SlideShare a Scribd company logo
1 of 16
NET303 Policy Primer 
Curtin University 
Ian Morrison 
Image source: Thomas, G (2008) CC License
(Procopio, 2013) 
Image source: Morrison (2014) CC licence 
Google Drive lets you create and edit, disseminate 
information, collaborate with others and access files 
remotely online, ‘in the cloud.’ 
You can create documents, spreadsheets and 
presentations, it stores your information, photos, 
music and videos and add-on tools are available. 
Individuals use it for personal use, students, groups 
and companies for business. 
It’s convenient, no software is required, you can 
access your data anywhere through a web browser on 
PC or mobile device, and it’s free. 
However, you need a Google account such as Gmail 
to gain access which means you need to give over 
some information about yourself.
Image source: Cann (2012) Changes made CC licence 
Google are in the business of information, your 
information (Google, n.d.). 
By controlling your information Google can serve 
you ads which is how the make their money (Fuchs, 
2011). 
Their aim is to gather as much information about 
you as possible, you are their product (Fuchs, 2011). 
Your information is also sold to 3rd party advertisers 
so they can also serve you ads (Fuchs, 2011). 
This is why the service is free, you get Google Drive 
and in return they get to commodify and profit from 
your information.
Image source: Coggins (2006) Changes made CC licence 
Most user terms of service are long, complex, 
unfriendly and deliberately hard to read and why most 
people do not read them at all (Hoback 2014). 
Google’s terms are long and hyperlinked over several 
pages including their privacy policy and definitions 
that also make it difficult to read. 
They use vague and imprecise language such as ‘we 
may’ or ‘our aim is’ and should be considered to mean 
‘we do’ and ‘cannot guarantee.’ 
When you use Google Drive or any Google service, 
you are agreeing to their terms even if you have not 
read them (Google, 2014c). 
Their terms govern the entire relationship between 
you and Google and if you do not comply they can 
take action now or at anytime into the future (Google, 2014c).
When you submit, store, send or receive you grant 
Google and others they work with license to use, 
modify and adapt your content... in part to operate, 
improve and develop new services (Google, 2014c). 
Essentially you are providing Google with free labour 
and your content can be used for any purpose, and 
shared with anyone they work with. 
Image source: Coggins (2006) Changes made CC licence 
It could be shared with companies or individuals you 
disapprove of, and if Google work with the 
government it could be shared there or their agencies. 
They are under no obligation to notify you when or 
how your content is used and the license continues 
even if you choose to no longer use the service. 
Google’s terms are not set in stone and can be 
modified without your knowledge at any time yet there 
is more you should consider.
Image source: Licht (2013) Changes made CC licence 
The more your content is monitored the more 
searchable it becomes, and the longer it is stored 
makes it searchable into the future (Lessig, 1998, p.10). 
Google collect or mine information in two ways, what 
you give them and what they take (Google, 2014b). 
Google raise their surveillance ability by combining 
information networked between other Google services 
(Lyon, 2002, p.247). 
Their terms state an automated system conducts such 
surveillance, “this analysis occurs as your content is 
sent, received, and when it is stored” (Google, 2014c). 
You are effectively under surveillance, your private 
documents, spreadsheets, music, videos, everything.
Image source: Licht (2013) CC licence 
Google have the right to place cookies and identifiers 
on your computer, that’s right on your computer (Google, 
2014a). 
These bits of code store preferences and other 
undisclosed information and should raise concern of 
exactly what information they are referring (Google, 2014a). 
Cookies and identifiers have been used by security 
agencies to monitor user content and activity (Soltani, 
Peterson, & Gellman, 2013). 
You can set your browser to block Google cookies 
however conveniently the service may no longer 
function correctly (Google, 2014). 
This is Google exercising their power over you, with 
the threat of a functionless services, because cookies 
contribute to their constant monitoring.
When you store data in the cloud your control over 
that data is weakened (Clearinghouse, 2014). 
You relinquish control of information to others who 
you rely on to protect you against security 
vulnerabilities, court orders, breaches from hackers, 
employees and external entities (Clearinghouse, 2014). 
Google’s policy claims they review and work hard to 
protect your information from unauthorised access, 
protecting your privacy (Google, 2014b). 
Google Gmail was hacked in September 2014, up to 5 
million user names and passwords compromised, 
Gmail is in the cloud (Lerner, 2014). 
Essentially cloud computing and Google Drive cannot 
guarantee your privacy. 
“control over knowledge about oneself” (Fried, 1968) 
Image source: g4ll4is (2013) Changes made CC licence
Image source: g4ll4is (2013) Changes made CC licence 
Google terms give them the right to collect your 
personal account information such as name, photo, 
email and verifying phone number (Google, 2014b). 
They collect your IP address unique to your computer 
or device and its connection to the internet (Google, 2014b). 
Google also collect the type of device you use, the 
model and operating system. This information has no 
relevance to working in the cloud (Google, 2014b). 
This helps create an identifiable profile of who you 
are, and from your information gathered enables 
Google to categorise you. 
“control over knowledge about oneself” (Fried, 1968)
Image source: g4ll4is (2013) Changes made CC licence 
It is has been posed that privacy could merely create 
context for deceit and hypocrisy to flourish (Introna, 1997). 
Google claim to care about your privacy but will share 
your personal information they deem reasonably 
necessary to meet applicable laws (Google, 2014b). 
If requested they will hand over your information when 
a potential violation has occurred, potential? (Google, 2014b). 
Your information is most likely innocent yet they will 
share it with governments and security agencies to 
prevent something from happening, prevent? (Google, 
2014b). 
“control over knowledge about oneself” (Fried, 1968)
Google claim your content belongs to you and you 
remain its rightful owner (Google, 2014c). 
They do however use your data to operate, improve 
and develop new services. 
You relinquish your copyright to Google in doing so 
enabling them to grow their business. 
Google do not credit your assistance in improving or 
creating new services, yet are willing to respond 
against you for alleged copyright breaches, alleged? 
Your content can be removed for an unproven 
copyright breach, no questions asked. 
Image source: Public Domain
Google drive is one of many Google products in the 
cloud, providing online access to store, create and edit 
documents and files. 
Google are in the business of obtaining information, 
your information and that is why using Google drive is 
free. 
You agree to Google's terms even if you have not 
read them, there is no express consent required, your 
use binds you to their terms and privacy policy. 
Google use their terms to conduct wide scale mass 
surveillance of your sent, received and stored content. 
Your privacy is not protected by Google’s terms nor 
can Google guarantee your privacy in the cloud from 
other entities. 
Google will enforce copyright notices even while using 
your copyrighted content to operate, improve and 
create new products.
Thank you for watching, I hope this introduction has 
shed some light on your rights and responsibilities 
and encourages active engagement with the terms 
that govern your use of Google Drive.
References 
Cann, A. J. (2012). Information literacy. [Digital Image] Retrieved from 
http://www.flickr.com/photos/ajc1/7745480006/in/photolist-cNrBmJ- 6q4ey3-4dvej1-8Zp6Uh-5nDMns- 
6Ky2vw-cEtrZw-5qRfXr-5ovUgu-6cZdgt-cAswZb-drFzGJ-eiRYcK-5nDMnJ-4coVuv-cyNqJy-7QfDuU- 
9X3jEd-eiYE8d-5nDMno-9absfJ-cXyXGC-446z2V-7cDAaw-5nDNfb-q31qk-ksgK3R-ksgJDV-arBfvb-6DjwLb- 
5z8U3o-5qVFo9-gg3U6y-4e5zt2-8S83Tu-5nDNff-9abNF7-e4QnqR-a655W9-446D8t-fwzFWQ-6HMFkh- 
CdiXb-cAswSW-cAsx51-omJrcs-5GpPns-jpvQ2-6XpV5N-kWtpLR 
Clearinghouse (2014). Privacy and the Internet: Travelling in Cyberspace Safely. Retrieved from 
https://www.privacyrights.org/online-privacy-using-internet-safely 
Coggins, M. (2006). Private Eye Handcuffed to a Speaker [Digital Image]. Retrieved from 
http://www.flickr.com/photos/markcoggins/160198015/in/photolist-fa4hK-bnjU3k-9KpdMV-4EB6Cq-be3QkB-hJ9eX- 
6wn9nG-8ZghLj-bDC68B-5VC62S-bnjTNF-b7MZQe-ejxACU-nzdi73-7hSnio-adkXaX-8ZghGC- 
9T3H8W-9tUTfg-4rkLC-8ZghCA-bqVPdt-e4r38S-q7mYh-8f7FoE-8Zghoq-4EVbXY-6RFiyQ-4gtKy4-gbiu11- 
8hDzmp-4gxNTE-dzK2td-i93W8q-6dDy7q-5iwLyo-6kGDd-2c5Ydq-aVh5bz-9b8JYi-53115r-7HmWH8-5vekMQ- 
54uUxo-6CRhRH-6RBkH8-535f4E-ft5SJF-fjGUT2-9ix8HR 
Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475-493. 
Fuchs, C. (2011). A Contribution to the Critique of the Political Economy of Google. Retrieved from 
http://www.uta.edu/huma/agger/ fastcapitalism/8_1/fuchs8_1.html 
g4ll4is. (2013). Privacy [Digital Image]. Retrieved from http://www.flickr.com/photos/g4ll4is/8521624548/in/photolist-82djZx- 
84VZAr-dZ2y6b-azTdMo-4EvWY9-822bu2-eARcff-4WrJkA-o3MtjS-66r3T6-dRuMzt-ddpg14-7ZRTUP-7 
fNVzm-5UYfNP-4jkHD-axwagd-48ybNM-iCz9t-6wCshe 
Google (2014a). Google Key Terms. Retrieved from 
http://www.google.com/policies/privacy/key-terms/#toc-terms-application-data-cache
Google. (2014b). Google Privacy Policy. Retrieved from http://www.google.com/policies/privacy/ 
Google. (2014c). Google Terms of Service. Retrieved from 
https://www.google.com.au/intl/en/policies/terms/regional.html 
Google. (n.d.). Google’s mission is to organize the world’s information and make it universally accessible and useful. 
Retrieved from https://www.google.com.au/about/company/ 
Hoback, C. (2014). Terms and conditions may apply [Video file] Retrieved from 
https://vimeo.com/ondemand/tacma/75993945 
Introna, L. D. (1997). Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy, 
28(3), 259-275. http://dx.doi.org/10.1111/1467-9973.00055 
Lerner, K. (2014). 5M Gmail Addresses, Passwords Leaked On Online Forum. Retrieved from 
http://www.law360.com/articles/575999/5m-gmail-addresses-passwords-leaked-on-online-forum 
Lessig, L. (1998). The Architecture of Privacy. Retrieved from 
http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf 
Licht, M. (2013). Internet Surveillance [Digital Image]. Retrieved from 
http://www.flickr.com/photos/notionscapital/8566082872/in/photolist-e3Xq11-6v71oR-66r3T6-dv9DfT- 
6GWi9g-f4A53y-6H1oau-7w6rDr-7w6rvP-5TXEX-6wRqgn-dvfbqd-8L7dxP-nyFqT3-nynA6V-dFVnnT-nhaTLa- 
nyq5rj-eQhHRM-6GVSiZ-9xKKsZ-8sqSfY-SxLvj-uhivV-z9fMF-f4eRvV-6X5nzY-qJok3-nt1FUe- 
4KYQpB-FThKZ-qJokG-ggT2Cv-9kQQ6-9kQU2-9kQRS-qJoj5-VZxyW-99MLY-4NxwJ-aPnSB-hRdwNo- 
8jpL4A-dFVnTt-CVPYj-uCALg-93VXwL-kzoa3a-eQkvVH-eQknJF
Lyon, D. (2002). Everyday Surveillance: Personal data and social classifications. Information, Communication & 
Society, 5(2), 242-257.http://dx.doi.org/10.1080/13691180210130806 
Morrison, I (2014) 3 Stripes [Digital Image] Retrieved from Personal Files 
Soltani, A., Peterson, A., & Gellman, B. (2013). NSA uses Google cookies to pinpoint targets for hacking. Retrieved 
from http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint- 
targets-for-hacking/ 
Thomas, G. (2008). cloud-computing (1) [Digital Image]. Retrieved from 
http://www.flickr.com/photos/incredibleguy/6937250243/in/photolist- eAZ7cy-bz2dNP-9Eg22c-5ksVR8- 
5kximC-6zkb5E-4WqjNi-bPoKuR-hxUJ4g-4NcWLj-4N8JiD-4N8Kua-4NdDr2-bx1LMh-8cqvMc-5kt1fX- 
5ksZcR-5kx9E9-5ksZyz-5kxhQf-5ksRWP-9hMa2d-9hM9XQ-9hJ4e4-9hJ4a8-9hJ45x-9hM9Hs-io1t3T-jU3dVp- 
5GpPns-6hd6ad-io1mct-9LhWwo-7NBakB-5kxhpE-5ksTDK-5kxbLq-5ksYt8-5ksYPp-5kxa8W- 
5kx9dC-7HtYgd-e2SHjR-9S5Pa8-bnVZHC-9cdaTq-7Hfa7K-8rwVKj-8rwVj9-8rtPag Creative Common 
License: https://creativecommons.org/licenses/by/2.0/ 
Procopio, M. (2013). Instant Google Drive Starter. Birmingham: Birmingham: Packt Publishing

More Related Content

Similar to Net303 Policy Primer Google Drive

Google Search Policy Primer
Google Search Policy PrimerGoogle Search Policy Primer
Google Search Policy PrimerBarnes 013
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy PrimerIrene Pollak
 
Daniels Fund Ethics Initiative University of New Mexico .docx
Daniels Fund Ethics Initiative  University of New Mexico  .docxDaniels Fund Ethics Initiative  University of New Mexico  .docx
Daniels Fund Ethics Initiative University of New Mexico .docxtheodorelove43763
 
Article 29 working group privacy letter to google
Article 29 working group privacy letter to googleArticle 29 working group privacy letter to google
Article 29 working group privacy letter to googleGreg Sterling
 
20121016 letter google-article-29-final
20121016 letter google-article-29-final20121016 letter google-article-29-final
20121016 letter google-article-29-finalGreg Sterling
 
La lettera dei Garanti UE al Ceo Google Larry Page
La lettera dei Garanti UE al Ceo Google Larry PageLa lettera dei Garanti UE al Ceo Google Larry Page
La lettera dei Garanti UE al Ceo Google Larry Pagecatdii
 
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...Greg Sterling
 
G-Mail - The Legendry Evolution.pdf
G-Mail - The Legendry Evolution.pdfG-Mail - The Legendry Evolution.pdf
G-Mail - The Legendry Evolution.pdfDigitalDiscount
 
Letter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesLetter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesGillian Shaw
 
Google Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and CensorshipGoogle Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and Censorshipkrthenson
 
Ethics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxEthics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxgitagrimston
 
Google complete, history, model, competitors ,
Google complete, history, model, competitors ,Google complete, history, model, competitors ,
Google complete, history, model, competitors ,ramzan asghar
 
Google and Artificial Intelligence: Things You Should Know 
Google and Artificial Intelligence: Things You Should Know Google and Artificial Intelligence: Things You Should Know 
Google and Artificial Intelligence: Things You Should Know PaulDonahue16
 
Presentation8(the google).pptx
Presentation8(the google).pptxPresentation8(the google).pptx
Presentation8(the google).pptxTanzimToaha
 
Final google drive-1
Final google drive-1Final google drive-1
Final google drive-1becka180
 
Google A Wonderful World
Google A Wonderful WorldGoogle A Wonderful World
Google A Wonderful WorldAsmaa El-Bamby
 
Net303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgNet303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgMuir_Net303
 
Why Google Scares People
Why Google Scares PeopleWhy Google Scares People
Why Google Scares PeopleLiudas Butkus
 

Similar to Net303 Policy Primer Google Drive (20)

Google Search Policy Primer
Google Search Policy PrimerGoogle Search Policy Primer
Google Search Policy Primer
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
Daniels Fund Ethics Initiative University of New Mexico .docx
Daniels Fund Ethics Initiative  University of New Mexico  .docxDaniels Fund Ethics Initiative  University of New Mexico  .docx
Daniels Fund Ethics Initiative University of New Mexico .docx
 
Article 29 working group privacy letter to google
Article 29 working group privacy letter to googleArticle 29 working group privacy letter to google
Article 29 working group privacy letter to google
 
20121016 letter google-article-29-final
20121016 letter google-article-29-final20121016 letter google-article-29-final
20121016 letter google-article-29-final
 
La lettera dei Garanti UE al Ceo Google Larry Page
La lettera dei Garanti UE al Ceo Google Larry PageLa lettera dei Garanti UE al Ceo Google Larry Page
La lettera dei Garanti UE al Ceo Google Larry Page
 
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
 
G-Mail - The Legendry Evolution.pdf
G-Mail - The Legendry Evolution.pdfG-Mail - The Legendry Evolution.pdf
G-Mail - The Legendry Evolution.pdf
 
Letter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesLetter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocates
 
Google Drive
Google Drive Google Drive
Google Drive
 
Google Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and CensorshipGoogle Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and Censorship
 
Ethics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxEthics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docx
 
Google complete, history, model, competitors ,
Google complete, history, model, competitors ,Google complete, history, model, competitors ,
Google complete, history, model, competitors ,
 
Google and Artificial Intelligence: Things You Should Know 
Google and Artificial Intelligence: Things You Should Know Google and Artificial Intelligence: Things You Should Know 
Google and Artificial Intelligence: Things You Should Know 
 
Google
 Google Google
Google
 
Presentation8(the google).pptx
Presentation8(the google).pptxPresentation8(the google).pptx
Presentation8(the google).pptx
 
Final google drive-1
Final google drive-1Final google drive-1
Final google drive-1
 
Google A Wonderful World
Google A Wonderful WorldGoogle A Wonderful World
Google A Wonderful World
 
Net303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgNet303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirg
 
Why Google Scares People
Why Google Scares PeopleWhy Google Scares People
Why Google Scares People
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 

Net303 Policy Primer Google Drive

  • 1. NET303 Policy Primer Curtin University Ian Morrison Image source: Thomas, G (2008) CC License
  • 2. (Procopio, 2013) Image source: Morrison (2014) CC licence Google Drive lets you create and edit, disseminate information, collaborate with others and access files remotely online, ‘in the cloud.’ You can create documents, spreadsheets and presentations, it stores your information, photos, music and videos and add-on tools are available. Individuals use it for personal use, students, groups and companies for business. It’s convenient, no software is required, you can access your data anywhere through a web browser on PC or mobile device, and it’s free. However, you need a Google account such as Gmail to gain access which means you need to give over some information about yourself.
  • 3. Image source: Cann (2012) Changes made CC licence Google are in the business of information, your information (Google, n.d.). By controlling your information Google can serve you ads which is how the make their money (Fuchs, 2011). Their aim is to gather as much information about you as possible, you are their product (Fuchs, 2011). Your information is also sold to 3rd party advertisers so they can also serve you ads (Fuchs, 2011). This is why the service is free, you get Google Drive and in return they get to commodify and profit from your information.
  • 4. Image source: Coggins (2006) Changes made CC licence Most user terms of service are long, complex, unfriendly and deliberately hard to read and why most people do not read them at all (Hoback 2014). Google’s terms are long and hyperlinked over several pages including their privacy policy and definitions that also make it difficult to read. They use vague and imprecise language such as ‘we may’ or ‘our aim is’ and should be considered to mean ‘we do’ and ‘cannot guarantee.’ When you use Google Drive or any Google service, you are agreeing to their terms even if you have not read them (Google, 2014c). Their terms govern the entire relationship between you and Google and if you do not comply they can take action now or at anytime into the future (Google, 2014c).
  • 5. When you submit, store, send or receive you grant Google and others they work with license to use, modify and adapt your content... in part to operate, improve and develop new services (Google, 2014c). Essentially you are providing Google with free labour and your content can be used for any purpose, and shared with anyone they work with. Image source: Coggins (2006) Changes made CC licence It could be shared with companies or individuals you disapprove of, and if Google work with the government it could be shared there or their agencies. They are under no obligation to notify you when or how your content is used and the license continues even if you choose to no longer use the service. Google’s terms are not set in stone and can be modified without your knowledge at any time yet there is more you should consider.
  • 6. Image source: Licht (2013) Changes made CC licence The more your content is monitored the more searchable it becomes, and the longer it is stored makes it searchable into the future (Lessig, 1998, p.10). Google collect or mine information in two ways, what you give them and what they take (Google, 2014b). Google raise their surveillance ability by combining information networked between other Google services (Lyon, 2002, p.247). Their terms state an automated system conducts such surveillance, “this analysis occurs as your content is sent, received, and when it is stored” (Google, 2014c). You are effectively under surveillance, your private documents, spreadsheets, music, videos, everything.
  • 7. Image source: Licht (2013) CC licence Google have the right to place cookies and identifiers on your computer, that’s right on your computer (Google, 2014a). These bits of code store preferences and other undisclosed information and should raise concern of exactly what information they are referring (Google, 2014a). Cookies and identifiers have been used by security agencies to monitor user content and activity (Soltani, Peterson, & Gellman, 2013). You can set your browser to block Google cookies however conveniently the service may no longer function correctly (Google, 2014). This is Google exercising their power over you, with the threat of a functionless services, because cookies contribute to their constant monitoring.
  • 8. When you store data in the cloud your control over that data is weakened (Clearinghouse, 2014). You relinquish control of information to others who you rely on to protect you against security vulnerabilities, court orders, breaches from hackers, employees and external entities (Clearinghouse, 2014). Google’s policy claims they review and work hard to protect your information from unauthorised access, protecting your privacy (Google, 2014b). Google Gmail was hacked in September 2014, up to 5 million user names and passwords compromised, Gmail is in the cloud (Lerner, 2014). Essentially cloud computing and Google Drive cannot guarantee your privacy. “control over knowledge about oneself” (Fried, 1968) Image source: g4ll4is (2013) Changes made CC licence
  • 9. Image source: g4ll4is (2013) Changes made CC licence Google terms give them the right to collect your personal account information such as name, photo, email and verifying phone number (Google, 2014b). They collect your IP address unique to your computer or device and its connection to the internet (Google, 2014b). Google also collect the type of device you use, the model and operating system. This information has no relevance to working in the cloud (Google, 2014b). This helps create an identifiable profile of who you are, and from your information gathered enables Google to categorise you. “control over knowledge about oneself” (Fried, 1968)
  • 10. Image source: g4ll4is (2013) Changes made CC licence It is has been posed that privacy could merely create context for deceit and hypocrisy to flourish (Introna, 1997). Google claim to care about your privacy but will share your personal information they deem reasonably necessary to meet applicable laws (Google, 2014b). If requested they will hand over your information when a potential violation has occurred, potential? (Google, 2014b). Your information is most likely innocent yet they will share it with governments and security agencies to prevent something from happening, prevent? (Google, 2014b). “control over knowledge about oneself” (Fried, 1968)
  • 11. Google claim your content belongs to you and you remain its rightful owner (Google, 2014c). They do however use your data to operate, improve and develop new services. You relinquish your copyright to Google in doing so enabling them to grow their business. Google do not credit your assistance in improving or creating new services, yet are willing to respond against you for alleged copyright breaches, alleged? Your content can be removed for an unproven copyright breach, no questions asked. Image source: Public Domain
  • 12. Google drive is one of many Google products in the cloud, providing online access to store, create and edit documents and files. Google are in the business of obtaining information, your information and that is why using Google drive is free. You agree to Google's terms even if you have not read them, there is no express consent required, your use binds you to their terms and privacy policy. Google use their terms to conduct wide scale mass surveillance of your sent, received and stored content. Your privacy is not protected by Google’s terms nor can Google guarantee your privacy in the cloud from other entities. Google will enforce copyright notices even while using your copyrighted content to operate, improve and create new products.
  • 13. Thank you for watching, I hope this introduction has shed some light on your rights and responsibilities and encourages active engagement with the terms that govern your use of Google Drive.
  • 14. References Cann, A. J. (2012). Information literacy. [Digital Image] Retrieved from http://www.flickr.com/photos/ajc1/7745480006/in/photolist-cNrBmJ- 6q4ey3-4dvej1-8Zp6Uh-5nDMns- 6Ky2vw-cEtrZw-5qRfXr-5ovUgu-6cZdgt-cAswZb-drFzGJ-eiRYcK-5nDMnJ-4coVuv-cyNqJy-7QfDuU- 9X3jEd-eiYE8d-5nDMno-9absfJ-cXyXGC-446z2V-7cDAaw-5nDNfb-q31qk-ksgK3R-ksgJDV-arBfvb-6DjwLb- 5z8U3o-5qVFo9-gg3U6y-4e5zt2-8S83Tu-5nDNff-9abNF7-e4QnqR-a655W9-446D8t-fwzFWQ-6HMFkh- CdiXb-cAswSW-cAsx51-omJrcs-5GpPns-jpvQ2-6XpV5N-kWtpLR Clearinghouse (2014). Privacy and the Internet: Travelling in Cyberspace Safely. Retrieved from https://www.privacyrights.org/online-privacy-using-internet-safely Coggins, M. (2006). Private Eye Handcuffed to a Speaker [Digital Image]. Retrieved from http://www.flickr.com/photos/markcoggins/160198015/in/photolist-fa4hK-bnjU3k-9KpdMV-4EB6Cq-be3QkB-hJ9eX- 6wn9nG-8ZghLj-bDC68B-5VC62S-bnjTNF-b7MZQe-ejxACU-nzdi73-7hSnio-adkXaX-8ZghGC- 9T3H8W-9tUTfg-4rkLC-8ZghCA-bqVPdt-e4r38S-q7mYh-8f7FoE-8Zghoq-4EVbXY-6RFiyQ-4gtKy4-gbiu11- 8hDzmp-4gxNTE-dzK2td-i93W8q-6dDy7q-5iwLyo-6kGDd-2c5Ydq-aVh5bz-9b8JYi-53115r-7HmWH8-5vekMQ- 54uUxo-6CRhRH-6RBkH8-535f4E-ft5SJF-fjGUT2-9ix8HR Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475-493. Fuchs, C. (2011). A Contribution to the Critique of the Political Economy of Google. Retrieved from http://www.uta.edu/huma/agger/ fastcapitalism/8_1/fuchs8_1.html g4ll4is. (2013). Privacy [Digital Image]. Retrieved from http://www.flickr.com/photos/g4ll4is/8521624548/in/photolist-82djZx- 84VZAr-dZ2y6b-azTdMo-4EvWY9-822bu2-eARcff-4WrJkA-o3MtjS-66r3T6-dRuMzt-ddpg14-7ZRTUP-7 fNVzm-5UYfNP-4jkHD-axwagd-48ybNM-iCz9t-6wCshe Google (2014a). Google Key Terms. Retrieved from http://www.google.com/policies/privacy/key-terms/#toc-terms-application-data-cache
  • 15. Google. (2014b). Google Privacy Policy. Retrieved from http://www.google.com/policies/privacy/ Google. (2014c). Google Terms of Service. Retrieved from https://www.google.com.au/intl/en/policies/terms/regional.html Google. (n.d.). Google’s mission is to organize the world’s information and make it universally accessible and useful. Retrieved from https://www.google.com.au/about/company/ Hoback, C. (2014). Terms and conditions may apply [Video file] Retrieved from https://vimeo.com/ondemand/tacma/75993945 Introna, L. D. (1997). Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy, 28(3), 259-275. http://dx.doi.org/10.1111/1467-9973.00055 Lerner, K. (2014). 5M Gmail Addresses, Passwords Leaked On Online Forum. Retrieved from http://www.law360.com/articles/575999/5m-gmail-addresses-passwords-leaked-on-online-forum Lessig, L. (1998). The Architecture of Privacy. Retrieved from http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf Licht, M. (2013). Internet Surveillance [Digital Image]. Retrieved from http://www.flickr.com/photos/notionscapital/8566082872/in/photolist-e3Xq11-6v71oR-66r3T6-dv9DfT- 6GWi9g-f4A53y-6H1oau-7w6rDr-7w6rvP-5TXEX-6wRqgn-dvfbqd-8L7dxP-nyFqT3-nynA6V-dFVnnT-nhaTLa- nyq5rj-eQhHRM-6GVSiZ-9xKKsZ-8sqSfY-SxLvj-uhivV-z9fMF-f4eRvV-6X5nzY-qJok3-nt1FUe- 4KYQpB-FThKZ-qJokG-ggT2Cv-9kQQ6-9kQU2-9kQRS-qJoj5-VZxyW-99MLY-4NxwJ-aPnSB-hRdwNo- 8jpL4A-dFVnTt-CVPYj-uCALg-93VXwL-kzoa3a-eQkvVH-eQknJF
  • 16. Lyon, D. (2002). Everyday Surveillance: Personal data and social classifications. Information, Communication & Society, 5(2), 242-257.http://dx.doi.org/10.1080/13691180210130806 Morrison, I (2014) 3 Stripes [Digital Image] Retrieved from Personal Files Soltani, A., Peterson, A., & Gellman, B. (2013). NSA uses Google cookies to pinpoint targets for hacking. Retrieved from http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint- targets-for-hacking/ Thomas, G. (2008). cloud-computing (1) [Digital Image]. Retrieved from http://www.flickr.com/photos/incredibleguy/6937250243/in/photolist- eAZ7cy-bz2dNP-9Eg22c-5ksVR8- 5kximC-6zkb5E-4WqjNi-bPoKuR-hxUJ4g-4NcWLj-4N8JiD-4N8Kua-4NdDr2-bx1LMh-8cqvMc-5kt1fX- 5ksZcR-5kx9E9-5ksZyz-5kxhQf-5ksRWP-9hMa2d-9hM9XQ-9hJ4e4-9hJ4a8-9hJ45x-9hM9Hs-io1t3T-jU3dVp- 5GpPns-6hd6ad-io1mct-9LhWwo-7NBakB-5kxhpE-5ksTDK-5kxbLq-5ksYt8-5ksYPp-5kxa8W- 5kx9dC-7HtYgd-e2SHjR-9S5Pa8-bnVZHC-9cdaTq-7Hfa7K-8rwVKj-8rwVj9-8rtPag Creative Common License: https://creativecommons.org/licenses/by/2.0/ Procopio, M. (2013). Instant Google Drive Starter. Birmingham: Birmingham: Packt Publishing