SlideShare a Scribd company logo
1 of 22
Download to read offline
Privacy in Our Interconnected World
by Michæl Archer
Computers, tablets, phones . . . what doesn’t
have an internet connection these days?
Even our watches have internet access!
Our electronics are all interconnected with one another . . .
Popular Android apps ping servers about once every three minutes with your
current location . . .
To tell you the weather . . .
To give you traffic details . . .
To give you relevant ads . . .
To tell you where you are . . .
They can even help you relocate your lost kids at Disney World . . .
By using Facebook’s app, here are some of the things you agree to let the app do, as per the Terms of Service:
• make calls without your permission or intervention
• Send text messages without your permission
• Read your phone call logs
• Read data about your contacts
When was the last time you read a Terms of Service agreement, instead of mindlessly just hitting “I agree”?
This information is collected and stored for various
purposes. Facebook does not delete user
information when a user deletes his account.
You know that drop-down list of search predictions when you
type something into the Chrome bar? That’s the browser
sending information about your keystrokes to Google’s servers.
But what’s wrong with that? . . .
In 2013, Edward Snowden, an employee for the NSA in the United States, leaked information
detailing the mass surveillance of the American government of its own people.
Among those whose servers the NSA had
direct access to? Yahoo, Google, Facebook,
and Microsoft.
Snowden also spoke out against the use of Dropbox,
criticizing the service’s lack of encryption.
“But I have nothing to hide! Why should I be
worried?”
Edward Snowden: “You’re inverting the model of responsibility for how rights work. . . . When you say, ‘I have nothing to
hide,’ you’re saying, ‘I don’t care about this right.’ You’re saying, ‘I don’t have this right, because I’ve got to the point where
I have to justify it.’ The way rights work is, the government has to justify its intrusion into your rights.”
So as you go about your Internet day, just
remember . . .
All pictures are under the Creative Commons
License, published by anonymous authors.
References from course readings:
Constine, Josh. Facebook ‘Nearby Friends’ Will Track Your Location History To Target You With Ads. 18 April 2014. Online.
Dwoskin, Elizabeth. Where Were You 3 Minutes Ago? Your Apps Know. New York, 25 March 2015. Online. 30 May 2015.
Madden, Sean. Tech That Tracks Your Every Move Can Be Convenient, Not Creepy. 10 March 2014. Wired. 30 May 2015. <http://www.wired.com/2014/03/designers-tracking-tradeoffs>.
"Home, hacked home; The internet of things." The Economist 12 July 2014: 14(US). Academic OneFile. Web. 30 May 2015. URL
http://go.galegroup.com/ps/i.do?id=GALE%7CA374524912&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=3f62b19a238f2dbcba05701695a2d62f
Arlen, Gary. "The internet of things: looking ahead to an interconnected world." Multichannel News24 Feb. 2014: 10+. Academic OneFile. Web. 30 May 2015. URL
http://go.galegroup.com/ps/i.do?id=GALE%7CA362850216&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=510ced36c2b4630825e5776e404f2ada
References from non-course readings
BBC. Edward Snowden: Leaks that exposed US spy programme. 17 January 2014. Online.
Bogart, Nicole. What you need to know about concerns over Facebook’s Messenger app. 5
August 2014. Online.
Ha, Anthony. Edward Snowden’s Privacy Tips: “Get Rid Of Dropbox,” Avoid Facebook And
Google. 11 October 2011. Online.
NBC. Edward Snowden Timeline. 26 May 2014. Online.
Purdy, Kevin. What Data of Mine Does Chrome Send to Google? 18 February 2011. Online.
Whittaker, Zack. Facebook does not erase user-deleted content. 28 April 2010. Online.

More Related Content

Viewers also liked

Viewers also liked (7)

New Anam Bastari AR Resume
New Anam Bastari AR ResumeNew Anam Bastari AR Resume
New Anam Bastari AR Resume
 
Higiene y seguridad industrial
Higiene y seguridad industrialHigiene y seguridad industrial
Higiene y seguridad industrial
 
Molienda
Molienda Molienda
Molienda
 
Digital 2015
Digital 2015Digital 2015
Digital 2015
 
Revised Atlanta classification of Acute Pancreatitis
Revised Atlanta classification of Acute PancreatitisRevised Atlanta classification of Acute Pancreatitis
Revised Atlanta classification of Acute Pancreatitis
 
Edad del bronce
Edad del bronceEdad del bronce
Edad del bronce
 
Avisos – igreja060615
Avisos – igreja060615Avisos – igreja060615
Avisos – igreja060615
 

Similar to Privacy Concerns in Our Interconnected World

Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintJames Webb
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Amber Butler
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Kirsten Thompson
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Webankitgadgil
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Web security
Web securityWeb security
Web securityekostyuk
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)Michael Edson
 
Privacy Flipbook Risha Raythatha
Privacy Flipbook Risha RaythathaPrivacy Flipbook Risha Raythatha
Privacy Flipbook Risha RaythathaRisha Raythatha
 
Your Digital Stomping Ground
Your Digital Stomping GroundYour Digital Stomping Ground
Your Digital Stomping GroundKristin Bittner
 

Similar to Privacy Concerns in Our Interconnected World (20)

Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital Footprint
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Users guide
Users guideUsers guide
Users guide
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?
 
INTERNET
INTERNETINTERNET
INTERNET
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Web
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Web security
Web securityWeb security
Web security
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
Privacy Flipbook Risha Raythatha
Privacy Flipbook Risha RaythathaPrivacy Flipbook Risha Raythatha
Privacy Flipbook Risha Raythatha
 
Your Digital Stomping Ground
Your Digital Stomping GroundYour Digital Stomping Ground
Your Digital Stomping Ground
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Privacy Concerns in Our Interconnected World

  • 1. Privacy in Our Interconnected World by Michæl Archer
  • 2. Computers, tablets, phones . . . what doesn’t have an internet connection these days?
  • 3. Even our watches have internet access!
  • 4. Our electronics are all interconnected with one another . . .
  • 5. Popular Android apps ping servers about once every three minutes with your current location . . .
  • 6. To tell you the weather . . .
  • 7. To give you traffic details . . .
  • 8. To give you relevant ads . . .
  • 9. To tell you where you are . . .
  • 10. They can even help you relocate your lost kids at Disney World . . .
  • 11. By using Facebook’s app, here are some of the things you agree to let the app do, as per the Terms of Service: • make calls without your permission or intervention • Send text messages without your permission • Read your phone call logs • Read data about your contacts When was the last time you read a Terms of Service agreement, instead of mindlessly just hitting “I agree”?
  • 12. This information is collected and stored for various purposes. Facebook does not delete user information when a user deletes his account.
  • 13. You know that drop-down list of search predictions when you type something into the Chrome bar? That’s the browser sending information about your keystrokes to Google’s servers. But what’s wrong with that? . . .
  • 14. In 2013, Edward Snowden, an employee for the NSA in the United States, leaked information detailing the mass surveillance of the American government of its own people.
  • 15. Among those whose servers the NSA had direct access to? Yahoo, Google, Facebook, and Microsoft.
  • 16. Snowden also spoke out against the use of Dropbox, criticizing the service’s lack of encryption.
  • 17. “But I have nothing to hide! Why should I be worried?”
  • 18. Edward Snowden: “You’re inverting the model of responsibility for how rights work. . . . When you say, ‘I have nothing to hide,’ you’re saying, ‘I don’t care about this right.’ You’re saying, ‘I don’t have this right, because I’ve got to the point where I have to justify it.’ The way rights work is, the government has to justify its intrusion into your rights.”
  • 19. So as you go about your Internet day, just remember . . .
  • 20.
  • 21. All pictures are under the Creative Commons License, published by anonymous authors. References from course readings: Constine, Josh. Facebook ‘Nearby Friends’ Will Track Your Location History To Target You With Ads. 18 April 2014. Online. Dwoskin, Elizabeth. Where Were You 3 Minutes Ago? Your Apps Know. New York, 25 March 2015. Online. 30 May 2015. Madden, Sean. Tech That Tracks Your Every Move Can Be Convenient, Not Creepy. 10 March 2014. Wired. 30 May 2015. <http://www.wired.com/2014/03/designers-tracking-tradeoffs>. "Home, hacked home; The internet of things." The Economist 12 July 2014: 14(US). Academic OneFile. Web. 30 May 2015. URL http://go.galegroup.com/ps/i.do?id=GALE%7CA374524912&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=3f62b19a238f2dbcba05701695a2d62f Arlen, Gary. "The internet of things: looking ahead to an interconnected world." Multichannel News24 Feb. 2014: 10+. Academic OneFile. Web. 30 May 2015. URL http://go.galegroup.com/ps/i.do?id=GALE%7CA362850216&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=510ced36c2b4630825e5776e404f2ada
  • 22. References from non-course readings BBC. Edward Snowden: Leaks that exposed US spy programme. 17 January 2014. Online. Bogart, Nicole. What you need to know about concerns over Facebook’s Messenger app. 5 August 2014. Online. Ha, Anthony. Edward Snowden’s Privacy Tips: “Get Rid Of Dropbox,” Avoid Facebook And Google. 11 October 2011. Online. NBC. Edward Snowden Timeline. 26 May 2014. Online. Purdy, Kevin. What Data of Mine Does Chrome Send to Google? 18 February 2011. Online. Whittaker, Zack. Facebook does not erase user-deleted content. 28 April 2010. Online.