SlideShare a Scribd company logo
1 of 27
NET303 Politics & Power

SP3/2013 A2

28/10/13

NET 303

New Privacy & Terms
November 11, 2013

(Slatten, 2010).

POLICY PRIMER
Kylie Murphy – Curtin University

1
NET303 Politics & Power

SP3/2013 A2

28/10/13

Google states,

“We are committed to improving your security,
protecting your privacy, and building simple tools to
give you choice and control.” (Google, 2013).

Kylie Murphy – Curtin University

How???

(CyberApps, 2013).

2
NET303 Politics & Power

SP3/2013 A2

28/10/13

provides their Terms of Service and Privacy
Policy for you to stay safe and secure online.(Slatten, 2010).

“Google
helps to
protect you,
your computer
and the Internet
from
cybercrime.”

By using
Google
Services, “you are
agreeing to these
terms.” Including
any changes or
additional terms that
come into effect.

(Google, 2013).
(Ms. Smith, 2010).

Kylie Murphy – Curtin University

(Google, 2013).
(Villasenor, 2013).

3
NET303 Politics & Power

SP3/2013 A2

28/10/13

If you have used any of
Products and Services like
Web Search
Chrome
Drive
Scholar
Calendar
YouTube
(Surf Context, 2010).

(Slatten, 2010).

Google Play
News
Translate
Mobile
(Google+, Wallet
and Offers)
Android
(Google Maps)
(Google, 2013).

You have accepted Google’s terms of service.
Kylie Murphy – Curtin University

4
NET303 Politics & Power

SP3/2013 A2

28/10/13

The Terms of Service users
agree to consist of:
Ownership and
intellectual property
Copyright and privacy
protections
Responsibilities
Reason for account
suspension or termination
Software rights
Modification or termination
of services

Disclaimer
Liability
Business indemnity
Jurisdiction
Additional terms and changes
New terms as of 11/11/13
Shared endorsements
Mobile devices
Passwords
(Google, 2013).

Kylie Murphy – Curtin University

5
NET303 Politics & Power

(Slatten, 2010).

SP3/2013 A2

28/10/13

‘s New Privacy &

Terms go live November 11, 2013
There are 3 changes:
1. Your profile name and photo may appear in
reviews and advertising.
2. Reminder to use your mobile devices safely.
3. Details on the importance of keeping your
password confidential.
(Google, 2013).

Kylie Murphy – Curtin University

6
NET303 Politics & Power

SP3/2013 A2

28/10/13

The Privacy Terms users
agree to consist of:
Information collected
-Personal information
-Use of services
How information collected
is used

Deletion of personal
information
Information Google shares
Information security
Application

Transparency and choice

Enforcement

Information shared
between users

Changes
(Google, 2013).

Kylie Murphy – Curtin University

7
NET303 Politics & Power

SP3/2013 A2

28/10/13

What do the Terms of Service mean?
You retain intellectual property rights of your content.
Content is your sole responsibility.
If your content is illegal or violates Google’s terms it is
removed and you may face legal consequences.
Copyright infringement results in the termination of your
account under “US Digital Millennium Copyright Act” (Google,
2012).
This stops you accessing your account, files and emails.
(Google, 2013).

Kylie Murphy – Curtin University

8
NET303 Politics & Power

SP3/2013 A2

28/10/13

What do the Terms of Service mean?
Google can use, reproduce, modify, host, store, publish or
distribute your content.
Google can use your information to develop new products
without paying you.
Google offers no commitment to reliability, or availability of
their services.
If you do not agree with Google’s TOS you can discontinue
using the service.
(Google, 2013).

Kylie Murphy – Curtin University

9
NET303 Politics & Power

SP3/2013 A2

28/10/13

What do the Terms of Service mean?
Google administration requires users to be over 13 years and to verify
by providing your birth date, otherwise the account is suspended and
disabled (Google, 2013).
COPPA (1998) does not allow personally identifiable information of a
minor to be collected. Ages between 13 and 17 require parental
consent (The Meyer Brown Practices, 2013).
You can “now control whether your image and name appear in ads via
the shared endorsements setting” and permits you to opt-out of the
new program (Google, 2013). Under 18’s will not appear on
endorsement ads.
Google expects you to use mobile devices safely when driving and
avoid distractions.
Google expects you to be careful of sharing passwords.
Kylie Murphy – Curtin University

(Google, 2013).

10
NET303 Politics & Power

SP3/2013 A2

28/10/13

Privacy – What is collected?
Google collects your information
to provide better services and
target ads.
You give Google personal
information like your name, email,
address, telephone number or
credit card and photo.
Google gathers information from
your devices like hardware,
model, operating system version,
unique device identification,
mobile network and phone
number.
(Google, 2013).
Kylie Murphy – Curtin University

(Lunduke, 2010).

11
NET303 Politics & Power

SP3/2013 A2

28/10/13

Privacy – What is collected?
Log information like search
queries, telephone logs,
IP address, and browser cookies
stored locally even when you visit.
When you visit (search or navigate)
you are subject to Google’s terms of
service and privacy policies.
Location information, GPS signals
sent by your mobile device, Wi-Fi
access points and cell towers.
(Google, 2013).

Kylie Murphy – Curtin University

(Lunduke, 2010).

12
NET303 Politics & Power

SP3/2013 A2

28/10/13

How is the information collected used?
To tailor your
content, search
results and ads and
improve service
quality.

Google does not use
your information to
place you in a
category, i.e. race,
religion, sexual
orientation or health.
Kylie Murphy – Curtin University

Used for showing
your profile
information, name
and photo.

Information you
share publicly will be
listed on search
engines.
(Google, 2013).

13
NET303 Politics & Power

SP3/2013 A2

28/10/13

How is the information collected used?
You can remove your
content, but it may not
delete completely as
residual copies remain in
Google’s back up system.

Google shares and
processes your personal
information with Affiliates
outside your country.

Google does not share
your information unless
you consent or if it is
applicable by law or
government request.

Google works with
regulatory authorities
and local data protection
authorities to resolve
complaints.
(Google, 2013).

Kylie Murphy – Curtin University

14
NET303 Politics & Power

SP3/2013 A2

28/10/13

So, what is Google really doing
with your personal information ?

(Ruscoe & Lenssen, 2008)

Kylie Murphy – Curtin University

15
10
NET303 Politics & Power

SP3/2013 A2

28/10/13

"Despite their stated concern for individual privacy, online
consumers are in many cases very quick to provide
significant amounts of personal information.“
(Brown & Muchira, 2004, p.68).

Studies have shown “people don’t seem to value their
privacy as much on the Internet.”
(Goettke & Christiana, 2007, Introna,
1997).

Is this really the case?
Kylie Murphy – Curtin University

(Reisinger, 2013).

16
NET303 Politics & Power

SP3/2013 A2

28/10/13

Consumer’s Five Primary
Concerns of Privacy
• Collection: the perception that too
much data are being collected.
• Unauthorized secondary use:
personal data collected for one purpose
are used for another without permission.
• Errors: personal data are accidentally
or deliberately altered, corrupting the
integrity of a database.
• Improper access: unauthorized
individuals access personal data.
• Invasion: unsolicited and unwanted
communications to consumers.
(Waxer, 2013).
Kylie Murphy – Curtin University

(Brown & Muchira, 2004).

17
NET303 Politics & Power

SP3/2013 A2

28/10/13

Are these consumer
concerns on
privacy
justified???
(Waxer, 2013)
Kylie Murphy – Curtin University

18
NET303 Politics & Power

SP3/2013 A2

28/10/13

“Google Is Being Sued
For Reading Gmail In
Order To Target Ads”
Google allegedly has
“violated several
laws, such as
federal antiwiretapping laws”
(Bort, 2013).
Google CEO Larry Page (Bort, 2013).

Kylie Murphy – Curtin University

19
NET303 Politics & Power

SP3/2013 A2

28/10/13

US District Court judge
Lucy Koh, “ruled that
the Google practice of
using software to mine
data from emails for
advertising purposes
could constitute a
violation of federal
wiretap laws” (Price,
2013).
(Price, 2013).

“Judge Koh referenced Google’s Terms of
“Judge Koh referenced Google’s Terms of
Service and Privacy Polices in a ruling that
Service and Privacy Polices in a ruling that
stated that the corporation did not
stated that the corporation did not
adequately inform users about the Gmail
adequately inform users about the Gmail
interceptions” (Price, 2013).
interceptions” (Price, 2013).
Kylie Murphy – Curtin University

20
NET303 Politics & Power

SP3/2013 A2

28/10/13

QUESTION???

(The McCrindle Blog, 2012).

Kylie Murphy – Curtin University

If Google added email
interceptions in their
terms and services
and privacy policies,
would you remain with
Google and accept
their terms or
discontinue with their
services?
21
NET303 Politics & Power

(Sahagian, 2013).

(Lunduke, 2010).

SP3/2013 A2

28/10/13

“Google Insists
It Has the
Right to Read
Your Emails”

(Sahagian, 2013).

“Google is seeking to appeal a
“Google is seeking to appeal a
ruling that it broke wiretapping
ruling that it broke wiretapping
laws when the company scanned and
laws when the company scanned and
read Gmail users’ personal emails in
read Gmail users’ personal emails in
order to promote advertising and
order to promote advertising and
build user profiles” (Sahagian,
build user profiles” (Sahagian,
2013).
2013).
(Niedermayer, 2012).

Kylie Murphy – Curtin University

22
NET303 Politics & Power

SP3/2013 A2

(Tate, 2011).

28/10/13

“Google lawsuit
stirs debate
over email
privacy rights”

(Munroe, 2013).

Marc Rotenberg, a Privacy Lawyer
Marc Rotenberg, a Privacy Lawyer
states regarding this lawsuit
states regarding this lawsuit
that “It’s alarming for the
that “It’s alarming for the
world’s largest email service
world’s largest email service
provider to say they don’t have
provider to say they don’t have
an obligation to protect
an obligation to protect
privacy.”
privacy.” (Munroe, 2013).
(CBC News, 2013).

Kylie Murphy – Curtin University

23
NET303 Politics & Power

SP3/2013 A2

28/10/13

Conclusion
I hope this presentation
has helped you
understand Google’s
Terms of Service and
Privacy Policies and how
it relates to your privacy
and security.
Thank you for your time…
Kylie Murphy – Curtin University

24
NET303 Politics & Power

SP3/2013 A2

28/10/13

References
Bort, J. (September 27, 2013). Google Is Being Sued For Reading Gmail In Order To Target Ads. Business Insider.
Retrieved
October 23, 2013, from http://www.businessinsider.com.au/google-is-being-sued-for-reading-email-to-targetads-2013-9
Bort, J. (September 27, 2013). Google Is Being Sued For Reading Gmail In Order To Target Ads. [Image]. Business Insider.
Retrieved October 23, 2013, from http://www.businessinsider.com.au/google-is-being-sued-for-reading-emailto-target-ads-2013-9
Brown, M., & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concern and Online Purchase
Behavior. Journal of Electronic Commerce Research, 591), 62-70. Retrieved October 25, 2013, from
http://www.csulb.edu/web/journals/jecr/issues/20041/Paper6.pdf
CBC News. (August 14, 2013). No privacy for Gmail users. [Image]. CBC News. Retrieved October 25, 2013, from
http://www.cbc.ca/player/News/Technology+and+Science/ID/2401260676/
CypherApps. (2013). Securing Google Docs. [Image]. Retrieved October 21, 2013, from http://www.cipherapps.com/
Google. (2013). Age requirements for Google+. Retrieved October 25, 2013,
https://support.google.com/a/answer/1645514?hl=en
Google. (2013). Google Products. Retrieved October 21, 2013, from http://www.google.com/about/products/
Google. (2013). Privacy Policy. Retrieved October 20, 2013, from https://www.google.com.au/intl/en/policies/privacy/
Google. (2013). Terms of Service. Retrieved October 20, 2013, from
https://www.google.com.au/intl/en/policies/terms/regional.html
Google. (2013). Terms of Service update. Retrieved October 20, 2013, from
https://www.google.com.au/intl/en/policies/terms/regional.html
Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics
in Computer Science Computation and Society: Privacy and Technology. Retrieved September 14, 2013, from
http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
Introna, L. D. (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28(3), 259275.
Lunduke, B. (2010). Google Hates Linux and Video Games. [Image]. Retrieved October 24, 2013, from
http://lunduke.com/?p=1129

Kylie Murphy – Curtin University

25
NET303 Politics & Power

SP3/2013 A2

References

28/10/13

Lunduke, B. (2010). Google Hates Linux and Video Games. [Image]. Retrieved October 23, 2013, from
http://lunduke.com/?p=1129
Ms. Smith. (June 10, 2010). Microsoft Proposes Each PC Needs A Health Certificate or No Net Access Allowed. [Weblog].
Retrieved October 21, 2013, from http://www.networkworld.com/community/blog/microsoft-proposes-each-pcneeds-health-certi
Munroe, I. (August 16, 2013). Google lawsuit stirs debate over email privacy rights Critics condemn internet giant over 'no
legitimate expectation of privacy' argument. CBC News. Retrieved October 24, 2013, from
http://www.cbc.ca/news/technology/google-lawsuit-stirs-debate-over-email-privacy-rights-1.1413906
Niedermayer, C. (2012). Court of Appeal, CA – Opinions. [Image]. Retrieved October 24, 2013, from
https://play.google.com/store/apps/details?id=com.cniederm.coasearch
Price, J. (September 27, 2013). Google Email Practices Dealt Setback In Federal Privacy Dispute. ID Radar. Retrieved October
23, 2013, from https://www.idradar.com/news-stories/digital-privacy/Google-Gmail-Practices-Could-ConstitutePrivacy-Violation
Price, J. (September 27, 2013). Google Email Practices Dealt Setback In Federal Privacy Dispute. [Image]. Retrieved October
23, 2013, from https://www.idradar.com/news-stories/digital-privacy/Google-Gmail-Practices-Could-ConstitutePrivacy-Violation
Reisinger, D. (2013). Google slapped with lawsuit over man's salacious images. [Image]. Retrieved October 23, 2013, from
http://news.cnet.com/8301-1009_3-57601483-83/google-slapped-with-lawsuit-over-mans-salacious-images/
Ruscoe, T. & P. Lenssen. (February 18, 2008). Winner of the Google Logo Redesign Contest. [Weblog]. Retrieved October 22,
2013, from http://blogoscoped.com/archive/2008-02-18-n61.html
Sahagian, J. (October 10, 2013). Google Insists It Has the Right to Read Your Emails. Retrieved October 23, 2013, from
http://wallstcheatsheet.com/stocks/google-insists-it-has-the-right-to-read-your-emails.html/
Sahagian, J. (October 10, 2013). Google Insists It Has the Right to Read Your Emails. [Image]. Retrieved October 23, 2013,
from http://wallstcheatsheet.com/stocks/google-insists-it-has-the-right-to-read-your-emails.html/
Slatten, D. (2013). NEW Google Logo: High-quality PNG Image with Transparent Background. [Image]. Retrieved October 21,
2013 from http://www.seomofo.com/orm/new-google-logo.html
Surf Context. (2013). Fast and easy access for 1 million users. [Image]. Retrieved October 22, 2013, from
http://www.surfnet.nl/en/Thema/coin/voorcloudproviders/Pages/default.aspx

Kylie Murphy – Curtin University

26
NET303 Politics & Power

SP3/2013 A2

References

28/10/13

Tate, R. (November, 05, 2011). How Google Spies on Your Gmail Account (And How To Stop It). [Image]. Retrieved October
24, 2013, from http://gawker.com/5800868/how-google-spies-on-your-gmail-account-and-how-to-stop-it
The McCrindle Blog. (November 14, 2012). The most asked questions in Australia according to Google search suggestions.
[Weblog, Image]. Retrieved October 25, 2013, from http://www.mccrindle.com.au/themccrindleblog/most_asked_questions_australia_google_search_suggestions
The Mayer Brown Practices. (July 29, 2013). FTC’s Recent Revisions to the Children’s Online Privacy Protection Act
(“COPPA”). Meyer Brown. Retrieved October 25, 2013, from http://www.mayerbrown.com/FTCs-RecentRevisions-to-theChildrens-Online-Privacy-Protection-Act-COPPA-07-29-2013/
Waxer, C. (January 01, 2013). Navigating the Murky Boundaries of Privacy. [Image]. Retrieved October 26, 2013, from
http://www.dmnews.com/navigating-the-murky-boundaries-of-privacy/article/273190/
Wright, C. (October, 24, 2013). Kissing Google goodbye. Sydney Morning Herald. Retrieved October 24, 2013, from
http://www.smh.com.au/digital-life/digital-life-news/kissing-google-goodbye-20131023-2vzso.html
Villasenor, J. 2013. Google Glass and the Demise of Ownership What the restrictions on resale of the gadget mean for
consumers. [Image]. Retrieved October 22, 2013 from,
http://www.slate.com/articles/technology/future_tense/2013/04/google_glass_terms_of_service_restrictions_on_r
esale_are_bad_for_consumers.html

Google Policy Primer by Kylie Murphy is licensed under a
Creative Commons Attribution 3.0 Unported License.
Kylie Murphy – Curtin University

27

More Related Content

What's hot

2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1cRaj Goel
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
"Don't Be Evil" - A primer for Google+ Terms of Service
"Don't Be Evil" - A primer for Google+ Terms of Service"Don't Be Evil" - A primer for Google+ Terms of Service
"Don't Be Evil" - A primer for Google+ Terms of Serviceiannet303
 
Google+: The Terms and Conditions Explained
Google+: The Terms and Conditions ExplainedGoogle+: The Terms and Conditions Explained
Google+: The Terms and Conditions Explainedawardcurtin
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMARaj Goel
 
Bill gates patent
Bill gates   patentBill gates   patent
Bill gates patentEhud Barone
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
The General data protection regulation : Salient clauses
The General data protection regulation : Salient clausesThe General data protection regulation : Salient clauses
The General data protection regulation : Salient clausesSyed Nazir Razik ACP, CSM, PMP
 

What's hot (12)

2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
Facebook primer
Facebook primerFacebook primer
Facebook primer
 
"Don't Be Evil" - A primer for Google+ Terms of Service
"Don't Be Evil" - A primer for Google+ Terms of Service"Don't Be Evil" - A primer for Google+ Terms of Service
"Don't Be Evil" - A primer for Google+ Terms of Service
 
Google+: The Terms and Conditions Explained
Google+: The Terms and Conditions ExplainedGoogle+: The Terms and Conditions Explained
Google+: The Terms and Conditions Explained
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMA
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Bill gates patent
Bill gates   patentBill gates   patent
Bill gates patent
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
The General data protection regulation : Salient clauses
The General data protection regulation : Salient clausesThe General data protection regulation : Salient clauses
The General data protection regulation : Salient clauses
 
Hunt powerpt
Hunt powerptHunt powerpt
Hunt powerpt
 

Viewers also liked

Nestle HRM and SWOT analysis
Nestle HRM and SWOT analysisNestle HRM and SWOT analysis
Nestle HRM and SWOT analysisArslan anjum
 
Report on hrm function related to pepsico
Report on hrm function related to pepsicoReport on hrm function related to pepsico
Report on hrm function related to pepsicoAniba Munir
 
Coca cola Job Analysis
Coca cola Job AnalysisCoca cola Job Analysis
Coca cola Job Analysisfarazishaque
 
HR presentation oc COCA COLA
HR presentation oc COCA COLA HR presentation oc COCA COLA
HR presentation oc COCA COLA adi1113
 
Procter & Gamble Strategic Analysis
Procter & Gamble Strategic AnalysisProcter & Gamble Strategic Analysis
Procter & Gamble Strategic AnalysisSteven Perdoch
 

Viewers also liked (7)

Nestle HRM and SWOT analysis
Nestle HRM and SWOT analysisNestle HRM and SWOT analysis
Nestle HRM and SWOT analysis
 
7 an introduction to hrm
7   an introduction to hrm7   an introduction to hrm
7 an introduction to hrm
 
Report on hrm function related to pepsico
Report on hrm function related to pepsicoReport on hrm function related to pepsico
Report on hrm function related to pepsico
 
Coca cola Job Analysis
Coca cola Job AnalysisCoca cola Job Analysis
Coca cola Job Analysis
 
Infosys hrm ppt
Infosys hrm pptInfosys hrm ppt
Infosys hrm ppt
 
HR presentation oc COCA COLA
HR presentation oc COCA COLA HR presentation oc COCA COLA
HR presentation oc COCA COLA
 
Procter & Gamble Strategic Analysis
Procter & Gamble Strategic AnalysisProcter & Gamble Strategic Analysis
Procter & Gamble Strategic Analysis
 

Similar to Google's Terms of Service and Privacy Policies Analyzed

Article 29 working group privacy letter to google
Article 29 working group privacy letter to googleArticle 29 working group privacy letter to google
Article 29 working group privacy letter to googleGreg Sterling
 
La lettera dei Garanti UE al Ceo Google Larry Page
La lettera dei Garanti UE al Ceo Google Larry PageLa lettera dei Garanti UE al Ceo Google Larry Page
La lettera dei Garanti UE al Ceo Google Larry Pagecatdii
 
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...Greg Sterling
 
Google Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and CensorshipGoogle Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and Censorshipkrthenson
 
Controversy over Google's Privacy Policy Changes
Controversy over Google's Privacy Policy ChangesControversy over Google's Privacy Policy Changes
Controversy over Google's Privacy Policy ChangesInternet Law Center
 
KLL4328
KLL4328  KLL4328
KLL4328 KLIBEL
 
Google Search Policy Primer
Google Search Policy PrimerGoogle Search Policy Primer
Google Search Policy PrimerBarnes 013
 
Letter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesLetter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesGillian Shaw
 
Net303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgNet303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgMuir_Net303
 
Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Digital Policy and Law Consulting
 
Ethics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxEthics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxgitagrimston
 
Consumer watchdog rtbf letter
Consumer watchdog rtbf letterConsumer watchdog rtbf letter
Consumer watchdog rtbf letterGreg Sterling
 
IRJET- Privacy & Security Settings: A Review
IRJET- 	  Privacy & Security Settings: A ReviewIRJET- 	  Privacy & Security Settings: A Review
IRJET- Privacy & Security Settings: A ReviewIRJET Journal
 
Google complete, history, model, competitors ,
Google complete, history, model, competitors ,Google complete, history, model, competitors ,
Google complete, history, model, competitors ,ramzan asghar
 
Cookies, FLoC & GDPR: Marketing Impact
Cookies, FLoC & GDPR: Marketing ImpactCookies, FLoC & GDPR: Marketing Impact
Cookies, FLoC & GDPR: Marketing ImpactCMassociates
 
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...Data & Analytics Magazin
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docxoswald1horne84988
 
Privacy presentation
Privacy presentationPrivacy presentation
Privacy presentationcnewm095
 

Similar to Google's Terms of Service and Privacy Policies Analyzed (20)

Article 29 working group privacy letter to google
Article 29 working group privacy letter to googleArticle 29 working group privacy letter to google
Article 29 working group privacy letter to google
 
La lettera dei Garanti UE al Ceo Google Larry Page
La lettera dei Garanti UE al Ceo Google Larry PageLa lettera dei Garanti UE al Ceo Google Larry Page
La lettera dei Garanti UE al Ceo Google Larry Page
 
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
Letter from the_article_29_working_party_to_google_in_relation_to_its_new_pri...
 
Google Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and CensorshipGoogle Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and Censorship
 
Controversy over Google's Privacy Policy Changes
Controversy over Google's Privacy Policy ChangesControversy over Google's Privacy Policy Changes
Controversy over Google's Privacy Policy Changes
 
KLL4328
KLL4328  KLL4328
KLL4328
 
Google Search Policy Primer
Google Search Policy PrimerGoogle Search Policy Primer
Google Search Policy Primer
 
Letter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesLetter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocates
 
Net303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgNet303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirg
 
Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...
 
Ethics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxEthics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docx
 
Consumer watchdog rtbf letter
Consumer watchdog rtbf letterConsumer watchdog rtbf letter
Consumer watchdog rtbf letter
 
IRJET- Privacy & Security Settings: A Review
IRJET- 	  Privacy & Security Settings: A ReviewIRJET- 	  Privacy & Security Settings: A Review
IRJET- Privacy & Security Settings: A Review
 
Google complete, history, model, competitors ,
Google complete, history, model, competitors ,Google complete, history, model, competitors ,
Google complete, history, model, competitors ,
 
Complaint
ComplaintComplaint
Complaint
 
Cookies, FLoC & GDPR: Marketing Impact
Cookies, FLoC & GDPR: Marketing ImpactCookies, FLoC & GDPR: Marketing Impact
Cookies, FLoC & GDPR: Marketing Impact
 
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docx
 
Privacy presentation
Privacy presentationPrivacy presentation
Privacy presentation
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Google's Terms of Service and Privacy Policies Analyzed

  • 1. NET303 Politics & Power SP3/2013 A2 28/10/13 NET 303 New Privacy & Terms November 11, 2013 (Slatten, 2010). POLICY PRIMER Kylie Murphy – Curtin University 1
  • 2. NET303 Politics & Power SP3/2013 A2 28/10/13 Google states, “We are committed to improving your security, protecting your privacy, and building simple tools to give you choice and control.” (Google, 2013). Kylie Murphy – Curtin University How??? (CyberApps, 2013). 2
  • 3. NET303 Politics & Power SP3/2013 A2 28/10/13 provides their Terms of Service and Privacy Policy for you to stay safe and secure online.(Slatten, 2010). “Google helps to protect you, your computer and the Internet from cybercrime.” By using Google Services, “you are agreeing to these terms.” Including any changes or additional terms that come into effect. (Google, 2013). (Ms. Smith, 2010). Kylie Murphy – Curtin University (Google, 2013). (Villasenor, 2013). 3
  • 4. NET303 Politics & Power SP3/2013 A2 28/10/13 If you have used any of Products and Services like Web Search Chrome Drive Scholar Calendar YouTube (Surf Context, 2010). (Slatten, 2010). Google Play News Translate Mobile (Google+, Wallet and Offers) Android (Google Maps) (Google, 2013). You have accepted Google’s terms of service. Kylie Murphy – Curtin University 4
  • 5. NET303 Politics & Power SP3/2013 A2 28/10/13 The Terms of Service users agree to consist of: Ownership and intellectual property Copyright and privacy protections Responsibilities Reason for account suspension or termination Software rights Modification or termination of services Disclaimer Liability Business indemnity Jurisdiction Additional terms and changes New terms as of 11/11/13 Shared endorsements Mobile devices Passwords (Google, 2013). Kylie Murphy – Curtin University 5
  • 6. NET303 Politics & Power (Slatten, 2010). SP3/2013 A2 28/10/13 ‘s New Privacy & Terms go live November 11, 2013 There are 3 changes: 1. Your profile name and photo may appear in reviews and advertising. 2. Reminder to use your mobile devices safely. 3. Details on the importance of keeping your password confidential. (Google, 2013). Kylie Murphy – Curtin University 6
  • 7. NET303 Politics & Power SP3/2013 A2 28/10/13 The Privacy Terms users agree to consist of: Information collected -Personal information -Use of services How information collected is used Deletion of personal information Information Google shares Information security Application Transparency and choice Enforcement Information shared between users Changes (Google, 2013). Kylie Murphy – Curtin University 7
  • 8. NET303 Politics & Power SP3/2013 A2 28/10/13 What do the Terms of Service mean? You retain intellectual property rights of your content. Content is your sole responsibility. If your content is illegal or violates Google’s terms it is removed and you may face legal consequences. Copyright infringement results in the termination of your account under “US Digital Millennium Copyright Act” (Google, 2012). This stops you accessing your account, files and emails. (Google, 2013). Kylie Murphy – Curtin University 8
  • 9. NET303 Politics & Power SP3/2013 A2 28/10/13 What do the Terms of Service mean? Google can use, reproduce, modify, host, store, publish or distribute your content. Google can use your information to develop new products without paying you. Google offers no commitment to reliability, or availability of their services. If you do not agree with Google’s TOS you can discontinue using the service. (Google, 2013). Kylie Murphy – Curtin University 9
  • 10. NET303 Politics & Power SP3/2013 A2 28/10/13 What do the Terms of Service mean? Google administration requires users to be over 13 years and to verify by providing your birth date, otherwise the account is suspended and disabled (Google, 2013). COPPA (1998) does not allow personally identifiable information of a minor to be collected. Ages between 13 and 17 require parental consent (The Meyer Brown Practices, 2013). You can “now control whether your image and name appear in ads via the shared endorsements setting” and permits you to opt-out of the new program (Google, 2013). Under 18’s will not appear on endorsement ads. Google expects you to use mobile devices safely when driving and avoid distractions. Google expects you to be careful of sharing passwords. Kylie Murphy – Curtin University (Google, 2013). 10
  • 11. NET303 Politics & Power SP3/2013 A2 28/10/13 Privacy – What is collected? Google collects your information to provide better services and target ads. You give Google personal information like your name, email, address, telephone number or credit card and photo. Google gathers information from your devices like hardware, model, operating system version, unique device identification, mobile network and phone number. (Google, 2013). Kylie Murphy – Curtin University (Lunduke, 2010). 11
  • 12. NET303 Politics & Power SP3/2013 A2 28/10/13 Privacy – What is collected? Log information like search queries, telephone logs, IP address, and browser cookies stored locally even when you visit. When you visit (search or navigate) you are subject to Google’s terms of service and privacy policies. Location information, GPS signals sent by your mobile device, Wi-Fi access points and cell towers. (Google, 2013). Kylie Murphy – Curtin University (Lunduke, 2010). 12
  • 13. NET303 Politics & Power SP3/2013 A2 28/10/13 How is the information collected used? To tailor your content, search results and ads and improve service quality. Google does not use your information to place you in a category, i.e. race, religion, sexual orientation or health. Kylie Murphy – Curtin University Used for showing your profile information, name and photo. Information you share publicly will be listed on search engines. (Google, 2013). 13
  • 14. NET303 Politics & Power SP3/2013 A2 28/10/13 How is the information collected used? You can remove your content, but it may not delete completely as residual copies remain in Google’s back up system. Google shares and processes your personal information with Affiliates outside your country. Google does not share your information unless you consent or if it is applicable by law or government request. Google works with regulatory authorities and local data protection authorities to resolve complaints. (Google, 2013). Kylie Murphy – Curtin University 14
  • 15. NET303 Politics & Power SP3/2013 A2 28/10/13 So, what is Google really doing with your personal information ? (Ruscoe & Lenssen, 2008) Kylie Murphy – Curtin University 15 10
  • 16. NET303 Politics & Power SP3/2013 A2 28/10/13 "Despite their stated concern for individual privacy, online consumers are in many cases very quick to provide significant amounts of personal information.“ (Brown & Muchira, 2004, p.68). Studies have shown “people don’t seem to value their privacy as much on the Internet.” (Goettke & Christiana, 2007, Introna, 1997). Is this really the case? Kylie Murphy – Curtin University (Reisinger, 2013). 16
  • 17. NET303 Politics & Power SP3/2013 A2 28/10/13 Consumer’s Five Primary Concerns of Privacy • Collection: the perception that too much data are being collected. • Unauthorized secondary use: personal data collected for one purpose are used for another without permission. • Errors: personal data are accidentally or deliberately altered, corrupting the integrity of a database. • Improper access: unauthorized individuals access personal data. • Invasion: unsolicited and unwanted communications to consumers. (Waxer, 2013). Kylie Murphy – Curtin University (Brown & Muchira, 2004). 17
  • 18. NET303 Politics & Power SP3/2013 A2 28/10/13 Are these consumer concerns on privacy justified??? (Waxer, 2013) Kylie Murphy – Curtin University 18
  • 19. NET303 Politics & Power SP3/2013 A2 28/10/13 “Google Is Being Sued For Reading Gmail In Order To Target Ads” Google allegedly has “violated several laws, such as federal antiwiretapping laws” (Bort, 2013). Google CEO Larry Page (Bort, 2013). Kylie Murphy – Curtin University 19
  • 20. NET303 Politics & Power SP3/2013 A2 28/10/13 US District Court judge Lucy Koh, “ruled that the Google practice of using software to mine data from emails for advertising purposes could constitute a violation of federal wiretap laws” (Price, 2013). (Price, 2013). “Judge Koh referenced Google’s Terms of “Judge Koh referenced Google’s Terms of Service and Privacy Polices in a ruling that Service and Privacy Polices in a ruling that stated that the corporation did not stated that the corporation did not adequately inform users about the Gmail adequately inform users about the Gmail interceptions” (Price, 2013). interceptions” (Price, 2013). Kylie Murphy – Curtin University 20
  • 21. NET303 Politics & Power SP3/2013 A2 28/10/13 QUESTION??? (The McCrindle Blog, 2012). Kylie Murphy – Curtin University If Google added email interceptions in their terms and services and privacy policies, would you remain with Google and accept their terms or discontinue with their services? 21
  • 22. NET303 Politics & Power (Sahagian, 2013). (Lunduke, 2010). SP3/2013 A2 28/10/13 “Google Insists It Has the Right to Read Your Emails” (Sahagian, 2013). “Google is seeking to appeal a “Google is seeking to appeal a ruling that it broke wiretapping ruling that it broke wiretapping laws when the company scanned and laws when the company scanned and read Gmail users’ personal emails in read Gmail users’ personal emails in order to promote advertising and order to promote advertising and build user profiles” (Sahagian, build user profiles” (Sahagian, 2013). 2013). (Niedermayer, 2012). Kylie Murphy – Curtin University 22
  • 23. NET303 Politics & Power SP3/2013 A2 (Tate, 2011). 28/10/13 “Google lawsuit stirs debate over email privacy rights” (Munroe, 2013). Marc Rotenberg, a Privacy Lawyer Marc Rotenberg, a Privacy Lawyer states regarding this lawsuit states regarding this lawsuit that “It’s alarming for the that “It’s alarming for the world’s largest email service world’s largest email service provider to say they don’t have provider to say they don’t have an obligation to protect an obligation to protect privacy.” privacy.” (Munroe, 2013). (CBC News, 2013). Kylie Murphy – Curtin University 23
  • 24. NET303 Politics & Power SP3/2013 A2 28/10/13 Conclusion I hope this presentation has helped you understand Google’s Terms of Service and Privacy Policies and how it relates to your privacy and security. Thank you for your time… Kylie Murphy – Curtin University 24
  • 25. NET303 Politics & Power SP3/2013 A2 28/10/13 References Bort, J. (September 27, 2013). Google Is Being Sued For Reading Gmail In Order To Target Ads. Business Insider. Retrieved October 23, 2013, from http://www.businessinsider.com.au/google-is-being-sued-for-reading-email-to-targetads-2013-9 Bort, J. (September 27, 2013). Google Is Being Sued For Reading Gmail In Order To Target Ads. [Image]. Business Insider. Retrieved October 23, 2013, from http://www.businessinsider.com.au/google-is-being-sued-for-reading-emailto-target-ads-2013-9 Brown, M., & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concern and Online Purchase Behavior. Journal of Electronic Commerce Research, 591), 62-70. Retrieved October 25, 2013, from http://www.csulb.edu/web/journals/jecr/issues/20041/Paper6.pdf CBC News. (August 14, 2013). No privacy for Gmail users. [Image]. CBC News. Retrieved October 25, 2013, from http://www.cbc.ca/player/News/Technology+and+Science/ID/2401260676/ CypherApps. (2013). Securing Google Docs. [Image]. Retrieved October 21, 2013, from http://www.cipherapps.com/ Google. (2013). Age requirements for Google+. Retrieved October 25, 2013, https://support.google.com/a/answer/1645514?hl=en Google. (2013). Google Products. Retrieved October 21, 2013, from http://www.google.com/about/products/ Google. (2013). Privacy Policy. Retrieved October 20, 2013, from https://www.google.com.au/intl/en/policies/privacy/ Google. (2013). Terms of Service. Retrieved October 20, 2013, from https://www.google.com.au/intl/en/policies/terms/regional.html Google. (2013). Terms of Service update. Retrieved October 20, 2013, from https://www.google.com.au/intl/en/policies/terms/regional.html Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in Computer Science Computation and Society: Privacy and Technology. Retrieved September 14, 2013, from http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf Introna, L. D. (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28(3), 259275. Lunduke, B. (2010). Google Hates Linux and Video Games. [Image]. Retrieved October 24, 2013, from http://lunduke.com/?p=1129 Kylie Murphy – Curtin University 25
  • 26. NET303 Politics & Power SP3/2013 A2 References 28/10/13 Lunduke, B. (2010). Google Hates Linux and Video Games. [Image]. Retrieved October 23, 2013, from http://lunduke.com/?p=1129 Ms. Smith. (June 10, 2010). Microsoft Proposes Each PC Needs A Health Certificate or No Net Access Allowed. [Weblog]. Retrieved October 21, 2013, from http://www.networkworld.com/community/blog/microsoft-proposes-each-pcneeds-health-certi Munroe, I. (August 16, 2013). Google lawsuit stirs debate over email privacy rights Critics condemn internet giant over 'no legitimate expectation of privacy' argument. CBC News. Retrieved October 24, 2013, from http://www.cbc.ca/news/technology/google-lawsuit-stirs-debate-over-email-privacy-rights-1.1413906 Niedermayer, C. (2012). Court of Appeal, CA – Opinions. [Image]. Retrieved October 24, 2013, from https://play.google.com/store/apps/details?id=com.cniederm.coasearch Price, J. (September 27, 2013). Google Email Practices Dealt Setback In Federal Privacy Dispute. ID Radar. Retrieved October 23, 2013, from https://www.idradar.com/news-stories/digital-privacy/Google-Gmail-Practices-Could-ConstitutePrivacy-Violation Price, J. (September 27, 2013). Google Email Practices Dealt Setback In Federal Privacy Dispute. [Image]. Retrieved October 23, 2013, from https://www.idradar.com/news-stories/digital-privacy/Google-Gmail-Practices-Could-ConstitutePrivacy-Violation Reisinger, D. (2013). Google slapped with lawsuit over man's salacious images. [Image]. Retrieved October 23, 2013, from http://news.cnet.com/8301-1009_3-57601483-83/google-slapped-with-lawsuit-over-mans-salacious-images/ Ruscoe, T. & P. Lenssen. (February 18, 2008). Winner of the Google Logo Redesign Contest. [Weblog]. Retrieved October 22, 2013, from http://blogoscoped.com/archive/2008-02-18-n61.html Sahagian, J. (October 10, 2013). Google Insists It Has the Right to Read Your Emails. Retrieved October 23, 2013, from http://wallstcheatsheet.com/stocks/google-insists-it-has-the-right-to-read-your-emails.html/ Sahagian, J. (October 10, 2013). Google Insists It Has the Right to Read Your Emails. [Image]. Retrieved October 23, 2013, from http://wallstcheatsheet.com/stocks/google-insists-it-has-the-right-to-read-your-emails.html/ Slatten, D. (2013). NEW Google Logo: High-quality PNG Image with Transparent Background. [Image]. Retrieved October 21, 2013 from http://www.seomofo.com/orm/new-google-logo.html Surf Context. (2013). Fast and easy access for 1 million users. [Image]. Retrieved October 22, 2013, from http://www.surfnet.nl/en/Thema/coin/voorcloudproviders/Pages/default.aspx Kylie Murphy – Curtin University 26
  • 27. NET303 Politics & Power SP3/2013 A2 References 28/10/13 Tate, R. (November, 05, 2011). How Google Spies on Your Gmail Account (And How To Stop It). [Image]. Retrieved October 24, 2013, from http://gawker.com/5800868/how-google-spies-on-your-gmail-account-and-how-to-stop-it The McCrindle Blog. (November 14, 2012). The most asked questions in Australia according to Google search suggestions. [Weblog, Image]. Retrieved October 25, 2013, from http://www.mccrindle.com.au/themccrindleblog/most_asked_questions_australia_google_search_suggestions The Mayer Brown Practices. (July 29, 2013). FTC’s Recent Revisions to the Children’s Online Privacy Protection Act (“COPPA”). Meyer Brown. Retrieved October 25, 2013, from http://www.mayerbrown.com/FTCs-RecentRevisions-to-theChildrens-Online-Privacy-Protection-Act-COPPA-07-29-2013/ Waxer, C. (January 01, 2013). Navigating the Murky Boundaries of Privacy. [Image]. Retrieved October 26, 2013, from http://www.dmnews.com/navigating-the-murky-boundaries-of-privacy/article/273190/ Wright, C. (October, 24, 2013). Kissing Google goodbye. Sydney Morning Herald. Retrieved October 24, 2013, from http://www.smh.com.au/digital-life/digital-life-news/kissing-google-goodbye-20131023-2vzso.html Villasenor, J. 2013. Google Glass and the Demise of Ownership What the restrictions on resale of the gadget mean for consumers. [Image]. Retrieved October 22, 2013 from, http://www.slate.com/articles/technology/future_tense/2013/04/google_glass_terms_of_service_restrictions_on_r esale_are_bad_for_consumers.html Google Policy Primer by Kylie Murphy is licensed under a Creative Commons Attribution 3.0 Unported License. Kylie Murphy – Curtin University 27