2. What you need to know before
clicking “I Agree”.
A guide by Sian Cooper
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5
Australia License.
3. Firstly, what is Twitter?
Twitter is a Social Networking Service that allows its users to
post ‘Tweets’ containing 140 characters or less.
Anybody over the age of 13 years can register for their own
Twitter account. As long as you meet the minimum age
requirement, you can be anything you want to be on Twitter…
Even a pigeon!
4. Prior to becoming an active user, you must
agree to Twitters
Terms of Service
http://twitter.com/tos
and
Privacy Policy
http://twitter.com/privacy
5. Did you know that approximately
95% of people do not read through
a ‘Terms of Service’ statement
before clicking
- Leaver, 2009.
6. What have you just agreed to?
http://www.flickr.com/photos/rosauraochoa/3274257201/in/photostream/
7. Well…
Firstly, Twitter is an open platform
meaning that anything you post on
Twitter can be broadcast to a
wider audience… the general
public… third party services and
websites… virtually anybody that
has access to the internet
worldwide.
http://www.flickr.com/photos/rosauraochoa/4527329648/in/photostream
8.
9. Why is it important to think before
you Tweet?
Although cyberspace is a virtual
place where you cannot physically
see the audience that will view the
content that you post online…
always remember that you have a
worldwide audience. YOU are
responsible for the content that you
post online.
10. http://www.flickr.com/photos/rosauraochoa/3326772902/
Tips: Try not to use offensive language, post misleading
information or harmful content, share copyrighted images or
pornographic material. These things may get you into trouble!
11. Things that may get you into trouble…
Recently, a “troll scandal” broke out on
Twitter which resulted in an employee
being suspended from her position at
Monash University.
She sent a Tweet to TV presenter Charlotte
Dawson which read “If I was your fiancé I'd
hang myself too #gohangyourself” (Byrnes,
2012).
http://www.flickr.com/ph
otos/rosauraochoa/35280
68649/in/photostream/
12. Suicide taunts and other forms of harassment are not
condoned on Twitter, and may place you in breach of
Twitter’s rules and regulations.
13. Cyber crime experts have warned that hate tweets could
also be prosecuted as a breach of the Commonwealth
Crimes Act, relating to using "a carriage service to
menace, harass or cause offence or for the purposes of a
threat“
- Byrnes, 2012.
http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/
14. More things that may get you into
trouble…
Earlier this year, two British tourists were restricted
from entering America following a joke on Twitter
stating “I’m going to destroy America and dig up
Marilyn Monroe” (Hartley-Parkinson, 2012). The
Department of Homeland Security initially flagged one
of the tourists as a potential threat following a Tweet
stating “Free this week, for quick gossip/prep before I
go and destroy America?” (Hartley-Parkinson, 2012).
http://www.flickr.com/ph
otos/rosauraochoa/35280
68649/in/photostream/
15. The tourists were detained at Los Angeles airport on suspicion
of ‘planning to commit crimes’. The 26 year old boy who
initially sent the Tweet argued that the word ‘destroy’ is a
British word used for ‘party’.
Nevertheless, the content and wording of his Tweet was enough
to place security officials on high alert.
-Hartley-Parkinson (2012).
16. Another thing to keep in mind…
When posting images and sharing information on Twitter, please
take note of and respect the copyright attached to the content that
you are sharing.
http://www.flickr.com/photos/27302612@N03/3179098895/
17. Twitters Copyright Policy
“Respects the intellectual property rights of
others and expects users of the service to do
the same”
- Twitter Terms of Service (2012).
http://www.flickr.com/photos/27302612@N03
/3179098895/
18. What happens if you are in breach of
the rules and regulations?
If you are found to be in
breach of the rules and
regulations, Twitter has
the right to remove and
refuse to distribute
content that you have
posted, to suspend your
http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/
user account, or reclaim
your username
-Twitter Terms of Service (2012).
19. Remember…
YOU are responsible for your use of the services that
Twitter provides, for any content you post and
share, and for any consequences thereof. This
includes other users and third party services using
your content.
- Twitter Terms of Service (2012).
20. If you do not agree to these terms of service,
then do not click
22. Did you know…
A Consumer Reports ‘State of the Net’ survey conducted in 2010
revealed that up to 9 per cent of social network users had experienced
some form of abuse online in that past year, such as scams, harassment,
and identity theft (Sachoff, 2010).
Social network users that post personal information such as their full
birth dates, home addresses, photos and names of children, have been
found to be most at risk of falling victim to cybercrime (Sachoff, 2010).
23. Although Twitter does ask you to provide some of your personal
information during the registration process, such as your name,
password, username and email address, you CAN control the
amount of personal information that you share with the public by
adjusting your
24. Remember that, unless you adjust your PRIVACY SETTINGS,
everything you post on Twitter is PUBLIC. This includes:
Metadata provided with Tweets…
Tweets…
And Retweets.
-Twitter Privacy Policy (2012).
http://www.flickr.com/photos/rosauraochoa/3330891783/in/photostream/
25.
26. Twitter does not actively monitor every post that is published on it’s site, nor does
it proactively remove Tweets on behalf of other users (Holt, 2012).
If you feel that your privacy has been
violated, you need to fill out a
complaint form in order for Twitter to
take further action. The complaint form
can be found at
https://support.twitter.com/forms/abusi
veuser
http://www.flickr.com/photos/carrotcreative/2511539541/
27. What other types of information can
Twitter access from you?
Your location information, such as the location that you are in when you send a Tweet from
your mobile phone.
Twitter monitors your website usage by using tracking cookies (a small data file that is
transferred to your computer), in order to gain a better understanding of how you use it’s
services.
Log data, such as your computers IP address, the search terms that you use, your mobile
carrier, and the pages that you have visited, are all recorded by Twitter.
Third-Party services may also retrieve aspects of information that are sent by your web
browser, on the condition that these third parties use this data in line with Twitters Privacy
Policy.
In the case that Twitter faces issues such as bankruptcy and sale of assets, your personal
information and account information may be sold as part of that transaction.
- Twitter Privacy Policy (2012).
28. So…
“We’re accustomed to thinking of the internet as being a neutral place, a
blank sheet upon which we are free to do whatever we desire, whether
liberal or conservative, corporate or anarchist, commercial or free” (Barthel,
2012).
29. Always remember…
“Before posting something about yourself or your family on the
internet, ask yourself: have you or would you ever disclose this kind of
information to a stranger in real life?
If the answer is NO then you’d better think twice before you send it out
into a world where it can be put to countless illicit uses and, more
importantly, from which you may never be able to completely erase it”
(Datcu, 2012).
30. References
Barthel, M. (July 5, 2012). What are the Politics of the Internet? The AWL. Retrieved 5th September 2012 from
http://www.theawl.com/2012/07/politics-of-the-internet
Byrnes, H. (August 29, 2012). Australia's Next Top Model judge Charlotte Dawson takes aim at Twitter trolls.
News Limited Network. Retrieved 31st August 2012 from
http://www.news.com.au/entertainment/television/australias-next-top-model-judge-charlotte-dawson-takes-
aim-at-twitter-trolls/story-e6frfmyi-1226459899947
Carrotcreative. (May 21, 2008). Twitter Pack, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/carrotcreative/2511539541/
Dactu, S. (February 9, 2012). The Psychology of Personal Information Sharing. Bitfender Resource Center.
Retrieved 4th September 2012 from http://www.bitdefender.com/blog/The-Psychology-of-Personal-Information-
Sharing-44.html
Hartley-Parkinson, R. (January 31, 2012). I'm going to destroy America and dig up Marilyn Monroe: British pair
arrested in U.S. on terror charges over Twitter jokes. Mail Online. Retrieved 31st August 2012 from
http://www.dailymail.co.uk/news/article-2093796/Emily-Bunting-Leigh-Van-Bryan-UK-tourists-arrested-destroy-
America-Twitter-jokes.html
Holt, K. (August 1, 2012). What to do when someone Tweets your phone number without permission. The Daily
Dot. Retrieved 5th September 2012 from http://www.dailydot.com/society/how-to-twitter-privacy-complaint/
31. References
Leaver, T. (November 18, 2009). Learning, Authenticity & Online Policy Primers. Tama’s Learning Blog, [Blog].
Retrieved 28th August 2012 from http://tama.edublogs.org/
Marc.benton (January 4, 2009). Photography on Twitter, [Image]. Retrieved 1st September 2012 from
http://www.flickr.com/photos/27302612@N03/3179098895/
Rosaura Ochoa. (April 16, 2010). Twitter on Paper , [Image]. Retrieved 3rd September 2012 from
http://www.flickr.com/photos/rosauraochoa/4527329648/in/photostream
Rosaura Ochoa. (May 13, 2009). Nonviolenceiamx_banner_120x600, [Image]. Retrieved 2nd September 2012 from
http://www.flickr.com/photos/rosauraochoa/3528068649/in/photostream/
Rosaura Ochoa. (April 6, 2009). Twitter Profile, [Image]. Retrieved 2nd September 2012 from
http://www.flickr.com/photos/rosauraochoa/3419823308/in/photostream/
Rosaura Ochoa. (May 13, 2009). Twitter_Good_Bad, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/rosauraochoa/3528880050/in/photostream/
Rosaura Ochoa. (March 5, 2009). Retweet, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/rosauraochoa/3330891783/in/photostream/
Rosaura Ochoa. (February 12, 2009). Twitter, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/rosauraochoa/3274257201/in/photostream/
32. References
Rosaura Ochoa. (July 28, 2010). Twitter En La Vida Real, [Image]. Retrieved 1st September 2012 from
http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/
Rosaura Ochoa. (March 3, 2009). Alto a la Violencia, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/rosauraochoa/3326772902/
Sachoff, M. (May 4, 2010). Social Network Users Posting Too Much Personal Information: Social Network Users
Vulnerable to Cybercrime. WebProNews. Retrieved 4th September 2012 from
http://www.webpronews.com/social-network-users-posting-too-much-personal-information-2010-05
Twitter Privacy Policy. (May 17, 2012). Retrieved 31st August 2012 from http://twitter.com/privacy
Twitter Terms of Service. (June 25, 2012). Retrieved 31st August from http://twitter.com/tos