SlideShare ist ein Scribd-Unternehmen logo
1 von 44
NET 303 – Policy Primer
By using Facebook, you
agree to the Statement of
Rights and
Responsibilities that is
updated from time to
time.
You grant
Facebook a
non-exclusive,
transferable,
sub-licensable,
royalty-free,
worldwide
license to use
any IP content
that you post.
Once your
pictures or
videos are
out there
on
Facebook,
it is
difficult to
have
control of
them
All videos, pictures and
other information
disclosed on Facebook
becomes its property.
Facebook can use your
content in any way it sees
for profit.
When you delete content, it
remains in backup copies
for a reasonable period of
time.
An application you
join, can access
your content and
information and
what others have
shared with you
Facebook receives data when you
look at another person’s timeline,
send or receive a message, search
for a friend or a page.
Facebook has 14,000 word terms of
service and data use police …
Few people really read the “terms
and agreement” of the sign-up
page nor the Facebook’s privacy
policy.
Facebook users
are concerned
with privacy.
They either:
1.
Leave the site
2.
Configure
their privacy
setting that
are
complicated to
understand
Changes in the layout
and privacy settings are
not always easy and fast
to understand.
Users have to choose
among a lot of
different settings
and options to
modify Facebook’s
default settings.
Although Facebook
has developed
options to control
their information,
few users have the
technical ability to
manage well their
privacy settings.
Facebook Privacy
Policy in 2005:

Current Facebook
Privacy Policy:

“No personal information
that you submit to the
Facebook will be
available to any users
of the Web Site who
does not belong to at
least one of the groups
specified by you in
your privacy settings.”

“When you connect with
an application or
website it will have
access to General
Information about you.
The term General
Information includes
your and your friends
names, profile picture,
gender, …”
According to Facebook, users
personal information…
In
2005

… belonged to specified groups

In
2006

… belonged to user’s schools , local area and
other “reasonable” community.

In
2007

… belonged to friends of friends

In
2009

… belonged to “everyone”
Facebook has begun to delete personal
privacy at an accelerated pace
Facebook
users do
not know
where their
private and
public
spheres
should be
drawn.
Protection of
personal
privacy is
fundamental
to an
individual’s
autonomy and
to control
what is
disclosed to
others.
“A man without privacy is a man without
dignity; the fear that Big Brother is
watching and listening threatens the
freedom of the individual no less than the
prison bars.”
Zelman Cowen
Economy is
dependant of the
free flow of
information on
social networking
sites that affects
personal privacy.
Facebook
tracks its
users’
activities and
develop
profiles of
consumers.
Facebook users
are concerned
about the loss
of their
anonymity
and about the
sale of their
information to
third parties
for multiple
purposes.
Surveillance has become the social norm of this
century and it is a form of social control.
Facebook provides online visible interaction
available among many people.
“Control of information and communication has
been a major source of power throughout
history. The advent of the Internet and of
wireless communication allows the
development of many-to-many and one-to-one
horizontal communication channels that bypass
political or business control of communication.”
Manuel Castells
Facebook has gained bad
press:
1.

2.

Users are easily being
tracked
Users’ information is
shared without any
consent.
Facebook privacy
problems:
Users disclose too
much

1.

2.

Personal Privacy is not
well protected
Third parties are
looking to take profit
of users’ information

3.
Why Personal Privacy is not well protected?
For example, Facebook users’ may not be
aware that Facebook default settings for
photo albums is “global”
Personal information
is exposed to
strangers on
Facebook
Your Facebook “friends”
own your personal content
and can give it to a whole
range of other people.
The amount of
users’ disclosed
information on
Facebook is highly
valuable for
companies for
marketing issues.
We are free Facebook
labourers, that profits
from us.
The old adage
“Knowledge is
power” speaks
about the power
Facebook has
gained
recollecting
information
about over a
billion users.
Knowledge is key to
the exercise of
power
“The world is embracing new standards of
conduct, enforced not only by surveillance
and coertion but by willful disclosure:
regulation by revelation.”

Ann Florini
Transparency as a
public good might
become a public
bad that infringes
on personal
privacy.
Despite the disadvantages of
having a Facebook account,
deleting a Facebook account may
also be a disadvantage for our
social and professional matters.
The use of Facebook is very useful for freedom of
expression especially in countries that use some
form of oppression for dissidents.
Facebook represents a
public space, where the
power is exercised
References
Virtual Threat. [Image]. (2013). NSA-Surveillance. Retrieved October 10, 2013, from
http://www.virtualthreat.com/2013/08/03/nsa-surveillance-tool-allows-real-time-access/
The Guardian. [Image]. (2009). Facebook Surveillance. Retrieved October 10, 2013, from
http://www.theguardian.com/commentisfree/libertycentral/2009/jun/18/villain-bozeman-city
Dailysquib.co.uk. [Image]. (2011). Facebook Big Brother. Retrieved October 10, 2013, from
http://www.dailysquib.co.uk/sci_tech/2806-facebook-wants-every-user-fingerprinted.html
Cheeteye. [Image]. (2011). Surveillancebook. Retrieved October10, 2013, from
http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg
Forbes. [Image]. (2013). Facebook. Retrieved October 10, 2013, from
http://www.forbes.com/sites/andygreenberg/2013/08/27/facebook-first-report-on-governmentdata-requests-shows-it-denies-u-s-surveillance-demands-more-often-than-google/
Diary of a Workcovervictim. [Image]. (2013). Facebook Surveillance. Retrieved October 10,
2013, from http://aworkcovervictimsdiary.com/2013/02/how-does-social-media-and-othersurveillance-prejudice-an-injured-workers-case/
Bitdefender. [Image]. (2013). Facebook, Google, Yahoo and Microsoft Fight for Data
Transparency. Retrieved October 10, 2013, from
http://www.hotforsecurity.com/blog/facebook-google-yahoo-and-microsoft-fight-for-datatransparency7023.html?sm_id=H4S_Posts&utm_source=SocialMedia&utm_medium=Post&utm_campaign=H4S
Voice of Russia. [Image]. (2013). Facebook. Retrieved October 10, 2013, from
http://indian.ruvr.ru/2013_09_21/Mass-exodus-Facebook/
Révolte Numérique.[Image]. (2012). Facebook Surveillance. Retrieved October 10, 2013,
from http://www.revoltenumerique.herbesfolles.org/tag/fichage/
Dooneyscafe. [Image]. (2013). Big Brother is Watching. Retrieved October10, 2013, from
http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg
Genius Media Group. [Image]. (2013). Facebook Privacy. Retrieved October 10, 2013, from
http://news.rapgenius.com/Facebook-proposed-changes-to-statement-of-rights-andresponsibilities-lyrics
SocialFish. [Image]. (2013). Data Use Policy. Retrieved October 10, 2013, from
http://www.socialfish.org/2013/06/a-little-privacy-please-your-rights-and-social-mediapolicies.html
QualityStockPhotos. [Image]. (2013). QualityStockPhotos. Retrieved October 10, 2013, from
http://www.qualitystockphotos.com/

Weitere ähnliche Inhalte

Was ist angesagt?

Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of InternetSagarneel Majumder
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightJibril Abubakar
 
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksTrends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksEman Bustamante
 
Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project GabrielleTawyer
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracksglairerabida
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Ollie Bray
 

Was ist angesagt? (20)

Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Internet
InternetInternet
Internet
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of Internet
 
Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyright
 
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksTrends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Social-Media
Social-MediaSocial-Media
Social-Media
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Ppt
PptPpt
Ppt
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
Ict day4 quiz
Ict day4 quizIct day4 quiz
Ict day4 quiz
 
Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
The social network
The social networkThe social network
The social network
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 

Andere mochten auch

Senda de La Ñora (Gijón)
Senda de La Ñora (Gijón)Senda de La Ñora (Gijón)
Senda de La Ñora (Gijón)F. Ovies
 
Presentazione Giovanni Ferri
Presentazione Giovanni FerriPresentazione Giovanni Ferri
Presentazione Giovanni FerriGiovanni Ferri
 
Proyecto de aula 2
Proyecto de aula  2Proyecto de aula  2
Proyecto de aula 207leo
 
Mosquera_Angélica_ mapa_c
Mosquera_Angélica_ mapa_cMosquera_Angélica_ mapa_c
Mosquera_Angélica_ mapa_cAngélica Mosag
 
Pernambuco trem jeito
Pernambuco trem jeitoPernambuco trem jeito
Pernambuco trem jeitoLua Fanny
 
LIS 60600 Epistemic Gaming Article Review Eric Wilson
LIS 60600 Epistemic Gaming Article Review Eric WilsonLIS 60600 Epistemic Gaming Article Review Eric Wilson
LIS 60600 Epistemic Gaming Article Review Eric WilsonEricRWilson
 
renodeaneresume
renodeaneresumerenodeaneresume
renodeaneresumeReno Deane
 
Red de computadoras
Red de computadorasRed de computadoras
Red de computadorasGloriaBaruch
 
Inteliogencias múkltiples Shakespeare
Inteliogencias múkltiples ShakespeareInteliogencias múkltiples Shakespeare
Inteliogencias múkltiples ShakespeareClaudia
 
대신리포트_대신브라우저_151117
대신리포트_대신브라우저_151117대신리포트_대신브라우저_151117
대신리포트_대신브라우저_151117DaishinSecurities
 
8842 graphic organizer Module 4, Static & Dynamic Technological Tools
8842 graphic organizer Module 4, Static & Dynamic Technological Tools8842 graphic organizer Module 4, Static & Dynamic Technological Tools
8842 graphic organizer Module 4, Static & Dynamic Technological Toolsalisontaylorparker
 
Clacso biblioteca virtual
Clacso biblioteca virtualClacso biblioteca virtual
Clacso biblioteca virtualnaudibi
 
Instalando wamp | soyprogramador.liz.mx
Instalando wamp | soyprogramador.liz.mxInstalando wamp | soyprogramador.liz.mx
Instalando wamp | soyprogramador.liz.mxGovani Sanchez
 
La Música para tu vida!
La Música para tu vida!La Música para tu vida!
La Música para tu vida!EUGEGSC
 
Pórtada prof hugo
Pórtada prof hugoPórtada prof hugo
Pórtada prof hugoarath324
 

Andere mochten auch (20)

Senda de La Ñora (Gijón)
Senda de La Ñora (Gijón)Senda de La Ñora (Gijón)
Senda de La Ñora (Gijón)
 
Presentazione Giovanni Ferri
Presentazione Giovanni FerriPresentazione Giovanni Ferri
Presentazione Giovanni Ferri
 
Proyecto de aula 2
Proyecto de aula  2Proyecto de aula  2
Proyecto de aula 2
 
Kylee
KyleeKylee
Kylee
 
Mosquera_Angélica_ mapa_c
Mosquera_Angélica_ mapa_cMosquera_Angélica_ mapa_c
Mosquera_Angélica_ mapa_c
 
Pernambuco trem jeito
Pernambuco trem jeitoPernambuco trem jeito
Pernambuco trem jeito
 
LIS 60600 Epistemic Gaming Article Review Eric Wilson
LIS 60600 Epistemic Gaming Article Review Eric WilsonLIS 60600 Epistemic Gaming Article Review Eric Wilson
LIS 60600 Epistemic Gaming Article Review Eric Wilson
 
renodeaneresume
renodeaneresumerenodeaneresume
renodeaneresume
 
Red de computadoras
Red de computadorasRed de computadoras
Red de computadoras
 
My Artist
My ArtistMy Artist
My Artist
 
Trabajo de zapatos
Trabajo de zapatosTrabajo de zapatos
Trabajo de zapatos
 
Inteliogencias múkltiples Shakespeare
Inteliogencias múkltiples ShakespeareInteliogencias múkltiples Shakespeare
Inteliogencias múkltiples Shakespeare
 
Ensayo
EnsayoEnsayo
Ensayo
 
대신리포트_대신브라우저_151117
대신리포트_대신브라우저_151117대신리포트_대신브라우저_151117
대신리포트_대신브라우저_151117
 
8842 graphic organizer Module 4, Static & Dynamic Technological Tools
8842 graphic organizer Module 4, Static & Dynamic Technological Tools8842 graphic organizer Module 4, Static & Dynamic Technological Tools
8842 graphic organizer Module 4, Static & Dynamic Technological Tools
 
Clacso biblioteca virtual
Clacso biblioteca virtualClacso biblioteca virtual
Clacso biblioteca virtual
 
Jennifer_Barman_Resume
Jennifer_Barman_ResumeJennifer_Barman_Resume
Jennifer_Barman_Resume
 
Instalando wamp | soyprogramador.liz.mx
Instalando wamp | soyprogramador.liz.mxInstalando wamp | soyprogramador.liz.mx
Instalando wamp | soyprogramador.liz.mx
 
La Música para tu vida!
La Música para tu vida!La Música para tu vida!
La Música para tu vida!
 
Pórtada prof hugo
Pórtada prof hugoPórtada prof hugo
Pórtada prof hugo
 

Ähnlich wie Online Policy Primer

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primersophiegalati
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebookhernan_j1
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young AdultsRatan Rajpal
 
FACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxFACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxkanurukarthikeya
 
Social media
Social mediaSocial media
Social mediaIbm Csr
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook ControversiesInternet Law Center
 
Detweiler,com303 50,final project
Detweiler,com303 50,final projectDetweiler,com303 50,final project
Detweiler,com303 50,final projectselmik
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Comm 303 slideshow
Comm 303 slideshowComm 303 slideshow
Comm 303 slideshownegrita06
 

Ähnlich wie Online Policy Primer (20)

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primer
 
Social networking
Social networkingSocial networking
Social networking
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebook
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young Adults
 
FACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxFACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptx
 
Social media
Social mediaSocial media
Social media
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook Controversies
 
Assignment 5
Assignment 5Assignment 5
Assignment 5
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Detweiler,com303 50,final project
Detweiler,com303 50,final projectDetweiler,com303 50,final project
Detweiler,com303 50,final project
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Comm 303 slideshow
Comm 303 slideshowComm 303 slideshow
Comm 303 slideshow
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Online Policy Primer

  • 1. NET 303 – Policy Primer
  • 2. By using Facebook, you agree to the Statement of Rights and Responsibilities that is updated from time to time.
  • 4. Once your pictures or videos are out there on Facebook, it is difficult to have control of them
  • 5. All videos, pictures and other information disclosed on Facebook becomes its property.
  • 6. Facebook can use your content in any way it sees for profit.
  • 7. When you delete content, it remains in backup copies for a reasonable period of time.
  • 8. An application you join, can access your content and information and what others have shared with you
  • 9. Facebook receives data when you look at another person’s timeline, send or receive a message, search for a friend or a page.
  • 10. Facebook has 14,000 word terms of service and data use police …
  • 11. Few people really read the “terms and agreement” of the sign-up page nor the Facebook’s privacy policy.
  • 12. Facebook users are concerned with privacy. They either: 1. Leave the site 2. Configure their privacy setting that are complicated to understand
  • 13. Changes in the layout and privacy settings are not always easy and fast to understand.
  • 14. Users have to choose among a lot of different settings and options to modify Facebook’s default settings.
  • 15. Although Facebook has developed options to control their information, few users have the technical ability to manage well their privacy settings.
  • 16. Facebook Privacy Policy in 2005: Current Facebook Privacy Policy: “No personal information that you submit to the Facebook will be available to any users of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings.” “When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends names, profile picture, gender, …”
  • 17. According to Facebook, users personal information… In 2005 … belonged to specified groups In 2006 … belonged to user’s schools , local area and other “reasonable” community. In 2007 … belonged to friends of friends In 2009 … belonged to “everyone”
  • 18. Facebook has begun to delete personal privacy at an accelerated pace
  • 19. Facebook users do not know where their private and public spheres should be drawn.
  • 20. Protection of personal privacy is fundamental to an individual’s autonomy and to control what is disclosed to others.
  • 21. “A man without privacy is a man without dignity; the fear that Big Brother is watching and listening threatens the freedom of the individual no less than the prison bars.” Zelman Cowen
  • 22. Economy is dependant of the free flow of information on social networking sites that affects personal privacy.
  • 24. Facebook users are concerned about the loss of their anonymity and about the sale of their information to third parties for multiple purposes.
  • 25. Surveillance has become the social norm of this century and it is a form of social control.
  • 26. Facebook provides online visible interaction available among many people.
  • 27. “Control of information and communication has been a major source of power throughout history. The advent of the Internet and of wireless communication allows the development of many-to-many and one-to-one horizontal communication channels that bypass political or business control of communication.” Manuel Castells
  • 28. Facebook has gained bad press: 1. 2. Users are easily being tracked Users’ information is shared without any consent.
  • 29. Facebook privacy problems: Users disclose too much 1. 2. Personal Privacy is not well protected Third parties are looking to take profit of users’ information 3.
  • 30. Why Personal Privacy is not well protected? For example, Facebook users’ may not be aware that Facebook default settings for photo albums is “global”
  • 31. Personal information is exposed to strangers on Facebook
  • 32. Your Facebook “friends” own your personal content and can give it to a whole range of other people.
  • 33. The amount of users’ disclosed information on Facebook is highly valuable for companies for marketing issues.
  • 34. We are free Facebook labourers, that profits from us.
  • 35. The old adage “Knowledge is power” speaks about the power Facebook has gained recollecting information about over a billion users.
  • 36. Knowledge is key to the exercise of power
  • 37. “The world is embracing new standards of conduct, enforced not only by surveillance and coertion but by willful disclosure: regulation by revelation.” Ann Florini
  • 38. Transparency as a public good might become a public bad that infringes on personal privacy.
  • 39. Despite the disadvantages of having a Facebook account, deleting a Facebook account may also be a disadvantage for our social and professional matters.
  • 40. The use of Facebook is very useful for freedom of expression especially in countries that use some form of oppression for dissidents.
  • 41. Facebook represents a public space, where the power is exercised
  • 42. References Virtual Threat. [Image]. (2013). NSA-Surveillance. Retrieved October 10, 2013, from http://www.virtualthreat.com/2013/08/03/nsa-surveillance-tool-allows-real-time-access/ The Guardian. [Image]. (2009). Facebook Surveillance. Retrieved October 10, 2013, from http://www.theguardian.com/commentisfree/libertycentral/2009/jun/18/villain-bozeman-city Dailysquib.co.uk. [Image]. (2011). Facebook Big Brother. Retrieved October 10, 2013, from http://www.dailysquib.co.uk/sci_tech/2806-facebook-wants-every-user-fingerprinted.html Cheeteye. [Image]. (2011). Surveillancebook. Retrieved October10, 2013, from http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg Forbes. [Image]. (2013). Facebook. Retrieved October 10, 2013, from http://www.forbes.com/sites/andygreenberg/2013/08/27/facebook-first-report-on-governmentdata-requests-shows-it-denies-u-s-surveillance-demands-more-often-than-google/ Diary of a Workcovervictim. [Image]. (2013). Facebook Surveillance. Retrieved October 10, 2013, from http://aworkcovervictimsdiary.com/2013/02/how-does-social-media-and-othersurveillance-prejudice-an-injured-workers-case/
  • 43. Bitdefender. [Image]. (2013). Facebook, Google, Yahoo and Microsoft Fight for Data Transparency. Retrieved October 10, 2013, from http://www.hotforsecurity.com/blog/facebook-google-yahoo-and-microsoft-fight-for-datatransparency7023.html?sm_id=H4S_Posts&utm_source=SocialMedia&utm_medium=Post&utm_campaign=H4S Voice of Russia. [Image]. (2013). Facebook. Retrieved October 10, 2013, from http://indian.ruvr.ru/2013_09_21/Mass-exodus-Facebook/ Révolte Numérique.[Image]. (2012). Facebook Surveillance. Retrieved October 10, 2013, from http://www.revoltenumerique.herbesfolles.org/tag/fichage/ Dooneyscafe. [Image]. (2013). Big Brother is Watching. Retrieved October10, 2013, from http://www.cheeteye.com/wp-content/uploads/2011/03/Surveillancebook800.jpg Genius Media Group. [Image]. (2013). Facebook Privacy. Retrieved October 10, 2013, from http://news.rapgenius.com/Facebook-proposed-changes-to-statement-of-rights-andresponsibilities-lyrics SocialFish. [Image]. (2013). Data Use Policy. Retrieved October 10, 2013, from http://www.socialfish.org/2013/06/a-little-privacy-please-your-rights-and-social-mediapolicies.html
  • 44. QualityStockPhotos. [Image]. (2013). QualityStockPhotos. Retrieved October 10, 2013, from http://www.qualitystockphotos.com/