Google’s Terms Of Service Privacy, Surveillance  & Censorship
Privacy and Personal Information <ul><li>When using Google’s services you agree to the use of your data in accordance with...
Search Privacy <ul><li>When you access Google’s search services, their servers record information that your browser sends ...
<ul><li>If search logs are revealed to third parties great harm can be caused, these logs make it quite easy for governmen...
Surveillance <ul><li>Google’s privacy policy states that location data is collected trough services such as Google Maps fo...
<ul><li>The Internet, and subsequent technologies that rely on the Internet such as Google maps for mobile, has enabled in...
<ul><li>Through the implementation of services such as, Google Street View Australia, privacy advocates are concerned that...
<ul><li>Although the images containing faces and number plates used for Google Street View have had blurring technology ap...
<ul><li>Not only is privacy a concern with regards to Google’s application of data collection but the points raised also l...
Censorship <ul><li>Google reserves the right, without obligation to pre screen, review, flag, filter, modify, refuse or re...
<ul><li>This right to ‘censor information’ by Google is evident within China where Google.cn is trying to balance censorsh...
<ul><li>China has invested over $700 million in trying to purify the Internet through censorship  and is currently achievi...
Conclusion  <ul><li>You are solely responsible for any content that you create, transmit or display while using any servic...
References <ul><li>August, O. (2007). &quot;The Great Firewall: China's Misguided — and Futile — Attempt to Control What H...
References <ul><li>Peter Eckersley, S. S., Kevin Bankston, and Derek Slater. (2006). &quot;Six Tips to Protect Your Search...
References <ul><li>Technology, C. f. D. a. (2005). &quot;Why Am I Getting All This Spam? </li></ul><ul><li>Unsolicited Com...
Upcoming SlideShare
Loading in …5
×

Google Terms of Service, Privacy, Surveillance and Censorship

1,402 views
1,353 views

Published on

Succinct presentation summarizing the key features, and related issues, of the terms of Service for Google

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,402
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
42
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Google Terms of Service, Privacy, Surveillance and Censorship

  1. 1. Google’s Terms Of Service Privacy, Surveillance & Censorship
  2. 2. Privacy and Personal Information <ul><li>When using Google’s services you agree to the use of your data in accordance with Google’s privacy policies </li></ul>
  3. 3. Search Privacy <ul><li>When you access Google’s search services, their servers record information that your browser sends whenever you visit a website. Information such as your IP address, browser type, browser language and the date and time of your request is collected. </li></ul>
  4. 4. <ul><li>If search logs are revealed to third parties great harm can be caused, these logs make it quite easy for government agencies or other individuals to “subpoena your search provider and get access to your search history” potentially exposing highly private information. </li></ul>
  5. 5. Surveillance <ul><li>Google’s privacy policy states that location data is collected trough services such as Google Maps for mobile. This enables Google to receive information about your actual location or information that can be used to approximate your location. </li></ul>
  6. 6. <ul><li>The Internet, and subsequent technologies that rely on the Internet such as Google maps for mobile, has enabled individuals to jeopardize privacy more thoroughly than in years past, providing a challenge for legislators to govern breaches of privacy. </li></ul>
  7. 7. <ul><li>Through the implementation of services such as, Google Street View Australia, privacy advocates are concerned that Google is putting commercial gain before privacy rights. </li></ul>
  8. 8. <ul><li>Although the images containing faces and number plates used for Google Street View have had blurring technology applied, the concern of identification through other distinguishing features remains. </li></ul>
  9. 9. <ul><li>Not only is privacy a concern with regards to Google’s application of data collection but the points raised also lead me to question the levels of surveillance undertaken by Google for commercial gain through services such as Google Street View. </li></ul>
  10. 10. Censorship <ul><li>Google reserves the right, without obligation to pre screen, review, flag, filter, modify, refuse or remove any or all content from any service. </li></ul>
  11. 11. <ul><li>This right to ‘censor information’ by Google is evident within China where Google.cn is trying to balance censorship with the company’s goal of making the world’s information widely available. </li></ul>
  12. 12. <ul><li>China has invested over $700 million in trying to purify the Internet through censorship and is currently achieving this goal with the assistance of Google. </li></ul>
  13. 13. Conclusion <ul><li>You are solely responsible for any content that you create, transmit or display while using any services offered by Google and for the consequences of your actions by doing so. </li></ul>
  14. 14. References <ul><li>August, O. (2007). &quot;The Great Firewall: China's Misguided — and Futile — Attempt to Control What Happens Online.&quot; Retrieved 24th Oct, 2009. </li></ul><ul><li>Colley, A. (2008). Privacy advocates say Google's gone too far. The Australian. </li></ul><ul><li>Kaushal, N. (2009). &quot;Google Employee Sued For TOS Violation.&quot; Retrieved 23rd Oct, 2009, from http://www.webpronews.com/blogtalk/2009/04/13/google-employee-sued-for-tos-violation-0. </li></ul><ul><li>Krazit, T. (2009). &quot;Google's censorship struggles continue in China.&quot; Retrieved 24th Oct, 2009, from http://news.cnet.com/8301-17939_109-10265123-2.html. </li></ul><ul><li>Muhl, C. (2003). &quot;Workplace e-mail and Internet use: employees and employers beware.&quot; Monthly Labor Review, February. </li></ul>
  15. 15. References <ul><li>Peter Eckersley, S. S., Kevin Bankston, and Derek Slater. (2006). &quot;Six Tips to Protect Your Search Privacy.&quot; Retrieved 25th Oct, 2009, from http://www.eff.org/wp/six-tips-protect-your-search-privacy. </li></ul><ul><li>Technology, C. f. D. a. (2005). &quot;Why Am I Getting All This Spam? </li></ul><ul><li>Unsolicited Commercial E-mail Research Six Month Report.&quot; Retrieved 23rd Oct, 2009, from http://www.cdt.org/speech/spam/030319spamreport.shtml. </li></ul><ul><li>Waterfield, B. (2007). Google to pay £2.4m over 'copyright breach'. Telegraph.co.uk. </li></ul><ul><li>Zittrain, J. (n.d.). &quot;Meeting the Risks of Generativity.&quot; Privacy 2.0. Retrieved 24th Oct, 2009, from http://yupnet.org/zittrain/archives/20. </li></ul><ul><li>Peter Eckersley, S. S., Kevin Bankston, and Derek Slater. (2006). &quot;Six Tips to Protect Your Search Privacy.&quot; Retrieved 25th Oct, 2009, from http://www.eff.org/wp/six-tips-protect-your-search-privacy. </li></ul>
  16. 16. References <ul><li>Technology, C. f. D. a. (2005). &quot;Why Am I Getting All This Spam? </li></ul><ul><li>Unsolicited Commercial E-mail Research Six Month Report.&quot; Retrieved 23rd Oct, 2009, from http://www.cdt.org/speech/spam/030319spamreport.shtml. </li></ul><ul><li>Waterfield, B. (2007). Google to pay £2.4m over 'copyright breach'. Telegraph.co.uk. </li></ul><ul><li>Zittrain, J. (n.d.). &quot;Meeting the Risks of Generativity.&quot; Privacy 2.0. Retrieved 24th Oct, 2009, from http://yupnet.org/zittrain/archives/20. </li></ul>

×