SlideShare a Scribd company logo
1 of 12
Twitter ,[object Object]
Welcome ,[object Object]
Content
Spam
Abuse
Trademark & Copyright
Privacy ,[object Object]
Privacy (cont) ,[object Object]
Privacy (cont) Who can access my information ,[object Object]
Privacy laws of the users country become irrelevant.
If a government or Law Enforcement Officials or Private Parties in the US gets a court order it can walk in to twitter headquarters and help itself to your data. the good news is it's primarily to stop illegal, unethical or legally actionable activity. The bad news is that there is no statement anywhere in the documents stating how long this data will be collected if not indefinitely.
Privacy (cont) ,[object Object]

More Related Content

What's hot

Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
Twitter in hotel marketing
Twitter in hotel marketingTwitter in hotel marketing
Twitter in hotel marketinghoteleuropa2
 
Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Cole_Hart
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prezstacyo
 
Script for Teaching Twitter
Script for Teaching TwitterScript for Teaching Twitter
Script for Teaching TwitterBovee and Thill
 
Tumblr - What did you agree to?
Tumblr - What did you agree to?Tumblr - What did you agree to?
Tumblr - What did you agree to?donttrustladygaga
 
What Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsWhat Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsRachel Beaney
 
Twitter: a case study
Twitter: a case studyTwitter: a case study
Twitter: a case studyClinton Forry
 
Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Mohammad Hijazi
 
Tweeting For NC State University
Tweeting For NC State UniversityTweeting For NC State University
Tweeting For NC State UniversityJason Austin
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersTessa Horehled
 
Twitter 101 for Government
Twitter 101 for GovernmentTwitter 101 for Government
Twitter 101 for Governmentcanada30
 
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ..."Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...Joshua Tree Internet Media, LLC
 

What's hot (20)

Twitter Training for Activists
Twitter Training for ActivistsTwitter Training for Activists
Twitter Training for Activists
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Twitter in hotel marketing
Twitter in hotel marketingTwitter in hotel marketing
Twitter in hotel marketing
 
Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prez
 
Script for Teaching Twitter
Script for Teaching TwitterScript for Teaching Twitter
Script for Teaching Twitter
 
Twitter Brochure
Twitter BrochureTwitter Brochure
Twitter Brochure
 
Tumblr - What did you agree to?
Tumblr - What did you agree to?Tumblr - What did you agree to?
Tumblr - What did you agree to?
 
What Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsWhat Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPs
 
Twitter conventions
Twitter conventionsTwitter conventions
Twitter conventions
 
Twitter: A Final Friday presentation
Twitter: A Final Friday presentationTwitter: A Final Friday presentation
Twitter: A Final Friday presentation
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
Twitter: a case study
Twitter: a case studyTwitter: a case study
Twitter: a case study
 
Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)
 
Tweeting For NC State University
Tweeting For NC State UniversityTweeting For NC State University
Tweeting For NC State University
 
Twitter conventions
Twitter conventionsTwitter conventions
Twitter conventions
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For Marketers
 
Twitter 101 for Government
Twitter 101 for GovernmentTwitter 101 for Government
Twitter 101 for Government
 
Twitter 2.0
Twitter 2.0Twitter 2.0
Twitter 2.0
 
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ..."Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
 

Similar to Twitter Terms Policy Primer

What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?abdullasshalhabsi
 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.BarkerCurtin2013
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteJake White
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2Nick Buonvicino
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacySolomben
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfFacebook
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on TwitterYansi Keim
 
Inputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesInputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesFaraedoon Farage
 
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...alanthall
 
The Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersThe Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersHM Revenue & Customs
 
Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Emma Mirrington
 
Online policy primer
Online policy primerOnline policy primer
Online policy primer15807539
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaBrian Miller, Solicitor
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyRamiro Cid
 

Similar to Twitter Terms Policy Primer (20)

What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?
 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake White
 
Policy Primer-Davida Aerlic
Policy Primer-Davida AerlicPolicy Primer-Davida Aerlic
Policy Primer-Davida Aerlic
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Twitter Success guide
Twitter Success guideTwitter Success guide
Twitter Success guide
 
Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdf
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Inputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesInputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposes
 
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
 
The Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersThe Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for Recruiters
 
Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10
 
Online policy primer
Online policy primerOnline policy primer
Online policy primer
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social Media
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 

Recently uploaded

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Recently uploaded (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Twitter Terms Policy Primer

  • 1.
  • 2.
  • 7.
  • 8.
  • 9.
  • 10. Privacy laws of the users country become irrelevant.
  • 11. If a government or Law Enforcement Officials or Private Parties in the US gets a court order it can walk in to twitter headquarters and help itself to your data. the good news is it's primarily to stop illegal, unethical or legally actionable activity. The bad news is that there is no statement anywhere in the documents stating how long this data will be collected if not indefinitely.
  • 12.
  • 13. Parents or Guardians must email privacy at twitter dot com to have the data deleted (unkown, 2009)
  • 14. In the Twitter sign up page there is NO checkbox to tick stating the user is 13 or over.
  • 15. Meaning that if a child under the age of 13 tries to sign up to Twitter they have no idea that it is against Twitter policy unless they read the privacy agreement.
  • 16.
  • 17. this sentence is then followed by all of the rights you are giving to Twitter explained in the next slide
  • 18. your rights section is really an extension of the Twitter rights section with a friendly title.
  • 19.
  • 20.
  • 21.
  • 22. Privacy such as addresses, credit card information not permited (crystal, 2009)
  • 23. this does not seem to be a large issue at this stage but a good safeguard non the less.
  • 24. Violence or threats (crystal, 2009)
  • 25. a reprehensible form of cyber bullying that will only be acted upon after the person under attack has complained.
  • 26.
  • 27. References unknown. (2009, September). Twitter / Twitter Terms of Service. Retrieved October 4, 2009, from https://twitter.com/tos . unknown. (2007, March). Twitter / Twitter Privacy Policy. Retrieved October 4, 2009, from https://twitter.com/privacy . crystal. (2009, January). Twitter Support :: The Twitter Rules. Retrieved October 4, 2009, from http://help.twitter.com/forums/26257/entries/18311 .