SlideShare a Scribd company logo
1 of 44
NET 303 – Policy Primer
By using Facebook, you
agree to the Statement of
Rights and
Responsibilities that is
updated from time to
time.
You grant
Facebook a
non-exclusive,
transferable,
sub-licensable,
royalty-free,
worldwide
license to use
any IP content
that you post.
Once your
pictures or
videos are
out there
on
Facebook,
it is
difficult to
have
control of
them
All videos, pictures and
other information
disclosed on Facebook
becomes its property.
Facebook can use your
content in any way it sees
for profit.
When you delete content, it
remains in backup copies
for a reasonable period of
time.
An application you
join, can access
your content and
information and
what others have
shared with you
Facebook receives data when you
look at another person’s timeline,
send or receive a message, search
for a friend or a page.
Facebook has 14,000 word terms of
service and data use police …
Few people really read the “terms
and agreement” of the sign-up
page nor the Facebook’s privacy
policy.
Facebook users
are concerned
with privacy.
They either:
1.
Leave the site
2.
Configure
their privacy
setting that
are
complicated to
understand
Changes in the layout
and privacy settings are
not always easy and fast
to understand.
Users have to choose
among a lot of
different settings
and options to
modify Facebook’s
default settings.
Although Facebook
has developed
options to control
their information,
few users have the
technical ability to
manage well their
privacy settings.
Facebook Privacy
Policy in 2005:

Current Facebook
Privacy Policy:

“No personal information
that you submit to the
Facebook will be
available to any users
of the Web Site who
does not belong to at
least one of the groups
specified by you in
your privacy settings.”

“When you connect with
an application or
website it will have
access to General
Information about you.
The term General
Information includes
your and your friends
names, profile picture,
gender, …”
According to Facebook, users
personal information…
In
2005

… belonged to specified groups

In
2006

… belonged to user’s schools , local area and
other “reasonable” community.

In
2007

… belonged to friends of friends

In
2009

… belonged to “everyone”
Facebook has begun to delete personal
privacy at an accelerated pace
Facebook
users do
not know
where their
private and
public
spheres
should be
drawn.
Protection of
personal
privacy is
fundamental
to an
individual’s
autonomy and
to control
what is
disclosed to
others.
“A man without privacy is a man without
dignity; the fear that Big Brother is
watching and listening threatens the
freedom of the individual no less than the
prison bars.”
Zelman Cowen
Economy is
dependant of the
free flow of
information on
social networking
sites that affects
personal privacy.
Facebook
tracks its
users’
activities and
develop
profiles of
consumers.
Facebook users
are concerned
about the loss
of their
anonymity
and about the
sale of their
information to
third parties
for multiple
purposes.
Surveillance has become the social norm of this
century and it is a form of social control.
Facebook provides online visible interaction
available among many people.
“Control of information and communication has
been a major source of power throughout
history. The advent of the Internet and of
wireless communication allows the
development of many-to-many and one-to-one
horizontal communication channels that bypass
political or business control of communication.”
Manuel Castells
Facebook has gained bad
press:
1.

2.

Users are easily being
tracked
Users’ information is
shared without any
consent.
Facebook privacy problems:

Users disclose too
much

1.

2.

Personal Privacy is not
well protected
Third parties are
looking to take profit
of users’ information

3.
Why Personal Privacy is not well protected?
For example, Facebook users’ may not be
aware that Facebook default settings for
photo albums is “global”
Personal information
is exposed to
strangers on
Facebook
Your Facebook “friends”
own your personal content
and can give it to a whole
range of other people.
The amount of
users’ disclosed
information on
Facebook is highly
valuable for
companies for
marketing issues.
We are free Facebook
labourers, that profits
from us.
The old adage
“Knowledge is
power” speaks
about the power
Facebook has
gained
recollecting
information
about over a
billion users.
Knowledge is key to
the exercise of
power
“The world is embracing new standards of
conduct, enforced not only by surveillance
and coertion but by willful disclosure:
regulation by revelation.”

Ann Florini
Transparency as a
public good might
become a public
bad that infringes
on personal
privacy.
Despite the disadvantages of
having a Facebook account,
deleting a Facebook account may
also be a disadvantage for our
social and professional matters.
The use of Facebook is very useful for freedom of
expression especially in countries that use some
form of oppression for dissidents.
Facebook represents a
public space, where the
power is exercised
References
Virtual Threat. [Image]. (2013). NSA-Surveillance. Retrieved October 10, 2013, from
http://www.virtualthreat.com/2013/08/03/nsa-surveillance-tool-allows-real-time-access/
The Guardian. [Image]. (2009). Facebook Surveillance. Retrieved October 10, 2013, from
http://www.theguardian.com/commentisfree/libertycentral/2009/jun/18/villain-bozeman-city
Dailysquib.co.uk. [Image]. (2011). Facebook Big Brother. Retrieved October 10, 2013, from
http://www.dailysquib.co.uk/sci_tech/2806-facebook-wants-every-user-fingerprinted.html
Cheeteye. [Image]. (2011). Surveillancebook. Retrieved October10, 2013, from
http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg
Forbes. [Image]. (2013). Facebook. Retrieved October 10, 2013, from
http://www.forbes.com/sites/andygreenberg/2013/08/27/facebook-first-report-on-governmentdata-requests-shows-it-denies-u-s-surveillance-demands-more-often-than-google/
Diary of a Workcovervictim. [Image]. (2013). Facebook Surveillance. Retrieved October 10,
2013, from http://aworkcovervictimsdiary.com/2013/02/how-does-social-media-and-othersurveillance-prejudice-an-injured-workers-case/
Bitdefender. [Image]. (2013). Facebook, Google, Yahoo and Microsoft Fight for Data
Transparency. Retrieved October 10, 2013, from
http://www.hotforsecurity.com/blog/facebook-google-yahoo-and-microsoft-fight-for-datatransparency7023.html?sm_id=H4S_Posts&utm_source=SocialMedia&utm_medium=Post&utm_campaign=H4S
Voice of Russia. [Image]. (2013). Facebook. Retrieved October 10, 2013, from
http://indian.ruvr.ru/2013_09_21/Mass-exodus-Facebook/
Révolte Numérique.[Image]. (2012). Facebook Surveillance. Retrieved October 10, 2013,
from http://www.revoltenumerique.herbesfolles.org/tag/fichage/
Dooneyscafe. [Image]. (2013). Big Brother is Watching. Retrieved October10, 2013, from
http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg
Genius Media Group. [Image]. (2013). Facebook Privacy. Retrieved October 10, 2013, from
http://news.rapgenius.com/Facebook-proposed-changes-to-statement-of-rights-andresponsibilities-lyrics
SocialFish. [Image]. (2013). Data Use Policy. Retrieved October 10, 2013, from
http://www.socialfish.org/2013/06/a-little-privacy-please-your-rights-and-social-mediapolicies.html
QualityStockPhotos. [Image]. (2013). QualityStockPhotos. Retrieved October 10, 2013, from
http://www.qualitystockphotos.com/

More Related Content

What's hot

Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksTrends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksEman Bustamante
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightJibril Abubakar
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of InternetSagarneel Majumder
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracksglairerabida
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project GabrielleTawyer
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Private School
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...joanagolo4ever
 

What's hot (20)

Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksTrends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Internet
InternetInternet
Internet
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyright
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of Internet
 
Ppt
PptPpt
Ppt
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
Ict day4 quiz
Ict day4 quizIct day4 quiz
Ict day4 quiz
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project
 
The social network
The social networkThe social network
The social network
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Trends in ict
Trends in ictTrends in ict
Trends in ict
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
 

Similar to Online Policy Primer: Facebook

Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primersophiegalati
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young AdultsRatan Rajpal
 
FACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxFACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxkanurukarthikeya
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebookhernan_j1
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Social media
Social mediaSocial media
Social mediaIbm Csr
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook ControversiesInternet Law Center
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Comm 303 slideshow
Comm 303 slideshowComm 303 slideshow
Comm 303 slideshownegrita06
 
Detweiler,com303 50,final project
Detweiler,com303 50,final projectDetweiler,com303 50,final project
Detweiler,com303 50,final projectselmik
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 

Similar to Online Policy Primer: Facebook (20)

Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primer
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social networking
Social networkingSocial networking
Social networking
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young Adults
 
FACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxFACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptx
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebook
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Social media
Social mediaSocial media
Social media
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook Controversies
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Assignment 5
Assignment 5Assignment 5
Assignment 5
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Comm 303 slideshow
Comm 303 slideshowComm 303 slideshow
Comm 303 slideshow
 
Detweiler,com303 50,final project
Detweiler,com303 50,final projectDetweiler,com303 50,final project
Detweiler,com303 50,final project
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Online Policy Primer: Facebook

  • 1. NET 303 – Policy Primer
  • 2. By using Facebook, you agree to the Statement of Rights and Responsibilities that is updated from time to time.
  • 4. Once your pictures or videos are out there on Facebook, it is difficult to have control of them
  • 5. All videos, pictures and other information disclosed on Facebook becomes its property.
  • 6. Facebook can use your content in any way it sees for profit.
  • 7. When you delete content, it remains in backup copies for a reasonable period of time.
  • 8. An application you join, can access your content and information and what others have shared with you
  • 9. Facebook receives data when you look at another person’s timeline, send or receive a message, search for a friend or a page.
  • 10. Facebook has 14,000 word terms of service and data use police …
  • 11. Few people really read the “terms and agreement” of the sign-up page nor the Facebook’s privacy policy.
  • 12. Facebook users are concerned with privacy. They either: 1. Leave the site 2. Configure their privacy setting that are complicated to understand
  • 13. Changes in the layout and privacy settings are not always easy and fast to understand.
  • 14. Users have to choose among a lot of different settings and options to modify Facebook’s default settings.
  • 15. Although Facebook has developed options to control their information, few users have the technical ability to manage well their privacy settings.
  • 16. Facebook Privacy Policy in 2005: Current Facebook Privacy Policy: “No personal information that you submit to the Facebook will be available to any users of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings.” “When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends names, profile picture, gender, …”
  • 17. According to Facebook, users personal information… In 2005 … belonged to specified groups In 2006 … belonged to user’s schools , local area and other “reasonable” community. In 2007 … belonged to friends of friends In 2009 … belonged to “everyone”
  • 18. Facebook has begun to delete personal privacy at an accelerated pace
  • 19. Facebook users do not know where their private and public spheres should be drawn.
  • 20. Protection of personal privacy is fundamental to an individual’s autonomy and to control what is disclosed to others.
  • 21. “A man without privacy is a man without dignity; the fear that Big Brother is watching and listening threatens the freedom of the individual no less than the prison bars.” Zelman Cowen
  • 22. Economy is dependant of the free flow of information on social networking sites that affects personal privacy.
  • 24. Facebook users are concerned about the loss of their anonymity and about the sale of their information to third parties for multiple purposes.
  • 25. Surveillance has become the social norm of this century and it is a form of social control.
  • 26. Facebook provides online visible interaction available among many people.
  • 27. “Control of information and communication has been a major source of power throughout history. The advent of the Internet and of wireless communication allows the development of many-to-many and one-to-one horizontal communication channels that bypass political or business control of communication.” Manuel Castells
  • 28. Facebook has gained bad press: 1. 2. Users are easily being tracked Users’ information is shared without any consent.
  • 29. Facebook privacy problems: Users disclose too much 1. 2. Personal Privacy is not well protected Third parties are looking to take profit of users’ information 3.
  • 30. Why Personal Privacy is not well protected? For example, Facebook users’ may not be aware that Facebook default settings for photo albums is “global”
  • 31. Personal information is exposed to strangers on Facebook
  • 32. Your Facebook “friends” own your personal content and can give it to a whole range of other people.
  • 33. The amount of users’ disclosed information on Facebook is highly valuable for companies for marketing issues.
  • 34. We are free Facebook labourers, that profits from us.
  • 35. The old adage “Knowledge is power” speaks about the power Facebook has gained recollecting information about over a billion users.
  • 36. Knowledge is key to the exercise of power
  • 37. “The world is embracing new standards of conduct, enforced not only by surveillance and coertion but by willful disclosure: regulation by revelation.” Ann Florini
  • 38. Transparency as a public good might become a public bad that infringes on personal privacy.
  • 39. Despite the disadvantages of having a Facebook account, deleting a Facebook account may also be a disadvantage for our social and professional matters.
  • 40. The use of Facebook is very useful for freedom of expression especially in countries that use some form of oppression for dissidents.
  • 41. Facebook represents a public space, where the power is exercised
  • 42. References Virtual Threat. [Image]. (2013). NSA-Surveillance. Retrieved October 10, 2013, from http://www.virtualthreat.com/2013/08/03/nsa-surveillance-tool-allows-real-time-access/ The Guardian. [Image]. (2009). Facebook Surveillance. Retrieved October 10, 2013, from http://www.theguardian.com/commentisfree/libertycentral/2009/jun/18/villain-bozeman-city Dailysquib.co.uk. [Image]. (2011). Facebook Big Brother. Retrieved October 10, 2013, from http://www.dailysquib.co.uk/sci_tech/2806-facebook-wants-every-user-fingerprinted.html Cheeteye. [Image]. (2011). Surveillancebook. Retrieved October10, 2013, from http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg Forbes. [Image]. (2013). Facebook. Retrieved October 10, 2013, from http://www.forbes.com/sites/andygreenberg/2013/08/27/facebook-first-report-on-governmentdata-requests-shows-it-denies-u-s-surveillance-demands-more-often-than-google/ Diary of a Workcovervictim. [Image]. (2013). Facebook Surveillance. Retrieved October 10, 2013, from http://aworkcovervictimsdiary.com/2013/02/how-does-social-media-and-othersurveillance-prejudice-an-injured-workers-case/
  • 43. Bitdefender. [Image]. (2013). Facebook, Google, Yahoo and Microsoft Fight for Data Transparency. Retrieved October 10, 2013, from http://www.hotforsecurity.com/blog/facebook-google-yahoo-and-microsoft-fight-for-datatransparency7023.html?sm_id=H4S_Posts&utm_source=SocialMedia&utm_medium=Post&utm_campaign=H4S Voice of Russia. [Image]. (2013). Facebook. Retrieved October 10, 2013, from http://indian.ruvr.ru/2013_09_21/Mass-exodus-Facebook/ Révolte Numérique.[Image]. (2012). Facebook Surveillance. Retrieved October 10, 2013, from http://www.revoltenumerique.herbesfolles.org/tag/fichage/ Dooneyscafe. [Image]. (2013). Big Brother is Watching. Retrieved October10, 2013, from http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg Genius Media Group. [Image]. (2013). Facebook Privacy. Retrieved October 10, 2013, from http://news.rapgenius.com/Facebook-proposed-changes-to-statement-of-rights-andresponsibilities-lyrics SocialFish. [Image]. (2013). Data Use Policy. Retrieved October 10, 2013, from http://www.socialfish.org/2013/06/a-little-privacy-please-your-rights-and-social-mediapolicies.html
  • 44. QualityStockPhotos. [Image]. (2013). QualityStockPhotos. Retrieved October 10, 2013, from http://www.qualitystockphotos.com/