SlideShare a Scribd company logo
An Analysis of LinkedIn’s Terms of Service
By Angeline Hildreth
Image uploaded from LinkedIn.com
NET 303: Online Policy Primer
This Online Policy Primer Presentation was written as part of an
assignment for Bachelor of Arts (Internet communications) at Curtin
University, Perth, WA. It has no association with LinkedIn or affiliation
with LinkedIn. Every effort has been made to ensure the accuracy of the
information.
This presentation is for educational purposes only and not a substitute
for legal advice. Please seek professional advice from a lawyer for any
legal advice pertaining to legal issues.
DISCLAIMER
LinkedIn is a social media platform aimed at
providing social networking to professionals.
Image by GDJ (2015)
It claims to be “The World’s largest professional
network”.
Image uploaded from LinkedIn.com
The basic service is free to register. It also offers a
premium service with a monthly fee.
Image uploaded from LinkedIn.com
Regardless of the type of service; whether it is free or fee paying, you need to join
LinkedIn and become a member to use the service, though you can visit the web site
and browse member’s profiles.
By selecting ‘Join now’ you are agreeing to their Terms of Service (TOS or User
Agreement), Privacy Policy and Cookie Policy.
Image: uploaded from LinkedIn.com
“If you have any concerns about …any manner
permitted in this Privacy Policy and the User
Agreement, you should not become a Member,
visit our websites, apps or otherwise use our
Services (LinkedIn, 2014).”
What if you do not agree!
What LinkedIn is saying is, if you do not agree then you should not
use their service or visit their website.
If you do, they will apply the clauses mentioned in their Terms of
Agreement.
Terms of Service is a legal contract between you and your chosen service
provider.
Image by Sivvus (2009)
READ IT BEFORE YOU AGREE TO IT!
LinkedIn’s policies contain a number
of clauses relating to ownership,
privacy, copyright, censorship which
raise concerns and are worth a closer
look.
Image uploaded from LinkedIn.com Images: by Levis501 (2013)
But how many of us have time to read through pages and
pages of these complex documents before giving up and
blindly agreeing to them?
Image by Doodleguy (2014)Images uploaded from LinkedIn.com
Image by Palomaironique (2010)
In agreeing to LinkedIn Terms of Service, you are
obligated to them to:
 Be at least 14 years old in Australia and have no
restriction to use their site.
Provide them with your real name, email address
and password.
Agree to keep your information up to date.
Give them non-exclusive license: transferrable and
sub-licensable rights to your information.
Image by Mestre-kame (2008)
Your information is also collected by LinkedIn when
you visit their website.
“Our Privacy Policy applies to any Member or Visitor.
We collect information when you use our Services to
offer you a personalized and relevant experience,
including growing your network and enabling business
opportunities.”
Visitors BEWARE
These are just a few examples of what you have
agreed to when joining LinkedIn. Let’s have a
closer look at some areas you have agreed to.
Image: Uploaded from LinkedIn .com
“You own your content and are responsible for protecting your data. You are
also required to give LinkedIn non-exclusive license to your data and the
rights to retain your personal information, content of your posts. (LinkedIn,
2015).”
Who owns the content?
Simply put; the content and liabilities belong to
you.
LinkedIn has the rights to collect vast amounts of
your information including information on people
you associate with and your financial details for their
benefit. Though, they claim to use the information
for your benefit.
COPYRIGHT
“Please note that whether or not we disable access to
or remove content, LinkedIn may make a good faith
attempt to forward the written notification, including
the complainant’s contact information, to the Member
who posted the content and/or take other reasonable
steps to notify the Member that LinkedIn has received
notice of an alleged violation of intellectual property
rights or other content violation.”
But …
LinkedIn takes no responsibility to
stop others from copying your
information.
“ We collect information when you fill out
a profile… – like your job title, education,
and skills – helps you get found by other
people for opportunities.”
PRIVACY AND SURVEILLANCE
Image by Mav (2012)Image by GDJ (2015)
Basically, LinkedIn collects all of its member’s and visitor’s personal
information and has user's detailed profiles at their fingertips.
They also collect content from your email address book or calendar,
your participations in various activities and the web sites or ads you
clicked on.
Your every move is monitored using Cookie Technology (Lessig,
1998: August,).
LinkedIn use cookie technology to track your
browsing habits both on theirs and other sites you
visit (LinkedIn, 2014).
Though they claim it is to enable and support their
security features and to help them detect malicious
activity and violations of their User Agreement
(Harry, 2014).
“We may use cookies to show you relevant
advertising both on and off the LinkedIn site. We
may also use a cookie to learn whether members
who saw an ad on LinkedIn later visited the
advertiser's site… We may also work with a
partner to show you an ad on or off LinkedIn,
such as after you've visited a partner's site or
application (LinkedIn, 2014).”
So, who do you think is really benefitting from cookie
technologies here (Brown & Muchira, 2004, p. 66)!
Image by Last-Dino (2012)
“We also receive the internet protocol (“IP”)
address of your computer or the proxy server
that you use to access the web, your computer
operating system details, your type of web
browser, your mobile device (including your
mobile device identifier provided by your mobile
device operating system) … and the name of your
ISP or your mobile carrier.”
This is an invasion of privacy; DON’T YOU THINK
(Zittrain, 2009; Goettke & Christiana, 2007)!
LinkedIn does, and will exercise their
authority to deny access and remove
content/accounts without notifying you!
They will do this if they deem you to
have broken the agreement (Villeneuve,
2006).
Who is the gatekeeper censoring our content and
account?
“If there is a change in control or sale of all or part of
LinkedIn, we may share your information with a third
party, who will have the right to use that information
in line with this Privacy Policy.”
Image: by Hatalar205 (2013)
What this means is that you have unknowingly, as part of
the agreement, given LinkedIn the right to sell your
personal details as part of the company assets. Should
they decide to sell the company, don’t expect a share of
the capital gain. You won’t get any!
“We may change this Privacy Policy from time to time. If we make
significant changes in the way we treat your personal information, or
to the Privacy Policy, we will provide notice to you on the Services or
by some other means, such as email…Using our Services after a
notice of changes has been communicated to you or published on our
Services shall constitute consent to the changed terms or practices.”
They can change the policy at any time. They may email you or publish the
changes on their website. It is your responsibility to keep checking for changes
for they may not email you the changes. The onus is put back on you!
Knowing what you do now; would you try and read the Terms
of Service before signing up to any of the internet platforms?
I certainly would!
Reference
August, O. (2007). The Great Firewall: China's Misguided - and Futile - Attempt to Control What Happens
Online. Wired, 15(11).
Retrieved from
https://web.archive.org/web/20080626074423/http://www.wired.com/politics/security/magazine/15-
11/ff_chinafirewall?currentPage=1
Brown, M., & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concern and Online
Purchase Behavior. Journal of Electronic Commerce Research, 591, 62-70. Retrieved from
http://www.csulb.edu/web/journals/jecr/issues/20041/Paper6.pdf
Doodleguy. (2014). Man Giving Up [Clip art]. Retrieved from https://openclipart.org/detail/211086/man-
resigning
EbizMBA. (n.d.). Top 15 Most Popular Websites-October 2015 [Blog post]. Retrieved from
http://www.ebizmba.com/articles/most-popular-websites
Ernes. (2008). Lente – magnifying glass [Clip art]. Retrieved from
https://openclipart.org/search/?query=magnifying%20glass&page=2
GDJ. (2015). Social Media 2 [Clip art]. Retrieved from https://openclipart.org/detail/227111/social-media-2
GDJ. (2015). Professional People Silhouette [image]. Retrieved from
https://openclipart.org/detail/226095/professional-people-silhouette
Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r:
Special Topics in Computer Science Computation and Society: Privacy and Technology.
Available: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r:
Special Topics in Computer Science Computation and Society: Privacy and Technology.
Available: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
Harry, S. (2014). Everyone Watches, Nobody Sees: How Black Women Disrupt Surveillance Theory. Model
View Culture. Retrieved from https://modelviewculture.com/pieces/everyone-watches-nobody-sees-how-
black-women-disrupt-surveillance-theory
Hatalar205. (2013). Bell [Clip art]. Retrieved from https://openclipart.org/detail/177231/bell
Last-Dina. (2012). Binoculars [Clip art]. Retrieved from https://openclipart.org/detail/170639/binoculars
Levis501 (2013). Magnifying Glass with Transparent Glass [Clip art]. Retrieved from
https://openclipart.org/detail/176296/magnifying-glass-with-transparent-glass
Lessig, L. (1998). The Architecture of Privacy: Draft 2. Retrieved from .
https://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf
LinkedIn. (n.d.). Join Now [image]. Retrieved from https://www.linkedin.com/reg/join?trk=hb_ft_join
LinkedIn. (n.d.). What Is LinkedIn ? Retrieved from https://www.linkedin.com/static?key=what_is_linkedin
LinkedIn. (n.d.). User Agreement. Retrieved from https://www.linkedin.com/legal/user-
agreement?trk=hb_ft_userag
LinkedIn. (n.d.). Your Privacy Matters. Retrieved from https://www.linkedin.com/legal/privacy-
policy?trk=hb_ft_priv
LinkedIn. (2014). Cookies on the LinkedIn site. Retrieved from https://www.linkedin.com/legal/cookie-policy
LinkedIn (2015). Be great at what you do: Get started – it’s free. Retrieved from https://www.linkedin.com/
Mav. (2012). Im-watching-u [Claip art]. Retrieved from https://openclipart.org/detail/168864/imwatchingu
Mestre-Kame. (2008). Alert red icon [Clip art]. Retrieved from https://openclipart.org/detail/20715/alert-red-
icon
Milanovic, R. (2015, April 13). The World's 21 Most Important Social Media Sites and Apps in 2015
[Weblog]. Retrieved from http://www.socialmediatoday.com/social-networks/2015-04-13/worlds-21-
most-important-social-media-sites-and-apps-2015
Palomaironique. (2010). Handshake with Black Outline (white man and woman) [Clip art]. Retrieved from
https://openclipart.org/detail/57085/handshake-with-black-outline-white-man-and-woman
Sivvus. (2009). Scales. Retrieve from https://openclipart.org/detail/26865/scales
Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation
of borders in cyberspace. First Monday, 11(1). Retrieved
from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307/1227
Zittrain, J. (2009, July 19). Lost in the Cloud. The New York Times. Retrieved from
http://www.nytimes.com/2009/07/20/opinion/20zittrain.html?tntemail1=y&_r=3&emc=tnt&pagewanted
=all

More Related Content

What's hot

Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
Tommy Hobin
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
Kaliya "Identity Woman" Young
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
Abhijeet Kelkar
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
The Hacker News
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
Shawn Tuma
 
Social media and intellectual property
Social media and intellectual propertySocial media and intellectual property
Social media and intellectual property
Visual Resources Association
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their data
GiuliadeNicolellis
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
Kaliya "Identity Woman" Young
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
Jack Pringle
 
Nytlegal #56866-v3-ona 2013-_ds_draft
Nytlegal #56866-v3-ona 2013-_ds_draftNytlegal #56866-v3-ona 2013-_ds_draft
Nytlegal #56866-v3-ona 2013-_ds_draft
Peter Outlaw
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
Nick Buonvicino
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
Solomben
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
Prof. (Dr.) Tabrez Ahmad
 
Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?
Arab Federation for Digital Economy
 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
Kaliya "Identity Woman" Young
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
gallowayandcollens
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
Kaliya "Identity Woman" Young
 
E commerce: Expanding Business Online
E commerce: Expanding Business OnlineE commerce: Expanding Business Online
E commerce: Expanding Business Online
Janette Toral
 
Hacking back in self defense
Hacking back in self defenseHacking back in self defense
Hacking back in self defense
David Willson, Attorney, CISSP, Security +
 

What's hot (20)

Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Social media and intellectual property
Social media and intellectual propertySocial media and intellectual property
Social media and intellectual property
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their data
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
 
Nytlegal #56866-v3-ona 2013-_ds_draft
Nytlegal #56866-v3-ona 2013-_ds_draftNytlegal #56866-v3-ona 2013-_ds_draft
Nytlegal #56866-v3-ona 2013-_ds_draft
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?
 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
 
Personal Data Store Project
Personal Data Store ProjectPersonal Data Store Project
Personal Data Store Project
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
 
E commerce: Expanding Business Online
E commerce: Expanding Business OnlineE commerce: Expanding Business Online
E commerce: Expanding Business Online
 
Hacking back in self defense
Hacking back in self defenseHacking back in self defense
Hacking back in self defense
 

Viewers also liked

Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
cheahwey
 
Snapchat Policy Primer
Snapchat Policy PrimerSnapchat Policy Primer
Snapchat Policy PrimerGavo12
 
Online Policy Primer: Flickr Terms of Service
Online Policy Primer: Flickr Terms of ServiceOnline Policy Primer: Flickr Terms of Service
Online Policy Primer: Flickr Terms of Service
removed_6642363568d4e42c1bd73ba62af7d4d8
 
Net23 - Slideshare Policy Primer
Net23 - Slideshare Policy PrimerNet23 - Slideshare Policy Primer
Net23 - Slideshare Policy Primer
Simon Mainwaring
 
Workshop Student 2.0 - Pauline Maas - SNRD16
Workshop Student 2.0 - Pauline Maas - SNRD16Workshop Student 2.0 - Pauline Maas - SNRD16
Workshop Student 2.0 - Pauline Maas - SNRD16SURFnet
 
Workshop 'Big data' Simon Hania
Workshop 'Big data'  Simon HaniaWorkshop 'Big data'  Simon Hania
Workshop 'Big data' Simon Hania
SURFnet
 

Viewers also liked (6)

Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
 
Snapchat Policy Primer
Snapchat Policy PrimerSnapchat Policy Primer
Snapchat Policy Primer
 
Online Policy Primer: Flickr Terms of Service
Online Policy Primer: Flickr Terms of ServiceOnline Policy Primer: Flickr Terms of Service
Online Policy Primer: Flickr Terms of Service
 
Net23 - Slideshare Policy Primer
Net23 - Slideshare Policy PrimerNet23 - Slideshare Policy Primer
Net23 - Slideshare Policy Primer
 
Workshop Student 2.0 - Pauline Maas - SNRD16
Workshop Student 2.0 - Pauline Maas - SNRD16Workshop Student 2.0 - Pauline Maas - SNRD16
Workshop Student 2.0 - Pauline Maas - SNRD16
 
Workshop 'Big data' Simon Hania
Workshop 'Big data'  Simon HaniaWorkshop 'Big data'  Simon Hania
Workshop 'Big data' Simon Hania
 

Similar to NET 303: Online Policy Primer

Linked in policy primer mwilson
Linked in policy primer mwilsonLinked in policy primer mwilson
Linked in policy primer mwilson
wjmark
 
Policy and primer linked in mwilson
Policy and primer linked in mwilsonPolicy and primer linked in mwilson
Policy and primer linked in mwilson
wjmark
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
Asim Sourav Rath
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
Steve Mckee
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
Kannan Subbiah
 
JS Fest 2019. Vitaly Friedman. Bringing Personality Back To The Web
JS Fest 2019. Vitaly Friedman. Bringing Personality Back To The WebJS Fest 2019. Vitaly Friedman. Bringing Personality Back To The Web
JS Fest 2019. Vitaly Friedman. Bringing Personality Back To The Web
JSFestUA
 
Linkedin policy primer
Linkedin policy primerLinkedin policy primer
Linkedin policy primer
Anna Dobos
 
Matthew Hopkins Primer
Matthew Hopkins PrimerMatthew Hopkins Primer
Matthew Hopkins Primer
17142779
 
Juliette van balen; sociale netwerken, juridische aspecten
Juliette van balen; sociale netwerken, juridische aspectenJuliette van balen; sociale netwerken, juridische aspecten
Juliette van balen; sociale netwerken, juridische aspectenHans Hoornstra
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
gailmowal
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
shanikosh
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
Robert Stribley
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
SSPTRGCELL
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptx
LyndaWillett
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
seadeloitte
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
Hubbamar
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
julia594
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
Robert Stribley
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 

Similar to NET 303: Online Policy Primer (20)

Linked in policy primer mwilson
Linked in policy primer mwilsonLinked in policy primer mwilson
Linked in policy primer mwilson
 
Policy and primer linked in mwilson
Policy and primer linked in mwilsonPolicy and primer linked in mwilson
Policy and primer linked in mwilson
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
JS Fest 2019. Vitaly Friedman. Bringing Personality Back To The Web
JS Fest 2019. Vitaly Friedman. Bringing Personality Back To The WebJS Fest 2019. Vitaly Friedman. Bringing Personality Back To The Web
JS Fest 2019. Vitaly Friedman. Bringing Personality Back To The Web
 
Linkedin policy primer
Linkedin policy primerLinkedin policy primer
Linkedin policy primer
 
Matthew Hopkins Primer
Matthew Hopkins PrimerMatthew Hopkins Primer
Matthew Hopkins Primer
 
Juliette van balen; sociale netwerken, juridische aspecten
Juliette van balen; sociale netwerken, juridische aspectenJuliette van balen; sociale netwerken, juridische aspecten
Juliette van balen; sociale netwerken, juridische aspecten
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptx
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 

NET 303: Online Policy Primer

  • 1. An Analysis of LinkedIn’s Terms of Service By Angeline Hildreth Image uploaded from LinkedIn.com NET 303: Online Policy Primer
  • 2. This Online Policy Primer Presentation was written as part of an assignment for Bachelor of Arts (Internet communications) at Curtin University, Perth, WA. It has no association with LinkedIn or affiliation with LinkedIn. Every effort has been made to ensure the accuracy of the information. This presentation is for educational purposes only and not a substitute for legal advice. Please seek professional advice from a lawyer for any legal advice pertaining to legal issues. DISCLAIMER
  • 3. LinkedIn is a social media platform aimed at providing social networking to professionals. Image by GDJ (2015)
  • 4. It claims to be “The World’s largest professional network”. Image uploaded from LinkedIn.com
  • 5. The basic service is free to register. It also offers a premium service with a monthly fee. Image uploaded from LinkedIn.com
  • 6. Regardless of the type of service; whether it is free or fee paying, you need to join LinkedIn and become a member to use the service, though you can visit the web site and browse member’s profiles. By selecting ‘Join now’ you are agreeing to their Terms of Service (TOS or User Agreement), Privacy Policy and Cookie Policy. Image: uploaded from LinkedIn.com
  • 7. “If you have any concerns about …any manner permitted in this Privacy Policy and the User Agreement, you should not become a Member, visit our websites, apps or otherwise use our Services (LinkedIn, 2014).” What if you do not agree!
  • 8. What LinkedIn is saying is, if you do not agree then you should not use their service or visit their website. If you do, they will apply the clauses mentioned in their Terms of Agreement.
  • 9. Terms of Service is a legal contract between you and your chosen service provider. Image by Sivvus (2009) READ IT BEFORE YOU AGREE TO IT!
  • 10. LinkedIn’s policies contain a number of clauses relating to ownership, privacy, copyright, censorship which raise concerns and are worth a closer look. Image uploaded from LinkedIn.com Images: by Levis501 (2013)
  • 11. But how many of us have time to read through pages and pages of these complex documents before giving up and blindly agreeing to them? Image by Doodleguy (2014)Images uploaded from LinkedIn.com
  • 12. Image by Palomaironique (2010) In agreeing to LinkedIn Terms of Service, you are obligated to them to:  Be at least 14 years old in Australia and have no restriction to use their site. Provide them with your real name, email address and password. Agree to keep your information up to date. Give them non-exclusive license: transferrable and sub-licensable rights to your information.
  • 13. Image by Mestre-kame (2008) Your information is also collected by LinkedIn when you visit their website. “Our Privacy Policy applies to any Member or Visitor. We collect information when you use our Services to offer you a personalized and relevant experience, including growing your network and enabling business opportunities.” Visitors BEWARE
  • 14. These are just a few examples of what you have agreed to when joining LinkedIn. Let’s have a closer look at some areas you have agreed to.
  • 15. Image: Uploaded from LinkedIn .com “You own your content and are responsible for protecting your data. You are also required to give LinkedIn non-exclusive license to your data and the rights to retain your personal information, content of your posts. (LinkedIn, 2015).” Who owns the content?
  • 16. Simply put; the content and liabilities belong to you. LinkedIn has the rights to collect vast amounts of your information including information on people you associate with and your financial details for their benefit. Though, they claim to use the information for your benefit.
  • 17. COPYRIGHT “Please note that whether or not we disable access to or remove content, LinkedIn may make a good faith attempt to forward the written notification, including the complainant’s contact information, to the Member who posted the content and/or take other reasonable steps to notify the Member that LinkedIn has received notice of an alleged violation of intellectual property rights or other content violation.”
  • 18. But … LinkedIn takes no responsibility to stop others from copying your information.
  • 19. “ We collect information when you fill out a profile… – like your job title, education, and skills – helps you get found by other people for opportunities.” PRIVACY AND SURVEILLANCE
  • 20. Image by Mav (2012)Image by GDJ (2015) Basically, LinkedIn collects all of its member’s and visitor’s personal information and has user's detailed profiles at their fingertips. They also collect content from your email address book or calendar, your participations in various activities and the web sites or ads you clicked on. Your every move is monitored using Cookie Technology (Lessig, 1998: August,).
  • 21. LinkedIn use cookie technology to track your browsing habits both on theirs and other sites you visit (LinkedIn, 2014). Though they claim it is to enable and support their security features and to help them detect malicious activity and violations of their User Agreement (Harry, 2014).
  • 22. “We may use cookies to show you relevant advertising both on and off the LinkedIn site. We may also use a cookie to learn whether members who saw an ad on LinkedIn later visited the advertiser's site… We may also work with a partner to show you an ad on or off LinkedIn, such as after you've visited a partner's site or application (LinkedIn, 2014).” So, who do you think is really benefitting from cookie technologies here (Brown & Muchira, 2004, p. 66)!
  • 23. Image by Last-Dino (2012) “We also receive the internet protocol (“IP”) address of your computer or the proxy server that you use to access the web, your computer operating system details, your type of web browser, your mobile device (including your mobile device identifier provided by your mobile device operating system) … and the name of your ISP or your mobile carrier.” This is an invasion of privacy; DON’T YOU THINK (Zittrain, 2009; Goettke & Christiana, 2007)!
  • 24. LinkedIn does, and will exercise their authority to deny access and remove content/accounts without notifying you! They will do this if they deem you to have broken the agreement (Villeneuve, 2006). Who is the gatekeeper censoring our content and account?
  • 25. “If there is a change in control or sale of all or part of LinkedIn, we may share your information with a third party, who will have the right to use that information in line with this Privacy Policy.” Image: by Hatalar205 (2013)
  • 26. What this means is that you have unknowingly, as part of the agreement, given LinkedIn the right to sell your personal details as part of the company assets. Should they decide to sell the company, don’t expect a share of the capital gain. You won’t get any!
  • 27. “We may change this Privacy Policy from time to time. If we make significant changes in the way we treat your personal information, or to the Privacy Policy, we will provide notice to you on the Services or by some other means, such as email…Using our Services after a notice of changes has been communicated to you or published on our Services shall constitute consent to the changed terms or practices.” They can change the policy at any time. They may email you or publish the changes on their website. It is your responsibility to keep checking for changes for they may not email you the changes. The onus is put back on you!
  • 28. Knowing what you do now; would you try and read the Terms of Service before signing up to any of the internet platforms? I certainly would!
  • 29. Reference August, O. (2007). The Great Firewall: China's Misguided - and Futile - Attempt to Control What Happens Online. Wired, 15(11). Retrieved from https://web.archive.org/web/20080626074423/http://www.wired.com/politics/security/magazine/15- 11/ff_chinafirewall?currentPage=1 Brown, M., & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concern and Online Purchase Behavior. Journal of Electronic Commerce Research, 591, 62-70. Retrieved from http://www.csulb.edu/web/journals/jecr/issues/20041/Paper6.pdf Doodleguy. (2014). Man Giving Up [Clip art]. Retrieved from https://openclipart.org/detail/211086/man- resigning EbizMBA. (n.d.). Top 15 Most Popular Websites-October 2015 [Blog post]. Retrieved from http://www.ebizmba.com/articles/most-popular-websites Ernes. (2008). Lente – magnifying glass [Clip art]. Retrieved from https://openclipart.org/search/?query=magnifying%20glass&page=2 GDJ. (2015). Social Media 2 [Clip art]. Retrieved from https://openclipart.org/detail/227111/social-media-2 GDJ. (2015). Professional People Silhouette [image]. Retrieved from https://openclipart.org/detail/226095/professional-people-silhouette Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in Computer Science Computation and Society: Privacy and Technology. Available: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
  • 30. Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in Computer Science Computation and Society: Privacy and Technology. Available: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf Harry, S. (2014). Everyone Watches, Nobody Sees: How Black Women Disrupt Surveillance Theory. Model View Culture. Retrieved from https://modelviewculture.com/pieces/everyone-watches-nobody-sees-how- black-women-disrupt-surveillance-theory Hatalar205. (2013). Bell [Clip art]. Retrieved from https://openclipart.org/detail/177231/bell Last-Dina. (2012). Binoculars [Clip art]. Retrieved from https://openclipart.org/detail/170639/binoculars Levis501 (2013). Magnifying Glass with Transparent Glass [Clip art]. Retrieved from https://openclipart.org/detail/176296/magnifying-glass-with-transparent-glass Lessig, L. (1998). The Architecture of Privacy: Draft 2. Retrieved from . https://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf LinkedIn. (n.d.). Join Now [image]. Retrieved from https://www.linkedin.com/reg/join?trk=hb_ft_join LinkedIn. (n.d.). What Is LinkedIn ? Retrieved from https://www.linkedin.com/static?key=what_is_linkedin LinkedIn. (n.d.). User Agreement. Retrieved from https://www.linkedin.com/legal/user- agreement?trk=hb_ft_userag LinkedIn. (n.d.). Your Privacy Matters. Retrieved from https://www.linkedin.com/legal/privacy- policy?trk=hb_ft_priv LinkedIn. (2014). Cookies on the LinkedIn site. Retrieved from https://www.linkedin.com/legal/cookie-policy
  • 31. LinkedIn (2015). Be great at what you do: Get started – it’s free. Retrieved from https://www.linkedin.com/ Mav. (2012). Im-watching-u [Claip art]. Retrieved from https://openclipart.org/detail/168864/imwatchingu Mestre-Kame. (2008). Alert red icon [Clip art]. Retrieved from https://openclipart.org/detail/20715/alert-red- icon Milanovic, R. (2015, April 13). The World's 21 Most Important Social Media Sites and Apps in 2015 [Weblog]. Retrieved from http://www.socialmediatoday.com/social-networks/2015-04-13/worlds-21- most-important-social-media-sites-and-apps-2015 Palomaironique. (2010). Handshake with Black Outline (white man and woman) [Clip art]. Retrieved from https://openclipart.org/detail/57085/handshake-with-black-outline-white-man-and-woman Sivvus. (2009). Scales. Retrieve from https://openclipart.org/detail/26865/scales Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday, 11(1). Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307/1227 Zittrain, J. (2009, July 19). Lost in the Cloud. The New York Times. Retrieved from http://www.nytimes.com/2009/07/20/opinion/20zittrain.html?tntemail1=y&_r=3&emc=tnt&pagewanted =all