SlideShare a Scribd company logo
1 of 12
Why Read This?
The Terms of Use for Facebook are accessed through
quite a long and complex document.
This presentation outlines those terms in a simpler
format.
These terms are then further explored, highlighting
possible implications for you, the user.
Terms of Use in a Nutshell
 You own all content you post on Facebook, and you can
control who has access to it.
 However you also grant Facebook unlimited licence to
use your content, whilst your account is active.
 You will not provide any false personal information.
 You will not use Facebook if you are under 13.
 You agree not to bully, harass, or intimidate other
users.
 You agree not post content that is hateful, threatening,
pornographic, violent, or unlawful.
 You will not share your password, or jeopardize the
security of your account.
 You will not upload viruses or other malicious code.
 You understand that advertising on Facebook is not
always identified as such.
 Facebook retain the right to terminate your account at
any time.
 If you choose to terminate your account, Facebook will
keep your data for a reasonable period of time.
Hey That's My Photo!
 Most users would not be aware that they grant
Facebook unlimited license on the photos they post.
 This extends to your name and profile pic being used
in adverts on Facebook, as well as by 3rd party
applications you sign up to.
 This can lead to compromising situations, such as your
profile pic being used in dating site ads (Oshiro, 2009).
That’s An Ad?
 Advertising on Facebook is not always identified as
such.
 This can lead to users inadvertently granting
advertisers access to their content.
 The introduction of fan pages for ads further blurs the
line between advertising and user content(Farber,
2007).
Child Safety
 Whilst Facebook states users are not to post false
personal information, there are no real identity
checks.
 This can leave young users exposed to sexual predators
(Critchley, 2009).
 Recently an 18 year old man masqueraded as a high
school girl to illicit nude photos from teenage boys
(Kincaid, 2009).
Bullies Are Cowards
 The ability to post false profiles also promotes cyber
bullying.
 Cyber bullies thrive in hidden identities, and the
power and dominance it grants them (Pathcin &
Hinduja, 2006).
 Four students in the US created a fake profile for a
fellow student falsely depicting him as a gay
racist(Grove, 2009).
Safety First
 Setting up the right privacy and security settings can
help deter the aforementioned issues (Cheng, 2009).
 Unfortunately the default settings allow the most
access to your content, which most users do not
change.
 Thankfully more and more people, and governments,
are pressuring Facebook to change the default settings
(Wray, 2009).
Didn’t I Delete That?
 Finally if you take the decision to delete your Facebook
account, or if Facebook makes that decision for you,
your data is still retained for a reasonable period of
time.
 But what is a ‘reasonable’ period of time?
 Once again users should be mindful of what they post,
and monitor Facebook’s Terms of Use (BBC News,
2009).
References
 BBC News. (2009). Facebook ‘withdraws’ data changes. Retrieved September 22, 2009, from
http://news.bbc.co.uk/2/hi/technology/7896309.stm
 Cheng, J. (2009). Facebook privacy: a guide. Retrieved September 22, 2009, from
http://arstechnica.com/web/news/2009/08/meshing-social-networking-and-privacy-on-facebook.ars
 Critchley, C. (2009). Sexual deviants trawl social networking sites. Retrieved September 25, 2009, from
http://ceps.anu.edu.au/publications/pdfs/media_reports/choo_sexual_deviants_trawl_social_networ
king_sites.pdf
 Facebook. (2009). Terms of Use. Retrieved September 18, 2009, from
http://www.facebook.com/terms.php?ref=pf
 Farber, D. (2007). Facebook Ads: Monetizing the social graph and social graft. Retrieved September
22, 2009, from http://blogs.zdnet.com/BTL/?p=6916
 Grove, J.V. (2009). 4 Teens Sued for Obscene Fake Facebook Profile. Retrieved September 28, 2009,
from http://mashable.com/2009/09/25/fake-facebook-profile/
 Kincaid, J. (2009). Wake Up Call: Facebook Isn’t A Safe Haven. Retrieved September 23, 2009, from
http://www.techcrunch.com/2009/02/08/wake-up-call-facebook-isnt-a-safe-haven/
 Oshiro, D. (2009). UPDATE: Are You Facebook’s Ad Poster Child? Exploring Acceptable Use. Retrieved
September 23, 2009, from
http://www.readwriteweb.com/archives/are_you_facebooks_ad_poster_child_exploring_accept.php
 Patchin, J., & Hinduja, S. (2006). Bullies Move Beyond the Schoolyard. Youth Violence and Juvenile
Justice, 4(2).
 Wray, R. (2009). Facebook forced to tighten up privacy rules. Retrieved September 28, 2009, from
http://www.guardian.co.uk/technology/2009/aug/27/facebook-privacy-canada

More Related Content

What's hot

How often do you schedule your posts of Social Media?
How often do you schedule your posts of Social Media?How often do you schedule your posts of Social Media?
How often do you schedule your posts of Social Media?Global Voices of Social Media
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media SafetyChad Warner
 
Group 11 privacy & legal issues
Group 11 privacy & legal issuesGroup 11 privacy & legal issues
Group 11 privacy & legal issuesTanvi Valecha
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
MySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesMySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesTechnoArmor Consulting
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your programSarah K Miller
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures Bryan Fendley
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15Naval OPSEC
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15Naval OPSEC
 
Facebook: Assignment 2a: Policy Primer
Facebook: Assignment 2a: Policy PrimerFacebook: Assignment 2a: Policy Primer
Facebook: Assignment 2a: Policy Primerjames24587
 
Turn on the Secure browsing option.
Turn on the Secure browsing option. 
Turn on the Secure browsing option.
Turn on the Secure browsing option. unsightlyoaf4043
 
Security Challenges Today
Security Challenges TodaySecurity Challenges Today
Security Challenges TodayCatalin Cosoi
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Securitythaash95
 
Facebook in the Work Place
Facebook in the Work PlaceFacebook in the Work Place
Facebook in the Work PlaceCMHSL
 

What's hot (20)

How often do you schedule your posts of Social Media?
How often do you schedule your posts of Social Media?How often do you schedule your posts of Social Media?
How often do you schedule your posts of Social Media?
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
Group 11 privacy & legal issues
Group 11 privacy & legal issuesGroup 11 privacy & legal issues
Group 11 privacy & legal issues
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
MySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesMySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network Sites
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your program
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures
 
Facebook privacy
Facebook privacyFacebook privacy
Facebook privacy
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Facebook: Assignment 2a: Policy Primer
Facebook: Assignment 2a: Policy PrimerFacebook: Assignment 2a: Policy Primer
Facebook: Assignment 2a: Policy Primer
 
Turn on the Secure browsing option.
Turn on the Secure browsing option. 
Turn on the Secure browsing option.
Turn on the Secure browsing option.
 
Security Challenges Today
Security Challenges TodaySecurity Challenges Today
Security Challenges Today
 
Net503_a.2_Cooper
Net503_a.2_CooperNet503_a.2_Cooper
Net503_a.2_Cooper
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Twitter for PR and Journalism - Fall 2010
Twitter for PR and Journalism - Fall 2010Twitter for PR and Journalism - Fall 2010
Twitter for PR and Journalism - Fall 2010
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Facebook in the Work Place
Facebook in the Work PlaceFacebook in the Work Place
Facebook in the Work Place
 

Similar to Facebook: Terms of Use, Explained & Explored

Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookDaniel Ilunga
 
Facebook terms and conditions
Facebook terms and conditionsFacebook terms and conditions
Facebook terms and conditionsjimcamo
 
Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings ReportAbhishek Gupta
 
Facebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth KandeepanFacebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth Kandeepanprasanthkandeepan
 
Facebook Terms of Service and Privacy Policy Primer
Facebook Terms of Service and Privacy Policy PrimerFacebook Terms of Service and Privacy Policy Primer
Facebook Terms of Service and Privacy Policy PrimerDon Spinosa
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy PrimerBrett Elphick
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightJibril Abubakar
 
Facebook: 'Real name' policy & privacy
Facebook: 'Real name' policy & privacyFacebook: 'Real name' policy & privacy
Facebook: 'Real name' policy & privacyAsh Laura
 
Slides
SlidesSlides
Slidesrkc20
 
The paper needs to be a rhetorical analysis of another writer’s .docx
The paper needs to be a rhetorical analysis of another writer’s .docxThe paper needs to be a rhetorical analysis of another writer’s .docx
The paper needs to be a rhetorical analysis of another writer’s .docxcarlz4
 
Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primersophiegalati
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08elizkeren
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08elizkeren
 
Facebook Online Policy Primer
Facebook Online Policy PrimerFacebook Online Policy Primer
Facebook Online Policy Primermark mclaine
 
Macul Socialnetwork
Macul SocialnetworkMacul Socialnetwork
Macul Socialnetworkelizkeren
 
Macul Socialnetwork
Macul SocialnetworkMacul Socialnetwork
Macul Socialnetworkelizkeren
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chiltonelizkeren
 

Similar to Facebook: Terms of Use, Explained & Explored (20)

Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
 
Facebook terms and conditions
Facebook terms and conditionsFacebook terms and conditions
Facebook terms and conditions
 
Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings Report
 
Facebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth KandeepanFacebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth Kandeepan
 
Facebook Terms of Service and Privacy Policy Primer
Facebook Terms of Service and Privacy Policy PrimerFacebook Terms of Service and Privacy Policy Primer
Facebook Terms of Service and Privacy Policy Primer
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy Primer
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyright
 
Facebook: 'Real name' policy & privacy
Facebook: 'Real name' policy & privacyFacebook: 'Real name' policy & privacy
Facebook: 'Real name' policy & privacy
 
Slides
SlidesSlides
Slides
 
The paper needs to be a rhetorical analysis of another writer’s .docx
The paper needs to be a rhetorical analysis of another writer’s .docxThe paper needs to be a rhetorical analysis of another writer’s .docx
The paper needs to be a rhetorical analysis of another writer’s .docx
 
Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primer
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08
 
Facebook Online Policy Primer
Facebook Online Policy PrimerFacebook Online Policy Primer
Facebook Online Policy Primer
 
Macul Socialnetwork
Macul SocialnetworkMacul Socialnetwork
Macul Socialnetwork
 
Macul Socialnetwork
Macul SocialnetworkMacul Socialnetwork
Macul Socialnetwork
 
549 458-465
549 458-465549 458-465
549 458-465
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chilton
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Facebook: Terms of Use, Explained & Explored

  • 1.
  • 2. Why Read This? The Terms of Use for Facebook are accessed through quite a long and complex document. This presentation outlines those terms in a simpler format. These terms are then further explored, highlighting possible implications for you, the user.
  • 3. Terms of Use in a Nutshell  You own all content you post on Facebook, and you can control who has access to it.  However you also grant Facebook unlimited licence to use your content, whilst your account is active.  You will not provide any false personal information.  You will not use Facebook if you are under 13.
  • 4.  You agree not to bully, harass, or intimidate other users.  You agree not post content that is hateful, threatening, pornographic, violent, or unlawful.  You will not share your password, or jeopardize the security of your account.  You will not upload viruses or other malicious code.
  • 5.  You understand that advertising on Facebook is not always identified as such.  Facebook retain the right to terminate your account at any time.  If you choose to terminate your account, Facebook will keep your data for a reasonable period of time.
  • 6. Hey That's My Photo!  Most users would not be aware that they grant Facebook unlimited license on the photos they post.  This extends to your name and profile pic being used in adverts on Facebook, as well as by 3rd party applications you sign up to.  This can lead to compromising situations, such as your profile pic being used in dating site ads (Oshiro, 2009).
  • 7. That’s An Ad?  Advertising on Facebook is not always identified as such.  This can lead to users inadvertently granting advertisers access to their content.  The introduction of fan pages for ads further blurs the line between advertising and user content(Farber, 2007).
  • 8. Child Safety  Whilst Facebook states users are not to post false personal information, there are no real identity checks.  This can leave young users exposed to sexual predators (Critchley, 2009).  Recently an 18 year old man masqueraded as a high school girl to illicit nude photos from teenage boys (Kincaid, 2009).
  • 9. Bullies Are Cowards  The ability to post false profiles also promotes cyber bullying.  Cyber bullies thrive in hidden identities, and the power and dominance it grants them (Pathcin & Hinduja, 2006).  Four students in the US created a fake profile for a fellow student falsely depicting him as a gay racist(Grove, 2009).
  • 10. Safety First  Setting up the right privacy and security settings can help deter the aforementioned issues (Cheng, 2009).  Unfortunately the default settings allow the most access to your content, which most users do not change.  Thankfully more and more people, and governments, are pressuring Facebook to change the default settings (Wray, 2009).
  • 11. Didn’t I Delete That?  Finally if you take the decision to delete your Facebook account, or if Facebook makes that decision for you, your data is still retained for a reasonable period of time.  But what is a ‘reasonable’ period of time?  Once again users should be mindful of what they post, and monitor Facebook’s Terms of Use (BBC News, 2009).
  • 12. References  BBC News. (2009). Facebook ‘withdraws’ data changes. Retrieved September 22, 2009, from http://news.bbc.co.uk/2/hi/technology/7896309.stm  Cheng, J. (2009). Facebook privacy: a guide. Retrieved September 22, 2009, from http://arstechnica.com/web/news/2009/08/meshing-social-networking-and-privacy-on-facebook.ars  Critchley, C. (2009). Sexual deviants trawl social networking sites. Retrieved September 25, 2009, from http://ceps.anu.edu.au/publications/pdfs/media_reports/choo_sexual_deviants_trawl_social_networ king_sites.pdf  Facebook. (2009). Terms of Use. Retrieved September 18, 2009, from http://www.facebook.com/terms.php?ref=pf  Farber, D. (2007). Facebook Ads: Monetizing the social graph and social graft. Retrieved September 22, 2009, from http://blogs.zdnet.com/BTL/?p=6916  Grove, J.V. (2009). 4 Teens Sued for Obscene Fake Facebook Profile. Retrieved September 28, 2009, from http://mashable.com/2009/09/25/fake-facebook-profile/  Kincaid, J. (2009). Wake Up Call: Facebook Isn’t A Safe Haven. Retrieved September 23, 2009, from http://www.techcrunch.com/2009/02/08/wake-up-call-facebook-isnt-a-safe-haven/  Oshiro, D. (2009). UPDATE: Are You Facebook’s Ad Poster Child? Exploring Acceptable Use. Retrieved September 23, 2009, from http://www.readwriteweb.com/archives/are_you_facebooks_ad_poster_child_exploring_accept.php  Patchin, J., & Hinduja, S. (2006). Bullies Move Beyond the Schoolyard. Youth Violence and Juvenile Justice, 4(2).  Wray, R. (2009). Facebook forced to tighten up privacy rules. Retrieved September 28, 2009, from http://www.guardian.co.uk/technology/2009/aug/27/facebook-privacy-canada