SlideShare a Scribd company logo
1 of 44
NET 303 – Policy Primer
By using Facebook, you
agree to the Statement of
Rights and
Responsibilities that is
updated from time to
time.
You grant
Facebook a
non-exclusive,
transferable,
sub-licensable,
royalty-free,
worldwide
license to use
any IP content
that you post.
Once your
pictures or
videos are
out there
on
Facebook,
it is
difficult to
have
control of
them
All videos, pictures and
other information
disclosed on Facebook
becomes its property.
Facebook can use your
content in any way it sees
for profit.
When you delete content, it
remains in backup copies
for a reasonable period of
time.
An application you
join, can access
your content and
information and
what others have
shared with you
Facebook receives data when you
look at another person’s timeline,
send or receive a message, search
for a friend or a page.
Facebook has 14,000 word terms of
service and data use police …
Few people really read the “terms
and agreement” of the sign-up
page nor the Facebook’s privacy
policy.
Facebook users
are concerned
with privacy.
They either:
1.
Leave the site
2.
Configure
their privacy
setting that
are
complicated to
understand
Changes in the layout
and privacy settings are
not always easy and fast
to understand.
Users have to choose
among a lot of
different settings
and options to
modify Facebook’s
default settings.
Although Facebook
has developed
options to control
their information,
few users have the
technical ability to
manage well their
privacy settings.
Facebook Privacy
Policy in 2005:

Current Facebook
Privacy Policy:

“No personal information
that you submit to the
Facebook will be
available to any users
of the Web Site who
does not belong to at
least one of the groups
specified by you in
your privacy settings.”

“When you connect with
an application or
website it will have
access to General
Information about you.
The term General
Information includes
your and your friends
names, profile picture,
gender, …”
According to Facebook, users
personal information…
In
2005

… belonged to specified groups

In
2006

… belonged to user’s schools , local area and
other “reasonable” community.

In
2007

… belonged to friends of friends

In
2009

… belonged to “everyone”
Facebook has begun to delete personal
privacy at an accelerated pace
Facebook
users do
not know
where their
private and
public
spheres
should be
drawn.
Protection of
personal
privacy is
fundamental
to an
individual’s
autonomy and
to control
what is
disclosed to
others.
“A man without privacy is a man without
dignity; the fear that Big Brother is
watching and listening threatens the
freedom of the individual no less than the
prison bars.”
Zelman Cowen
Economy is
dependant of the
free flow of
information on
social networking
sites that affects
personal privacy.
Facebook
tracks its
users’
activities and
develop
profiles of
consumers.
Facebook users
are concerned
about the loss
of their
anonymity
and about the
sale of their
information to
third parties
for multiple
purposes.
Surveillance has become the social norm of this
century and it is a form of social control.
Facebook provides online visible interaction
available among many people.
“Control of information and communication has
been a major source of power throughout
history. The advent of the Internet and of
wireless communication allows the
development of many-to-many and one-to-one
horizontal communication channels that bypass
political or business control of communication.”
Manuel Castells
Facebook has gained bad
press:
1.

2.

Users are easily being
tracked
Users’ information is
shared without any
consent.
Facebook privacy problems:

Users disclose too
much

1.

2.

Personal Privacy is not
well protected
Third parties are
looking to take profit
of users’ information

3.
Why Personal Privacy is not well protected?
For example, Facebook users’ may not be
aware that Facebook default settings for
photo albums is “global”
Personal information
is exposed to
strangers on
Facebook
Your Facebook “friends”
own your personal content
and can give it to a whole
range of other people.
The amount of
users’ disclosed
information on
Facebook is highly
valuable for
companies for
marketing issues.
We are free Facebook
labourers, that profits
from us.
The old adage
“Knowledge is
power” speaks
about the power
Facebook has
gained
recollecting
information
about over a
billion users.
Knowledge is key to
the exercise of
power
“The world is embracing new standards of
conduct, enforced not only by surveillance
and coertion but by willful disclosure:
regulation by revelation.”

Ann Florini
Transparency as a
public good might
become a public
bad that infringes
on personal
privacy.
Despite the disadvantages of
having a Facebook account,
deleting a Facebook account may
also be a disadvantage for our
social and professional matters.
The use of Facebook is very useful for freedom of
expression especially in countries that use some
form of oppression for dissidents.
Facebook represents a
public space, where the
power is exercised
References
Virtual Threat. [Image]. (2013). NSA-Surveillance. Retrieved October 10, 2013, from
http://www.virtualthreat.com/2013/08/03/nsa-surveillance-tool-allows-real-time-access/
The Guardian. [Image]. (2009). Facebook Surveillance. Retrieved October 10, 2013, from
http://www.theguardian.com/commentisfree/libertycentral/2009/jun/18/villain-bozeman-city
Dailysquib.co.uk. [Image]. (2011). Facebook Big Brother. Retrieved October 10, 2013, from
http://www.dailysquib.co.uk/sci_tech/2806-facebook-wants-every-user-fingerprinted.html
Cheeteye. [Image]. (2011). Surveillancebook. Retrieved October10, 2013, from
http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg
Forbes. [Image]. (2013). Facebook. Retrieved October 10, 2013, from
http://www.forbes.com/sites/andygreenberg/2013/08/27/facebook-first-report-on-governmentdata-requests-shows-it-denies-u-s-surveillance-demands-more-often-than-google/
Diary of a Workcovervictim. [Image]. (2013). Facebook Surveillance. Retrieved October 10,
2013, from http://aworkcovervictimsdiary.com/2013/02/how-does-social-media-and-othersurveillance-prejudice-an-injured-workers-case/
Bitdefender. [Image]. (2013). Facebook, Google, Yahoo and Microsoft Fight for Data
Transparency. Retrieved October 10, 2013, from
http://www.hotforsecurity.com/blog/facebook-google-yahoo-and-microsoft-fight-for-datatransparency7023.html?sm_id=H4S_Posts&utm_source=SocialMedia&utm_medium=Post&utm_campaign=H4S
Voice of Russia. [Image]. (2013). Facebook. Retrieved October 10, 2013, from
http://indian.ruvr.ru/2013_09_21/Mass-exodus-Facebook/
Révolte Numérique.[Image]. (2012). Facebook Surveillance. Retrieved October 10, 2013,
from http://www.revoltenumerique.herbesfolles.org/tag/fichage/
Dooneyscafe. [Image]. (2013). Big Brother is Watching. Retrieved October10, 2013, from
http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg
Genius Media Group. [Image]. (2013). Facebook Privacy. Retrieved October 10, 2013, from
http://news.rapgenius.com/Facebook-proposed-changes-to-statement-of-rights-andresponsibilities-lyrics
SocialFish. [Image]. (2013). Data Use Policy. Retrieved October 10, 2013, from
http://www.socialfish.org/2013/06/a-little-privacy-please-your-rights-and-social-mediapolicies.html
QualityStockPhotos. [Image]. (2013). QualityStockPhotos. Retrieved October 10, 2013, from
http://www.qualitystockphotos.com/

More Related Content

What's hot

Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksTrends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksEman Bustamante
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightJibril Abubakar
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of InternetSagarneel Majumder
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracksglairerabida
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project GabrielleTawyer
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Private School
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 

What's hot (20)

Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksTrends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Internet
InternetInternet
Internet
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyright
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of Internet
 
Ppt
PptPpt
Ppt
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
Ict day4 quiz
Ict day4 quizIct day4 quiz
Ict day4 quiz
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project
 
The social network
The social networkThe social network
The social network
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Trends in ict
Trends in ictTrends in ict
Trends in ict
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 

Similar to Online Policy Primer: Facebook

Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primersophiegalati
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young AdultsRatan Rajpal
 
FACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxFACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxkanurukarthikeya
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebookhernan_j1
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Social media
Social mediaSocial media
Social mediaIbm Csr
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook ControversiesInternet Law Center
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Comm 303 slideshow
Comm 303 slideshowComm 303 slideshow
Comm 303 slideshownegrita06
 
Detweiler,com303 50,final project
Detweiler,com303 50,final projectDetweiler,com303 50,final project
Detweiler,com303 50,final projectselmik
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 

Similar to Online Policy Primer: Facebook (20)

Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primer
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social networking
Social networkingSocial networking
Social networking
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young Adults
 
FACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxFACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptx
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebook
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Social media
Social mediaSocial media
Social media
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook Controversies
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Assignment 5
Assignment 5Assignment 5
Assignment 5
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Comm 303 slideshow
Comm 303 slideshowComm 303 slideshow
Comm 303 slideshow
 
Detweiler,com303 50,final project
Detweiler,com303 50,final projectDetweiler,com303 50,final project
Detweiler,com303 50,final project
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Online Policy Primer: Facebook

  • 1. NET 303 – Policy Primer
  • 2. By using Facebook, you agree to the Statement of Rights and Responsibilities that is updated from time to time.
  • 4. Once your pictures or videos are out there on Facebook, it is difficult to have control of them
  • 5. All videos, pictures and other information disclosed on Facebook becomes its property.
  • 6. Facebook can use your content in any way it sees for profit.
  • 7. When you delete content, it remains in backup copies for a reasonable period of time.
  • 8. An application you join, can access your content and information and what others have shared with you
  • 9. Facebook receives data when you look at another person’s timeline, send or receive a message, search for a friend or a page.
  • 10. Facebook has 14,000 word terms of service and data use police …
  • 11. Few people really read the “terms and agreement” of the sign-up page nor the Facebook’s privacy policy.
  • 12. Facebook users are concerned with privacy. They either: 1. Leave the site 2. Configure their privacy setting that are complicated to understand
  • 13. Changes in the layout and privacy settings are not always easy and fast to understand.
  • 14. Users have to choose among a lot of different settings and options to modify Facebook’s default settings.
  • 15. Although Facebook has developed options to control their information, few users have the technical ability to manage well their privacy settings.
  • 16. Facebook Privacy Policy in 2005: Current Facebook Privacy Policy: “No personal information that you submit to the Facebook will be available to any users of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings.” “When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends names, profile picture, gender, …”
  • 17. According to Facebook, users personal information… In 2005 … belonged to specified groups In 2006 … belonged to user’s schools , local area and other “reasonable” community. In 2007 … belonged to friends of friends In 2009 … belonged to “everyone”
  • 18. Facebook has begun to delete personal privacy at an accelerated pace
  • 19. Facebook users do not know where their private and public spheres should be drawn.
  • 20. Protection of personal privacy is fundamental to an individual’s autonomy and to control what is disclosed to others.
  • 21. “A man without privacy is a man without dignity; the fear that Big Brother is watching and listening threatens the freedom of the individual no less than the prison bars.” Zelman Cowen
  • 22. Economy is dependant of the free flow of information on social networking sites that affects personal privacy.
  • 24. Facebook users are concerned about the loss of their anonymity and about the sale of their information to third parties for multiple purposes.
  • 25. Surveillance has become the social norm of this century and it is a form of social control.
  • 26. Facebook provides online visible interaction available among many people.
  • 27. “Control of information and communication has been a major source of power throughout history. The advent of the Internet and of wireless communication allows the development of many-to-many and one-to-one horizontal communication channels that bypass political or business control of communication.” Manuel Castells
  • 28. Facebook has gained bad press: 1. 2. Users are easily being tracked Users’ information is shared without any consent.
  • 29. Facebook privacy problems: Users disclose too much 1. 2. Personal Privacy is not well protected Third parties are looking to take profit of users’ information 3.
  • 30. Why Personal Privacy is not well protected? For example, Facebook users’ may not be aware that Facebook default settings for photo albums is “global”
  • 31. Personal information is exposed to strangers on Facebook
  • 32. Your Facebook “friends” own your personal content and can give it to a whole range of other people.
  • 33. The amount of users’ disclosed information on Facebook is highly valuable for companies for marketing issues.
  • 34. We are free Facebook labourers, that profits from us.
  • 35. The old adage “Knowledge is power” speaks about the power Facebook has gained recollecting information about over a billion users.
  • 36. Knowledge is key to the exercise of power
  • 37. “The world is embracing new standards of conduct, enforced not only by surveillance and coertion but by willful disclosure: regulation by revelation.” Ann Florini
  • 38. Transparency as a public good might become a public bad that infringes on personal privacy.
  • 39. Despite the disadvantages of having a Facebook account, deleting a Facebook account may also be a disadvantage for our social and professional matters.
  • 40. The use of Facebook is very useful for freedom of expression especially in countries that use some form of oppression for dissidents.
  • 41. Facebook represents a public space, where the power is exercised
  • 42. References Virtual Threat. [Image]. (2013). NSA-Surveillance. Retrieved October 10, 2013, from http://www.virtualthreat.com/2013/08/03/nsa-surveillance-tool-allows-real-time-access/ The Guardian. [Image]. (2009). Facebook Surveillance. Retrieved October 10, 2013, from http://www.theguardian.com/commentisfree/libertycentral/2009/jun/18/villain-bozeman-city Dailysquib.co.uk. [Image]. (2011). Facebook Big Brother. Retrieved October 10, 2013, from http://www.dailysquib.co.uk/sci_tech/2806-facebook-wants-every-user-fingerprinted.html Cheeteye. [Image]. (2011). Surveillancebook. Retrieved October10, 2013, from http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg Forbes. [Image]. (2013). Facebook. Retrieved October 10, 2013, from http://www.forbes.com/sites/andygreenberg/2013/08/27/facebook-first-report-on-governmentdata-requests-shows-it-denies-u-s-surveillance-demands-more-often-than-google/ Diary of a Workcovervictim. [Image]. (2013). Facebook Surveillance. Retrieved October 10, 2013, from http://aworkcovervictimsdiary.com/2013/02/how-does-social-media-and-othersurveillance-prejudice-an-injured-workers-case/
  • 43. Bitdefender. [Image]. (2013). Facebook, Google, Yahoo and Microsoft Fight for Data Transparency. Retrieved October 10, 2013, from http://www.hotforsecurity.com/blog/facebook-google-yahoo-and-microsoft-fight-for-datatransparency7023.html?sm_id=H4S_Posts&utm_source=SocialMedia&utm_medium=Post&utm_campaign=H4S Voice of Russia. [Image]. (2013). Facebook. Retrieved October 10, 2013, from http://indian.ruvr.ru/2013_09_21/Mass-exodus-Facebook/ Révolte Numérique.[Image]. (2012). Facebook Surveillance. Retrieved October 10, 2013, from http://www.revoltenumerique.herbesfolles.org/tag/fichage/ Dooneyscafe. [Image]. (2013). Big Brother is Watching. Retrieved October10, 2013, from http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg Genius Media Group. [Image]. (2013). Facebook Privacy. Retrieved October 10, 2013, from http://news.rapgenius.com/Facebook-proposed-changes-to-statement-of-rights-andresponsibilities-lyrics SocialFish. [Image]. (2013). Data Use Policy. Retrieved October 10, 2013, from http://www.socialfish.org/2013/06/a-little-privacy-please-your-rights-and-social-mediapolicies.html
  • 44. QualityStockPhotos. [Image]. (2013). QualityStockPhotos. Retrieved October 10, 2013, from http://www.qualitystockphotos.com/