understand the consequences of transmitting any information about yourself or those who are close to you. </li></ul><ul><li>You may lose control over your content because you do not know who has copied it and what they are distributing it for. </li></ul>
Content/Control <ul><li>As it is stated in the TOS content is not actively censored and monitored. This can create a carefree attitude towards what is and only when something is questioned or reported by other users may something be done. </li></ul><ul><li>This can create a world with slow reactions to what is posted which could be offensive, violent and criminal, this type of content needs to be monitored much more closely than stated in the TOS of Twitter. </li></ul>
Passwords/Privacy <ul><li>Just like many social networking sites passwords are the SOLE responsibility of the user, the more complicated the password, the better. If you share your password, you are putting your privacy at risk. </li></ul><ul><li>You are online at your own risk. Lessig (1998) mentions being ‘monitored’, ones life is being watched. These sites allow for that to happen without the user knowing who is watching them. </li></ul><ul><li>You have a right to privacy but when you allow for private information to become public by using these sites, this right can be lost. </li></ul>
Passwords/Privacy con. <ul><li>Goettke & Christiana (2007) mention that because of the nature of social networking sites the responsibility of privacy protection often falls solely on the individual. </li></ul><ul><li>With social networking sites not being liable for any problems with passwords etc the user needs to be stringent so their account is kept private. </li></ul><ul><li>Their account may be private but what the user posts is entirely up to them, so a personal level of privacy is needed when using these sites. </li></ul>
Changes <ul><li>It is important to note that Twitter is able to make changes to its program without prior notice to users. </li></ul><ul><li>This allows for the company to have complete control over its platforms and applications without users interfering. </li></ul><ul><li>This is vital to a big social networking site as changes are what keeps it exciting to users. </li></ul>
Impersonation <ul><li>Fake accounts are allowed to occur, this important to users as they may start to follow a user and believe it is a real person. </li></ul><ul><li>Twitter allows fake accounts only if it is obvious they are fake. </li></ul><ul><li>This may be morally wrong to impersonate someone, but without harming anyone, twitter will not take responsibility, users need to be aware of the dangers of this. </li></ul>
Consequences <ul><li>Users need to be aware that fake accounts are made and no actions can be taken if they are not harming anyone. </li></ul><ul><li>Repeat infringements of any laws and policies can end in termination of account, but how does this stop the person creating a new one. It doesn’t. </li></ul><ul><li>This can happen without ‘prior notice’. Users should be told when they are breaking rules because they most likely do not know they are breaking them because the majority of users have not read the full terms of service. </li></ul>
References <ul><li>Lessig, L. (1998). The architecture of Privacy. Retrieved September 10, 2009. from http:// cyber.law.harvard.edu/works/lessig/architecture_priv.pdf </li></ul><ul><li>Goettke, R, & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in Computation and Society: Privacy and Technology. Retrieved September 15, 2009 from http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf </li></ul><ul><li>Lost in the Cloud. (2009,19 July). The New York Times. Retrieved September 20, 2009, from Proquest Database. </li></ul><ul><li>http://twitter.com/ </li></ul><ul><li>www.soloseo.com/blog/ </li></ul><ul><li>www.cartoonart.org / </li></ul>
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.