Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Net303 Policy Primer Google Drive
1. NET303 Policy Primer
Curtin University
Ian Morrison
Image source: Thomas, G (2008) CC License
2. (Procopio, 2013)
Image source: Morrison (2014) CC licence
Google Drive lets you create and edit, disseminate
information, collaborate with others and access files
remotely online, ‘in the cloud.’
You can create documents, spreadsheets and
presentations, it stores your information, photos,
music and videos and add-on tools are available.
Individuals use it for personal use, students, groups
and companies for business.
It’s convenient, no software is required, you can
access your data anywhere through a web browser on
PC or mobile device, and it’s free.
However, you need a Google account such as Gmail
to gain access which means you need to give over
some information about yourself.
3. Image source: Cann (2012) Changes made CC licence
Google are in the business of information, your
information (Google, n.d.).
By controlling your information Google can serve
you ads which is how the make their money (Fuchs,
2011).
Their aim is to gather as much information about
you as possible, you are their product (Fuchs, 2011).
Your information is also sold to 3rd party advertisers
so they can also serve you ads (Fuchs, 2011).
This is why the service is free, you get Google Drive
and in return they get to commodify and profit from
your information.
4. Image source: Coggins (2006) Changes made CC licence
Most user terms of service are long, complex,
unfriendly and deliberately hard to read and why most
people do not read them at all (Hoback 2014).
Google’s terms are long and hyperlinked over several
pages including their privacy policy and definitions
that also make it difficult to read.
They use vague and imprecise language such as ‘we
may’ or ‘our aim is’ and should be considered to mean
‘we do’ and ‘cannot guarantee.’
When you use Google Drive or any Google service,
you are agreeing to their terms even if you have not
read them (Google, 2014c).
Their terms govern the entire relationship between
you and Google and if you do not comply they can
take action now or at anytime into the future (Google, 2014c).
5. When you submit, store, send or receive you grant
Google and others they work with license to use,
modify and adapt your content... in part to operate,
improve and develop new services (Google, 2014c).
Essentially you are providing Google with free labour
and your content can be used for any purpose, and
shared with anyone they work with.
Image source: Coggins (2006) Changes made CC licence
It could be shared with companies or individuals you
disapprove of, and if Google work with the
government it could be shared there or their agencies.
They are under no obligation to notify you when or
how your content is used and the license continues
even if you choose to no longer use the service.
Google’s terms are not set in stone and can be
modified without your knowledge at any time yet there
is more you should consider.
6. Image source: Licht (2013) Changes made CC licence
The more your content is monitored the more
searchable it becomes, and the longer it is stored
makes it searchable into the future (Lessig, 1998, p.10).
Google collect or mine information in two ways, what
you give them and what they take (Google, 2014b).
Google raise their surveillance ability by combining
information networked between other Google services
(Lyon, 2002, p.247).
Their terms state an automated system conducts such
surveillance, “this analysis occurs as your content is
sent, received, and when it is stored” (Google, 2014c).
You are effectively under surveillance, your private
documents, spreadsheets, music, videos, everything.
7. Image source: Licht (2013) CC licence
Google have the right to place cookies and identifiers
on your computer, that’s right on your computer (Google,
2014a).
These bits of code store preferences and other
undisclosed information and should raise concern of
exactly what information they are referring (Google, 2014a).
Cookies and identifiers have been used by security
agencies to monitor user content and activity (Soltani,
Peterson, & Gellman, 2013).
You can set your browser to block Google cookies
however conveniently the service may no longer
function correctly (Google, 2014).
This is Google exercising their power over you, with
the threat of a functionless services, because cookies
contribute to their constant monitoring.
8. When you store data in the cloud your control over
that data is weakened (Clearinghouse, 2014).
You relinquish control of information to others who
you rely on to protect you against security
vulnerabilities, court orders, breaches from hackers,
employees and external entities (Clearinghouse, 2014).
Google’s policy claims they review and work hard to
protect your information from unauthorised access,
protecting your privacy (Google, 2014b).
Google Gmail was hacked in September 2014, up to 5
million user names and passwords compromised,
Gmail is in the cloud (Lerner, 2014).
Essentially cloud computing and Google Drive cannot
guarantee your privacy.
“control over knowledge about oneself” (Fried, 1968)
Image source: g4ll4is (2013) Changes made CC licence
9. Image source: g4ll4is (2013) Changes made CC licence
Google terms give them the right to collect your
personal account information such as name, photo,
email and verifying phone number (Google, 2014b).
They collect your IP address unique to your computer
or device and its connection to the internet (Google, 2014b).
Google also collect the type of device you use, the
model and operating system. This information has no
relevance to working in the cloud (Google, 2014b).
This helps create an identifiable profile of who you
are, and from your information gathered enables
Google to categorise you.
“control over knowledge about oneself” (Fried, 1968)
10. Image source: g4ll4is (2013) Changes made CC licence
It is has been posed that privacy could merely create
context for deceit and hypocrisy to flourish (Introna, 1997).
Google claim to care about your privacy but will share
your personal information they deem reasonably
necessary to meet applicable laws (Google, 2014b).
If requested they will hand over your information when
a potential violation has occurred, potential? (Google, 2014b).
Your information is most likely innocent yet they will
share it with governments and security agencies to
prevent something from happening, prevent? (Google,
2014b).
“control over knowledge about oneself” (Fried, 1968)
11. Google claim your content belongs to you and you
remain its rightful owner (Google, 2014c).
They do however use your data to operate, improve
and develop new services.
You relinquish your copyright to Google in doing so
enabling them to grow their business.
Google do not credit your assistance in improving or
creating new services, yet are willing to respond
against you for alleged copyright breaches, alleged?
Your content can be removed for an unproven
copyright breach, no questions asked.
Image source: Public Domain
12. Google drive is one of many Google products in the
cloud, providing online access to store, create and edit
documents and files.
Google are in the business of obtaining information,
your information and that is why using Google drive is
free.
You agree to Google's terms even if you have not
read them, there is no express consent required, your
use binds you to their terms and privacy policy.
Google use their terms to conduct wide scale mass
surveillance of your sent, received and stored content.
Your privacy is not protected by Google’s terms nor
can Google guarantee your privacy in the cloud from
other entities.
Google will enforce copyright notices even while using
your copyrighted content to operate, improve and
create new products.
13. Thank you for watching, I hope this introduction has
shed some light on your rights and responsibilities
and encourages active engagement with the terms
that govern your use of Google Drive.
14. References
Cann, A. J. (2012). Information literacy. [Digital Image] Retrieved from
http://www.flickr.com/photos/ajc1/7745480006/in/photolist-cNrBmJ- 6q4ey3-4dvej1-8Zp6Uh-5nDMns-
6Ky2vw-cEtrZw-5qRfXr-5ovUgu-6cZdgt-cAswZb-drFzGJ-eiRYcK-5nDMnJ-4coVuv-cyNqJy-7QfDuU-
9X3jEd-eiYE8d-5nDMno-9absfJ-cXyXGC-446z2V-7cDAaw-5nDNfb-q31qk-ksgK3R-ksgJDV-arBfvb-6DjwLb-
5z8U3o-5qVFo9-gg3U6y-4e5zt2-8S83Tu-5nDNff-9abNF7-e4QnqR-a655W9-446D8t-fwzFWQ-6HMFkh-
CdiXb-cAswSW-cAsx51-omJrcs-5GpPns-jpvQ2-6XpV5N-kWtpLR
Clearinghouse (2014). Privacy and the Internet: Travelling in Cyberspace Safely. Retrieved from
https://www.privacyrights.org/online-privacy-using-internet-safely
Coggins, M. (2006). Private Eye Handcuffed to a Speaker [Digital Image]. Retrieved from
http://www.flickr.com/photos/markcoggins/160198015/in/photolist-fa4hK-bnjU3k-9KpdMV-4EB6Cq-be3QkB-hJ9eX-
6wn9nG-8ZghLj-bDC68B-5VC62S-bnjTNF-b7MZQe-ejxACU-nzdi73-7hSnio-adkXaX-8ZghGC-
9T3H8W-9tUTfg-4rkLC-8ZghCA-bqVPdt-e4r38S-q7mYh-8f7FoE-8Zghoq-4EVbXY-6RFiyQ-4gtKy4-gbiu11-
8hDzmp-4gxNTE-dzK2td-i93W8q-6dDy7q-5iwLyo-6kGDd-2c5Ydq-aVh5bz-9b8JYi-53115r-7HmWH8-5vekMQ-
54uUxo-6CRhRH-6RBkH8-535f4E-ft5SJF-fjGUT2-9ix8HR
Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475-493.
Fuchs, C. (2011). A Contribution to the Critique of the Political Economy of Google. Retrieved from
http://www.uta.edu/huma/agger/ fastcapitalism/8_1/fuchs8_1.html
g4ll4is. (2013). Privacy [Digital Image]. Retrieved from http://www.flickr.com/photos/g4ll4is/8521624548/in/photolist-82djZx-
84VZAr-dZ2y6b-azTdMo-4EvWY9-822bu2-eARcff-4WrJkA-o3MtjS-66r3T6-dRuMzt-ddpg14-7ZRTUP-7
fNVzm-5UYfNP-4jkHD-axwagd-48ybNM-iCz9t-6wCshe
Google (2014a). Google Key Terms. Retrieved from
http://www.google.com/policies/privacy/key-terms/#toc-terms-application-data-cache
15. Google. (2014b). Google Privacy Policy. Retrieved from http://www.google.com/policies/privacy/
Google. (2014c). Google Terms of Service. Retrieved from
https://www.google.com.au/intl/en/policies/terms/regional.html
Google. (n.d.). Google’s mission is to organize the world’s information and make it universally accessible and useful.
Retrieved from https://www.google.com.au/about/company/
Hoback, C. (2014). Terms and conditions may apply [Video file] Retrieved from
https://vimeo.com/ondemand/tacma/75993945
Introna, L. D. (1997). Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy,
28(3), 259-275. http://dx.doi.org/10.1111/1467-9973.00055
Lerner, K. (2014). 5M Gmail Addresses, Passwords Leaked On Online Forum. Retrieved from
http://www.law360.com/articles/575999/5m-gmail-addresses-passwords-leaked-on-online-forum
Lessig, L. (1998). The Architecture of Privacy. Retrieved from
http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf
Licht, M. (2013). Internet Surveillance [Digital Image]. Retrieved from
http://www.flickr.com/photos/notionscapital/8566082872/in/photolist-e3Xq11-6v71oR-66r3T6-dv9DfT-
6GWi9g-f4A53y-6H1oau-7w6rDr-7w6rvP-5TXEX-6wRqgn-dvfbqd-8L7dxP-nyFqT3-nynA6V-dFVnnT-nhaTLa-
nyq5rj-eQhHRM-6GVSiZ-9xKKsZ-8sqSfY-SxLvj-uhivV-z9fMF-f4eRvV-6X5nzY-qJok3-nt1FUe-
4KYQpB-FThKZ-qJokG-ggT2Cv-9kQQ6-9kQU2-9kQRS-qJoj5-VZxyW-99MLY-4NxwJ-aPnSB-hRdwNo-
8jpL4A-dFVnTt-CVPYj-uCALg-93VXwL-kzoa3a-eQkvVH-eQknJF
16. Lyon, D. (2002). Everyday Surveillance: Personal data and social classifications. Information, Communication &
Society, 5(2), 242-257.http://dx.doi.org/10.1080/13691180210130806
Morrison, I (2014) 3 Stripes [Digital Image] Retrieved from Personal Files
Soltani, A., Peterson, A., & Gellman, B. (2013). NSA uses Google cookies to pinpoint targets for hacking. Retrieved
from http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-
targets-for-hacking/
Thomas, G. (2008). cloud-computing (1) [Digital Image]. Retrieved from
http://www.flickr.com/photos/incredibleguy/6937250243/in/photolist- eAZ7cy-bz2dNP-9Eg22c-5ksVR8-
5kximC-6zkb5E-4WqjNi-bPoKuR-hxUJ4g-4NcWLj-4N8JiD-4N8Kua-4NdDr2-bx1LMh-8cqvMc-5kt1fX-
5ksZcR-5kx9E9-5ksZyz-5kxhQf-5ksRWP-9hMa2d-9hM9XQ-9hJ4e4-9hJ4a8-9hJ45x-9hM9Hs-io1t3T-jU3dVp-
5GpPns-6hd6ad-io1mct-9LhWwo-7NBakB-5kxhpE-5ksTDK-5kxbLq-5ksYt8-5ksYPp-5kxa8W-
5kx9dC-7HtYgd-e2SHjR-9S5Pa8-bnVZHC-9cdaTq-7Hfa7K-8rwVKj-8rwVj9-8rtPag Creative Common
License: https://creativecommons.org/licenses/by/2.0/
Procopio, M. (2013). Instant Google Drive Starter. Birmingham: Birmingham: Packt Publishing