Online policy primer


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Online policy primer

  1. 1. Net 303 – Internet, Politics and Power
  2. 2. Twitter – You are what you tweet! Approximately 200 Million (Sheils, 2011) Users Worldwide1 and is one of the fastest (Carmichael, 2011) growing social networks!2 What you say on Twitter can be viewed around the world instantly! Your content can reach millions quickly!
  3. 3. The Twitter Terms of ServiceChances are you ticked the terms of service box to sign up for Twitter without reading the agreement... So what does using mean for you??
  4. 4. So who owns your content?You!... Sort of. What Twitter gets? You retain your rights to any  By submitting, posting or Content you submit, post or display displaying Content on or on or through the Services. (Terms, 2011 A) through the Services, you grant us a worldwide, non- exclusive, royalty-free license (with the right to sublicense) to use, copy, reproduce, process, adapt, modify, publish, trans mit, display and distribute such Content in any and all media or distribution methods (now known or later developed). (Terms, 2011 B)
  5. 5. Why is my tweet on the news? Twitter can make your content “available to other companies, organizations or individuals who partner with Twitter for the syndication, broadcast, distribution or publication of such Content on other media and services” (Terms, 2011 C) Despite this, Twitter still claims “what’s yours is yours – you own your Content (and your photos are part of that Content)”
  6. 6. If I post something that’s not mine? Be careful! If you post content without rights to use or deemed to infringe copyright you (not Twitter!) will be liable. It’s ‘your’ content. Twitter holds no responsibility or liability for the content you upload. Twitter reserves the right to remove any infringing content without prior notice.
  7. 7. What can I tweet about? No impersonation or posting of another’s private information No copyright or trademark information No violence or threats No illegal activities No SPAM! No Phishing or Malware No pornography
  8. 8. Rules made to be broken? If you break Twitter’s content rules your account may be suspended.
  9. 9. I Googled myself...Your Twitter profile is likely to turn up in Google searches UNLESS you:1. Change your name2. Change your username3. “Protect” your TweetsTwitter accounts default to a public setting! Protected accounts limit visibility.
  10. 10. My privacy is important!Some information is publicly listed, eg your name, username, picture, bio and location. (Privacy, 2011 A)Twitter is “primarily designed to help you share information with the world... information you provide to us is information you are asking us to make public.” (Privacy, 2011B)
  11. 11. What information does Twitterrecord? Location • Search Terms • IP Address • Pages Visited Browser Type • Links • Mobile Carrier • Device ID ... “Mass Dataveillence!”(Lessig, L. 1998) •Twitter collects data on you through cookie technology. Twitter allows (unnamed) associated third parties to collect your personal information and data about you!
  12. 12. Why does Twitter want to know somuch about me? 1)
  13. 13. Too young to Tweet? Twitter is not for children under age 139 Twitter does not actively monitor content and may not be aware of your child’s safety issues (but can remove content on request)Children may not be aware of content sharing risks:You don’t want your child to become the next...
  14. 14. Still a Twitterphile? Just keep in mind: Your privacy is important! Check your account settings and know what you are sharing. Be aware online! Social media sites are fantastic tools but use them with eyes open to their potential risks.And lastly... Don’t just take my word for it! Be ‘tweet smart’: read the Terms of Service!
  15. 15. References:1) Sheils, M (2011) Twitter Co-Founder Jack Dorset Rejoins Company, BBC News Business. Retrieved from Carmichael, M. (2011) Uncovering Just Who’s Your Friend Or Follower, Advertising Age, 82(20), p12. Retrieved from Terms of Service (2011 A). Retrieved from Terms of Service (2011 B). Retrieved from Terms of Service (2011 C). Retrieved from Privacy (2011 A). Retrieved from Privacy (2011 B). Retrieved from Zittrain, J. (2008) Meeting the Risks of Generativity: Privacy 2.0, The Future of the Internet and How to Stop it. Retrieved from Lessig, L. (1998) The Architecture of Privacy. Retrieved from Safety (2011). Retrieved from violation/topics/166-safety-center/articles/470968-safety-parent-and-teen-tips