SlideShare une entreprise Scribd logo
1  sur  12
Twitter ,[object Object]
Welcome ,[object Object]
Content
Spam
Abuse
Trademark & Copyright
Privacy ,[object Object]
Privacy (cont) ,[object Object]
Privacy (cont) Who can access my information ,[object Object]
Privacy laws of the users country become irrelevant.
If a government or Law Enforcement Officials or Private Parties in the US gets a court order it can walk in to twitter headquarters and help itself to your data. the good news is it's primarily to stop illegal, unethical or legally actionable activity. The bad news is that there is no statement anywhere in the documents stating how long this data will be collected if not indefinitely.
Privacy (cont) ,[object Object]

Contenu connexe

Tendances

Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
Twitter in hotel marketing
Twitter in hotel marketingTwitter in hotel marketing
Twitter in hotel marketinghoteleuropa2
 
Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Cole_Hart
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prezstacyo
 
Script for Teaching Twitter
Script for Teaching TwitterScript for Teaching Twitter
Script for Teaching TwitterBovee and Thill
 
Tumblr - What did you agree to?
Tumblr - What did you agree to?Tumblr - What did you agree to?
Tumblr - What did you agree to?donttrustladygaga
 
What Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsWhat Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsRachel Beaney
 
Twitter: a case study
Twitter: a case studyTwitter: a case study
Twitter: a case studyClinton Forry
 
Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Mohammad Hijazi
 
Tweeting For NC State University
Tweeting For NC State UniversityTweeting For NC State University
Tweeting For NC State UniversityJason Austin
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersTessa Horehled
 
Twitter 101 for Government
Twitter 101 for GovernmentTwitter 101 for Government
Twitter 101 for Governmentcanada30
 
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ..."Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...Joshua Tree Internet Media, LLC
 

Tendances (20)

Twitter Training for Activists
Twitter Training for ActivistsTwitter Training for Activists
Twitter Training for Activists
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Twitter in hotel marketing
Twitter in hotel marketingTwitter in hotel marketing
Twitter in hotel marketing
 
Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prez
 
Script for Teaching Twitter
Script for Teaching TwitterScript for Teaching Twitter
Script for Teaching Twitter
 
Twitter Brochure
Twitter BrochureTwitter Brochure
Twitter Brochure
 
Tumblr - What did you agree to?
Tumblr - What did you agree to?Tumblr - What did you agree to?
Tumblr - What did you agree to?
 
What Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsWhat Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPs
 
Twitter conventions
Twitter conventionsTwitter conventions
Twitter conventions
 
Twitter: A Final Friday presentation
Twitter: A Final Friday presentationTwitter: A Final Friday presentation
Twitter: A Final Friday presentation
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
Twitter: a case study
Twitter: a case studyTwitter: a case study
Twitter: a case study
 
Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)
 
Tweeting For NC State University
Tweeting For NC State UniversityTweeting For NC State University
Tweeting For NC State University
 
Twitter conventions
Twitter conventionsTwitter conventions
Twitter conventions
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For Marketers
 
Twitter 101 for Government
Twitter 101 for GovernmentTwitter 101 for Government
Twitter 101 for Government
 
Twitter 2.0
Twitter 2.0Twitter 2.0
Twitter 2.0
 
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ..."Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
 

Similaire à Twitter Terms Policy Primer

What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?abdullasshalhabsi
 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.BarkerCurtin2013
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteJake White
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacySolomben
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2Nick Buonvicino
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfFacebook
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on TwitterYansi Keim
 
Inputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesInputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesFaraedoon Farage
 
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...alanthall
 
Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Emma Mirrington
 
The Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersThe Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersHM Revenue & Customs
 
Online policy primer
Online policy primerOnline policy primer
Online policy primer15807539
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaBrian Miller, Solicitor
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyRamiro Cid
 

Similaire à Twitter Terms Policy Primer (20)

What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?
 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake White
 
Policy Primer-Davida Aerlic
Policy Primer-Davida AerlicPolicy Primer-Davida Aerlic
Policy Primer-Davida Aerlic
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Twitter Success guide
Twitter Success guideTwitter Success guide
Twitter Success guide
 
Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdf
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Inputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesInputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposes
 
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
 
Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10
 
The Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersThe Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for Recruiters
 
Online policy primer
Online policy primerOnline policy primer
Online policy primer
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social Media
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Twitter Terms Policy Primer

  • 1.
  • 2.
  • 7.
  • 8.
  • 9.
  • 10. Privacy laws of the users country become irrelevant.
  • 11. If a government or Law Enforcement Officials or Private Parties in the US gets a court order it can walk in to twitter headquarters and help itself to your data. the good news is it's primarily to stop illegal, unethical or legally actionable activity. The bad news is that there is no statement anywhere in the documents stating how long this data will be collected if not indefinitely.
  • 12.
  • 13. Parents or Guardians must email privacy at twitter dot com to have the data deleted (unkown, 2009)
  • 14. In the Twitter sign up page there is NO checkbox to tick stating the user is 13 or over.
  • 15. Meaning that if a child under the age of 13 tries to sign up to Twitter they have no idea that it is against Twitter policy unless they read the privacy agreement.
  • 16.
  • 17. this sentence is then followed by all of the rights you are giving to Twitter explained in the next slide
  • 18. your rights section is really an extension of the Twitter rights section with a friendly title.
  • 19.
  • 20.
  • 21.
  • 22. Privacy such as addresses, credit card information not permited (crystal, 2009)
  • 23. this does not seem to be a large issue at this stage but a good safeguard non the less.
  • 24. Violence or threats (crystal, 2009)
  • 25. a reprehensible form of cyber bullying that will only be acted upon after the person under attack has complained.
  • 26.
  • 27. References unknown. (2009, September). Twitter / Twitter Terms of Service. Retrieved October 4, 2009, from https://twitter.com/tos . unknown. (2007, March). Twitter / Twitter Privacy Policy. Retrieved October 4, 2009, from https://twitter.com/privacy . crystal. (2009, January). Twitter Support :: The Twitter Rules. Retrieved October 4, 2009, from http://help.twitter.com/forums/26257/entries/18311 .