SlideShare une entreprise Scribd logo
1  sur  23
Policy Primer:
An introduction to Twitter’s Terms of Service &
Privacy Policy
 Twitter is an online real-time instant messaging
service
 Often referred to as a micro-blogging service
 Send small messages and “speak your mind”
 Send 140 character messages to your friends or
followers PCs, Laptops & Mobile Phones
 You can broadcast Tweets (messages) to public or
private groups
 Send personalised / private messages to
individuals or selected groups
 Follow the postings of others (a Follower)
 Followers can reply to Tweets or forward these
messages to others
 Remember…!!
Whatever you write will become public..even if
you think it’s private!
Twitter’s legal documents are contained on the
www.twitter.com website include:
 Terms of Service http://twitter.com/tos
 Privacy Policy http://twitter.com/privacy
 Other Twitter Rules & Must Read Instructions
 The Twitter Rules http://twitter.zendesk.com/forums/26257/entries/18311
 Law Enforcement Guidelines http://twitter.zendesk.com/forums/26257/entries/41949
 API Terms of Service http://dev.twitter.com/pages/api_terms
 Twitter Basics http://support.twitter.com/groups/31-twitter-basics
 Report a Violation Page http://support.twitter.com/groups/33-report-a-violation
https://twitter.com/signup
By clicking “Create my
account”, you are
agreeing to Twitter’s
Terms of Service,
Privacy Policy and
other rules of use
 Basic Terms
 By registering you are forming a contract with Twitter
(under laws of United States or other applicable jurisdictions),
 You accepting the Terms of Service and Privacy Policy
when pressing the “Create my account” button.
 Twitter is free to change or stop its services without
prior notice to you.
 Twitter has the right change the limits on storage or
usage without prior notice to you.
 Twitter has the right to include advertisements on its
pages or what’s presented to you.
 Privacy Section
 Twitter is allowed to send you service
announcements even though you’ve un-subscribed
to e-mails. These are not considered as SPAM.
 You can opt-out from newsletters, follower e-mails
by changing your Notices in the Settings tab.
 There is a separate Privacy Policy web page which
you must refer to. http://twitter.com/privacy
 Passwords
 Twitter recommends strong passwords
 Twitter is not responsible for your loss or damage if your
password is compromised
 Content on the Services
 You are responsible for the Content you post
 Twitter is not responsible for Content posted, this is at
the readers risk.
 Offensive, harmful, inaccurate, mislabelled, deceptive
content or links to viruses are at the readers risk.
 Twitter not liable for any loss or damage.
 Twitter may remove content at its discretion.
 Your Rights
 You retain the right to any Content you submit
 You grant Twitter a sub-licence to:
 Use or modify your Content
 The right to broadcast this content worldwide
 And in any and all distribution methods available now
or in the future.
 You allow Twitter & other companies to publish
your Content and for others to read it.
 Your Content still remains your property, you own
the Content.
 You are responsible for ensuring copyright of your
Content.
 Twitter allows you to use of their software and
message broadcasting service:
 Provided you conform to the Terms of Service, Privacy
and other rules of use.
 Twitter Rights
 The Twitter website and Services (excluding your
Content) is the property of Twitter Inc.
 The Twitter website code, images and logos belong
to Twitter
 You are not allowed to use, copy or claim ownership.
 Any great ideas or suggestions on how to improve
the service are presented without obligation.
Twitter will not reward you for a great idea or new
invention.
 Restrictions on Content and Use of the Services
 Twitter reserves the right remove Content or close your
account.
 Twitter has the right to monitor your content.
 Twitter has the right to make your Content available to law
enforcement agencies and governments.
 Twitter provides an Application Programming Interface
(API).
 API allows programmers to create applications (to send &
receive Tweets) . See API Terms of Service.
http://dev.twitter.com/pages/api_terms
 Twitter claims not to release “personally
identifiable” information to third parties. See Privacy
Policy. http://twitter.com/privacy
 No hacking, tampering, deceptive sending,
spamming, virus uploading or denial of service
allowed by users.
 Copyright Policy
 Twitter recognises the intellectual property rights of
users
 Will respond to alleged copyright infringements
 Twitter reserves the right to remove any alleged
infringing content without prior notice.
 The Services are Available “AS-IS”
 The Twitter make no guarantees as to the reliability or
operation of their services
 Not responsible for loss of data or damage to your
computer as a result of using the service.
 Links
 Twitter is not responsible for links, or content on
other websites, services or third party applications.
 Twitter does not endorse content on any other site
 Users acknowledge their responsibility for sending
Followers to other websites
 Users assume the risk from using third party sites.
 Limitation of Liability
 Twitter is not liable for any loss or damage caused
as a result of using their services
 In some countries the exclusion of warranties may
not be enforceable
 If some part of the Terms of Service is not
enforceable, it does not void the remainder of the
Terms.
 Laws of California and United States will apply.
 Personal – Identifiable Information
 Name, User Name, E-Mail Address, Location,
Password, Photo, Bio, Mobile Phone Number, IP
Address, browser type & version. http://twitter.com/privacy
 Don’t enable Current Location, if away from home
might get burgled.
 Tracking & Data Logging
 Twitter saves and tracks what you say (Tweet) and to
who.
 It also tracks who you follow, Retweet, reply & message.
 Twitter targets advertising based on what you say and
follow / view and what you Retweet.
 Twitter uses cookies to track IP address, screen visits
and session status.
 Without cookies enabled you can’t login.
 Twitter also follows our usage with various tools such as
Google Analytics.
 Twitter claims NOT to release private information,
except in the following cases:
 When you consent or use a third party applications to
access Twitter (Tweetdeck etc)
 To other undescribed service providers (who & what?)
 The law agencies (big brother terrorist prevention ?)
 To a new owner of Twitter (then what will they do with it?)
 Non-Private or aggregated data (questionable?)
 Children Policy
 Children under 13 are not allowed to use Twitter
 Pervious versions
 Old Privacy Policies & Terms of Service are
maintained on the site. (Good, history of changes
important)
 Private Accounts become public
 This has occurred using third party applications
http://techcrunch.com/2008/04/23/privacy-disaster-at-twitter-direct-messages-exposed/
 Private Accounts can be hacked
 YouTube has several examples how to hack Private
Accounts.
http://www.youtube.com/results?search_query=hacking+twitter+accounts&aq=0
 Malicious links to viruses & worms allow malware,
Trojans & phishing
http://voices.washingtonpost.com/blog-post/2010/09/twitter_bug_attacks_the_intern.html
http://blog.twitter.com/2010/02/avoid-phishing-scams.html
 Private Tweets can be forwarded to Followers of
Followers
 The Twitter Rules http://twitter.zendesk.com/forums/26257/entries/18311
 Details what not to do on Twitter including SPAM, content restrictions
 Law Enforcement Guidelines http://twitter.zendesk.com/forums/26257/entries/41949
 Twitter requires a subpoena, court order, or other valid legal process to disclose
information about our users.
 API Terms of Service http://dev.twitter.com/pages/api_terms
 This is for software developers when developing applications that interact or use the
Twitter service
 Twitter Help Center http://support.twitter.com/
◦ A good place to start before you start Tweeting
 Twitter Basics http://support.twitter.com/groups/31-twitter-basics
 Extensive list of information on how to use Twitter and what not to do
 Report a Violation Page http://support.twitter.com/groups/33-report-a-violation
 Worth reading before using Twitter, informs what’s not acceptable
Google Analytics. (2010). Google.com Retrieved October, 12, 2010, from
http://www.google.com/analytics/
Twitter. (2009a). Guideline for Law Enforcement. Twitter.com Retrieved October, 13,
2010, from http://twitter.zendesk.com/forums/26257/entries/41949
Twitter. (2009b). The Twitter Rules. Twitter.com Retrieved October, 12, 2010, from
http://twitter.zendesk.com/forums/26257/entries/18311
Twitter. (2010a). API Terms of Service. Twitter.com Retrieved October, 12, 2010, from
http://dev.twitter.com/pages/api_terms
Twitter. (2010b). Privacy Policy. Twitter.com Retrieved October, 20, 2010, from
http://twitter.com/privacy
Twitter. (2010c). Report a Violation. Twitter.com Retrieved October, 16, 2010, from
http://support.twitter.com/groups/33-report-a-violation
Twitter. (2010d). Terms of Service. Twitter.com Retrieved October, 20, 2010, from
http://twitter.com/tos
Twitter. (2010e). Twitter Help Center. Twitter.com Retrieved October, 12, 2010, from
http://support.twitter.com/

Contenu connexe

Tendances

Social media in education
Social media in educationSocial media in education
Social media in educationMichele Berner
 
Advantages and Disadvantages of Internet
Advantages and Disadvantages of InternetAdvantages and Disadvantages of Internet
Advantages and Disadvantages of InternetBAS ADITYA SRINIVAS
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
 
Privacy Issues in Social Media
Privacy Issues in Social MediaPrivacy Issues in Social Media
Privacy Issues in Social MediaBaljot Saral
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 
Social networking
Social networkingSocial networking
Social networkingITT Inc.
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Twitter Pour Débutants
Twitter Pour DébutantsTwitter Pour Débutants
Twitter Pour DébutantsDiane Bourque
 
Hashtag 101 - All You Need to Know About Hashtags
Hashtag 101 - All You Need to Know About HashtagsHashtag 101 - All You Need to Know About Hashtags
Hashtag 101 - All You Need to Know About HashtagsModicum
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 

Tendances (20)

Social media in education
Social media in educationSocial media in education
Social media in education
 
Advantages and Disadvantages of Internet
Advantages and Disadvantages of InternetAdvantages and Disadvantages of Internet
Advantages and Disadvantages of Internet
 
An introduction to Twitter
An introduction to TwitterAn introduction to Twitter
An introduction to Twitter
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Privacy Issues in Social Media
Privacy Issues in Social MediaPrivacy Issues in Social Media
Privacy Issues in Social Media
 
The Do's and Don'ts of Social Media
The Do's and Don'ts of Social MediaThe Do's and Don'ts of Social Media
The Do's and Don'ts of Social Media
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Social networking
Social networkingSocial networking
Social networking
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Social Network Service
Social Network ServiceSocial Network Service
Social Network Service
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Defamation on the Internet
Defamation on the InternetDefamation on the Internet
Defamation on the Internet
 
Twitter Pour Débutants
Twitter Pour DébutantsTwitter Pour Débutants
Twitter Pour Débutants
 
Hashtag 101 - All You Need to Know About Hashtags
Hashtag 101 - All You Need to Know About HashtagsHashtag 101 - All You Need to Know About Hashtags
Hashtag 101 - All You Need to Know About Hashtags
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Phishing
PhishingPhishing
Phishing
 

En vedette

Особенности и развитие Латинской Америки
Особенности и развитие Латинской АмерикиОсобенности и развитие Латинской Америки
Особенности и развитие Латинской АмерикиProznanie.ru
 
Hibari - Key Value Bigdata Store
Hibari - Key Value Bigdata StoreHibari - Key Value Bigdata Store
Hibari - Key Value Bigdata StoreCLOUDIAN KK
 
Cardionics EKG Netwerk project cardionics.be presentatie doc nl
Cardionics EKG  Netwerk project cardionics.be presentatie   doc nlCardionics EKG  Netwerk project cardionics.be presentatie   doc nl
Cardionics EKG Netwerk project cardionics.be presentatie doc nlCARDIONICS BELGIUM
 
NetApp SteelStore with CLOUDIAN HyperStore
NetApp SteelStore with CLOUDIAN HyperStoreNetApp SteelStore with CLOUDIAN HyperStore
NetApp SteelStore with CLOUDIAN HyperStoreCLOUDIAN KK
 
Apresentacao sessoes mz
Apresentacao sessoes mzApresentacao sessoes mz
Apresentacao sessoes mzDiogo Gomes
 
СИНХРОНИЧЕСКАЯ ТАБЛИЦА ДРЕВНЕГО ВОСТОКА (ДРЕВНИЙ БЛИЖНИЙ ВОСТОК, ДРЕВНИЙ ИРАН...
СИНХРОНИЧЕСКАЯ ТАБЛИЦА ДРЕВНЕГО ВОСТОКА (ДРЕВНИЙ БЛИЖНИЙ ВОСТОК, ДРЕВНИЙ ИРАН...СИНХРОНИЧЕСКАЯ ТАБЛИЦА ДРЕВНЕГО ВОСТОКА (ДРЕВНИЙ БЛИЖНИЙ ВОСТОК, ДРЕВНИЙ ИРАН...
СИНХРОНИЧЕСКАЯ ТАБЛИЦА ДРЕВНЕГО ВОСТОКА (ДРЕВНИЙ БЛИЖНИЙ ВОСТОК, ДРЕВНИЙ ИРАН...Proznanie.ru
 
Pingali - India Agricultural Renaissance
Pingali - India Agricultural RenaissancePingali - India Agricultural Renaissance
Pingali - India Agricultural RenaissancePrabhu Pingali
 
Presentation parent engagement january 2012
Presentation   parent engagement january 2012Presentation   parent engagement january 2012
Presentation parent engagement january 2012slater_45
 
Cloudian next steps at cloudian seminar 2014
Cloudian next steps at cloudian seminar 2014Cloudian next steps at cloudian seminar 2014
Cloudian next steps at cloudian seminar 2014CLOUDIAN KK
 
Itunes_network_knowledge_attention_economies
Itunes_network_knowledge_attention_economiesItunes_network_knowledge_attention_economies
Itunes_network_knowledge_attention_economiesAndrew Pettigrew
 
Top Ten Learning questions for Chapter 3
Top Ten Learning questions for Chapter 3Top Ten Learning questions for Chapter 3
Top Ten Learning questions for Chapter 3Andrei John Cantilleps
 
новые «центры» и ценности европейского запада.
новые «центры» и ценности европейского запада.новые «центры» и ценности европейского запада.
новые «центры» и ценности европейского запада.Proznanie.ru
 
Geoff Wilkie’s Portfolio
Geoff Wilkie’s PortfolioGeoff Wilkie’s Portfolio
Geoff Wilkie’s PortfolioGeoff Wilkie
 

En vedette (20)

Protobuf
ProtobufProtobuf
Protobuf
 
Особенности и развитие Латинской Америки
Особенности и развитие Латинской АмерикиОсобенности и развитие Латинской Америки
Особенности и развитие Латинской Америки
 
Hibari - Key Value Bigdata Store
Hibari - Key Value Bigdata StoreHibari - Key Value Bigdata Store
Hibari - Key Value Bigdata Store
 
Nabokov
NabokovNabokov
Nabokov
 
Cardionics EKG Netwerk project cardionics.be presentatie doc nl
Cardionics EKG  Netwerk project cardionics.be presentatie   doc nlCardionics EKG  Netwerk project cardionics.be presentatie   doc nl
Cardionics EKG Netwerk project cardionics.be presentatie doc nl
 
NetApp SteelStore with CLOUDIAN HyperStore
NetApp SteelStore with CLOUDIAN HyperStoreNetApp SteelStore with CLOUDIAN HyperStore
NetApp SteelStore with CLOUDIAN HyperStore
 
Apresentacao sessoes mz
Apresentacao sessoes mzApresentacao sessoes mz
Apresentacao sessoes mz
 
СИНХРОНИЧЕСКАЯ ТАБЛИЦА ДРЕВНЕГО ВОСТОКА (ДРЕВНИЙ БЛИЖНИЙ ВОСТОК, ДРЕВНИЙ ИРАН...
СИНХРОНИЧЕСКАЯ ТАБЛИЦА ДРЕВНЕГО ВОСТОКА (ДРЕВНИЙ БЛИЖНИЙ ВОСТОК, ДРЕВНИЙ ИРАН...СИНХРОНИЧЕСКАЯ ТАБЛИЦА ДРЕВНЕГО ВОСТОКА (ДРЕВНИЙ БЛИЖНИЙ ВОСТОК, ДРЕВНИЙ ИРАН...
СИНХРОНИЧЕСКАЯ ТАБЛИЦА ДРЕВНЕГО ВОСТОКА (ДРЕВНИЙ БЛИЖНИЙ ВОСТОК, ДРЕВНИЙ ИРАН...
 
Pingali - India Agricultural Renaissance
Pingali - India Agricultural RenaissancePingali - India Agricultural Renaissance
Pingali - India Agricultural Renaissance
 
Prodovolstvie
ProdovolstvieProdovolstvie
Prodovolstvie
 
Presentation parent engagement january 2012
Presentation   parent engagement january 2012Presentation   parent engagement january 2012
Presentation parent engagement january 2012
 
Cloudian next steps at cloudian seminar 2014
Cloudian next steps at cloudian seminar 2014Cloudian next steps at cloudian seminar 2014
Cloudian next steps at cloudian seminar 2014
 
Itunes_network_knowledge_attention_economies
Itunes_network_knowledge_attention_economiesItunes_network_knowledge_attention_economies
Itunes_network_knowledge_attention_economies
 
Krylov
KrylovKrylov
Krylov
 
England in 50
England in 50England in 50
England in 50
 
Rileev
RileevRileev
Rileev
 
Usa
UsaUsa
Usa
 
Top Ten Learning questions for Chapter 3
Top Ten Learning questions for Chapter 3Top Ten Learning questions for Chapter 3
Top Ten Learning questions for Chapter 3
 
новые «центры» и ценности европейского запада.
новые «центры» и ценности европейского запада.новые «центры» и ценности европейского запада.
новые «центры» и ценности европейского запада.
 
Geoff Wilkie’s Portfolio
Geoff Wilkie’s PortfolioGeoff Wilkie’s Portfolio
Geoff Wilkie’s Portfolio
 

Similaire à Twitter's Terms and Privacy Policy Explained

Terms of Use and Privacy Policies
Terms of Use and Privacy PoliciesTerms of Use and Privacy Policies
Terms of Use and Privacy PoliciesMarius Adomnica
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on TwitterYansi Keim
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteJake White
 
Online Policy Primer Twitter
Online Policy Primer TwitterOnline Policy Primer Twitter
Online Policy Primer Twitterguestb39306
 
Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfFacebook
 
GO TO GATZ: Twitter Dictionary
GO TO GATZ: Twitter Dictionary GO TO GATZ: Twitter Dictionary
GO TO GATZ: Twitter Dictionary Gatz Optimize LLC
 
What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?abdullasshalhabsi
 
Twitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysisTwitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysiskimili
 
Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primerjustbecos
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15Naval OPSEC
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primercheahwey
 
Twitter Guide - Learn more about Twitter Marketing
Twitter Guide - Learn more about Twitter MarketingTwitter Guide - Learn more about Twitter Marketing
Twitter Guide - Learn more about Twitter Marketinggunjanp
 
Twitter Terms of Service - Policy Primer
Twitter Terms of Service - Policy Primer Twitter Terms of Service - Policy Primer
Twitter Terms of Service - Policy Primer anielkerko
 
Twitter For Real Estate Agents
Twitter For Real Estate AgentsTwitter For Real Estate Agents
Twitter For Real Estate AgentsStefanie Blackburn
 
Mz sdl-130917
Mz sdl-130917Mz sdl-130917
Mz sdl-130917Angus Fox
 

Similaire à Twitter's Terms and Privacy Policy Explained (20)

Terms of Use and Privacy Policies
Terms of Use and Privacy PoliciesTerms of Use and Privacy Policies
Terms of Use and Privacy Policies
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake White
 
Online Policy Primer Twitter
Online Policy Primer TwitterOnline Policy Primer Twitter
Online Policy Primer Twitter
 
NYPD Twitter Strategy
NYPD Twitter StrategyNYPD Twitter Strategy
NYPD Twitter Strategy
 
Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdf
 
GO TO GATZ: Twitter Dictionary
GO TO GATZ: Twitter Dictionary GO TO GATZ: Twitter Dictionary
GO TO GATZ: Twitter Dictionary
 
Net503_a.2_Cooper
Net503_a.2_CooperNet503_a.2_Cooper
Net503_a.2_Cooper
 
What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?
 
Twitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysisTwitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysis
 
Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primer
 
Tweet tweet
Tweet tweetTweet tweet
Tweet tweet
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Twitter Smart Card
Twitter Smart CardTwitter Smart Card
Twitter Smart Card
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
 
Twitter Success guide
Twitter Success guideTwitter Success guide
Twitter Success guide
 
Twitter Guide - Learn more about Twitter Marketing
Twitter Guide - Learn more about Twitter MarketingTwitter Guide - Learn more about Twitter Marketing
Twitter Guide - Learn more about Twitter Marketing
 
Twitter Terms of Service - Policy Primer
Twitter Terms of Service - Policy Primer Twitter Terms of Service - Policy Primer
Twitter Terms of Service - Policy Primer
 
Twitter For Real Estate Agents
Twitter For Real Estate AgentsTwitter For Real Estate Agents
Twitter For Real Estate Agents
 
Mz sdl-130917
Mz sdl-130917Mz sdl-130917
Mz sdl-130917
 

Dernier

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Dernier (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

Twitter's Terms and Privacy Policy Explained

  • 1. Policy Primer: An introduction to Twitter’s Terms of Service & Privacy Policy
  • 2.  Twitter is an online real-time instant messaging service  Often referred to as a micro-blogging service  Send small messages and “speak your mind”  Send 140 character messages to your friends or followers PCs, Laptops & Mobile Phones  You can broadcast Tweets (messages) to public or private groups
  • 3.  Send personalised / private messages to individuals or selected groups  Follow the postings of others (a Follower)  Followers can reply to Tweets or forward these messages to others  Remember…!! Whatever you write will become public..even if you think it’s private!
  • 4. Twitter’s legal documents are contained on the www.twitter.com website include:  Terms of Service http://twitter.com/tos  Privacy Policy http://twitter.com/privacy  Other Twitter Rules & Must Read Instructions  The Twitter Rules http://twitter.zendesk.com/forums/26257/entries/18311  Law Enforcement Guidelines http://twitter.zendesk.com/forums/26257/entries/41949  API Terms of Service http://dev.twitter.com/pages/api_terms  Twitter Basics http://support.twitter.com/groups/31-twitter-basics  Report a Violation Page http://support.twitter.com/groups/33-report-a-violation
  • 5. https://twitter.com/signup By clicking “Create my account”, you are agreeing to Twitter’s Terms of Service, Privacy Policy and other rules of use
  • 6.  Basic Terms  By registering you are forming a contract with Twitter (under laws of United States or other applicable jurisdictions),  You accepting the Terms of Service and Privacy Policy when pressing the “Create my account” button.  Twitter is free to change or stop its services without prior notice to you.  Twitter has the right change the limits on storage or usage without prior notice to you.  Twitter has the right to include advertisements on its pages or what’s presented to you.
  • 7.  Privacy Section  Twitter is allowed to send you service announcements even though you’ve un-subscribed to e-mails. These are not considered as SPAM.  You can opt-out from newsletters, follower e-mails by changing your Notices in the Settings tab.  There is a separate Privacy Policy web page which you must refer to. http://twitter.com/privacy
  • 8.  Passwords  Twitter recommends strong passwords  Twitter is not responsible for your loss or damage if your password is compromised  Content on the Services  You are responsible for the Content you post  Twitter is not responsible for Content posted, this is at the readers risk.  Offensive, harmful, inaccurate, mislabelled, deceptive content or links to viruses are at the readers risk.  Twitter not liable for any loss or damage.  Twitter may remove content at its discretion.
  • 9.  Your Rights  You retain the right to any Content you submit  You grant Twitter a sub-licence to:  Use or modify your Content  The right to broadcast this content worldwide  And in any and all distribution methods available now or in the future.  You allow Twitter & other companies to publish your Content and for others to read it.
  • 10.  Your Content still remains your property, you own the Content.  You are responsible for ensuring copyright of your Content.  Twitter allows you to use of their software and message broadcasting service:  Provided you conform to the Terms of Service, Privacy and other rules of use.
  • 11.  Twitter Rights  The Twitter website and Services (excluding your Content) is the property of Twitter Inc.  The Twitter website code, images and logos belong to Twitter  You are not allowed to use, copy or claim ownership.  Any great ideas or suggestions on how to improve the service are presented without obligation. Twitter will not reward you for a great idea or new invention.
  • 12.  Restrictions on Content and Use of the Services  Twitter reserves the right remove Content or close your account.  Twitter has the right to monitor your content.  Twitter has the right to make your Content available to law enforcement agencies and governments.  Twitter provides an Application Programming Interface (API).  API allows programmers to create applications (to send & receive Tweets) . See API Terms of Service. http://dev.twitter.com/pages/api_terms
  • 13.  Twitter claims not to release “personally identifiable” information to third parties. See Privacy Policy. http://twitter.com/privacy  No hacking, tampering, deceptive sending, spamming, virus uploading or denial of service allowed by users.
  • 14.  Copyright Policy  Twitter recognises the intellectual property rights of users  Will respond to alleged copyright infringements  Twitter reserves the right to remove any alleged infringing content without prior notice.  The Services are Available “AS-IS”  The Twitter make no guarantees as to the reliability or operation of their services  Not responsible for loss of data or damage to your computer as a result of using the service.
  • 15.  Links  Twitter is not responsible for links, or content on other websites, services or third party applications.  Twitter does not endorse content on any other site  Users acknowledge their responsibility for sending Followers to other websites  Users assume the risk from using third party sites.
  • 16.  Limitation of Liability  Twitter is not liable for any loss or damage caused as a result of using their services  In some countries the exclusion of warranties may not be enforceable  If some part of the Terms of Service is not enforceable, it does not void the remainder of the Terms.  Laws of California and United States will apply.
  • 17.  Personal – Identifiable Information  Name, User Name, E-Mail Address, Location, Password, Photo, Bio, Mobile Phone Number, IP Address, browser type & version. http://twitter.com/privacy  Don’t enable Current Location, if away from home might get burgled.
  • 18.  Tracking & Data Logging  Twitter saves and tracks what you say (Tweet) and to who.  It also tracks who you follow, Retweet, reply & message.  Twitter targets advertising based on what you say and follow / view and what you Retweet.  Twitter uses cookies to track IP address, screen visits and session status.  Without cookies enabled you can’t login.  Twitter also follows our usage with various tools such as Google Analytics.
  • 19.  Twitter claims NOT to release private information, except in the following cases:  When you consent or use a third party applications to access Twitter (Tweetdeck etc)  To other undescribed service providers (who & what?)  The law agencies (big brother terrorist prevention ?)  To a new owner of Twitter (then what will they do with it?)  Non-Private or aggregated data (questionable?)
  • 20.  Children Policy  Children under 13 are not allowed to use Twitter  Pervious versions  Old Privacy Policies & Terms of Service are maintained on the site. (Good, history of changes important)
  • 21.  Private Accounts become public  This has occurred using third party applications http://techcrunch.com/2008/04/23/privacy-disaster-at-twitter-direct-messages-exposed/  Private Accounts can be hacked  YouTube has several examples how to hack Private Accounts. http://www.youtube.com/results?search_query=hacking+twitter+accounts&aq=0  Malicious links to viruses & worms allow malware, Trojans & phishing http://voices.washingtonpost.com/blog-post/2010/09/twitter_bug_attacks_the_intern.html http://blog.twitter.com/2010/02/avoid-phishing-scams.html  Private Tweets can be forwarded to Followers of Followers
  • 22.  The Twitter Rules http://twitter.zendesk.com/forums/26257/entries/18311  Details what not to do on Twitter including SPAM, content restrictions  Law Enforcement Guidelines http://twitter.zendesk.com/forums/26257/entries/41949  Twitter requires a subpoena, court order, or other valid legal process to disclose information about our users.  API Terms of Service http://dev.twitter.com/pages/api_terms  This is for software developers when developing applications that interact or use the Twitter service  Twitter Help Center http://support.twitter.com/ ◦ A good place to start before you start Tweeting  Twitter Basics http://support.twitter.com/groups/31-twitter-basics  Extensive list of information on how to use Twitter and what not to do  Report a Violation Page http://support.twitter.com/groups/33-report-a-violation  Worth reading before using Twitter, informs what’s not acceptable
  • 23. Google Analytics. (2010). Google.com Retrieved October, 12, 2010, from http://www.google.com/analytics/ Twitter. (2009a). Guideline for Law Enforcement. Twitter.com Retrieved October, 13, 2010, from http://twitter.zendesk.com/forums/26257/entries/41949 Twitter. (2009b). The Twitter Rules. Twitter.com Retrieved October, 12, 2010, from http://twitter.zendesk.com/forums/26257/entries/18311 Twitter. (2010a). API Terms of Service. Twitter.com Retrieved October, 12, 2010, from http://dev.twitter.com/pages/api_terms Twitter. (2010b). Privacy Policy. Twitter.com Retrieved October, 20, 2010, from http://twitter.com/privacy Twitter. (2010c). Report a Violation. Twitter.com Retrieved October, 16, 2010, from http://support.twitter.com/groups/33-report-a-violation Twitter. (2010d). Terms of Service. Twitter.com Retrieved October, 20, 2010, from http://twitter.com/tos Twitter. (2010e). Twitter Help Center. Twitter.com Retrieved October, 12, 2010, from http://support.twitter.com/