Google Terms of Service, Privacy, Surveillance and Censorship

16
Google’s Terms Of Service Privacy, Surveillance & Censorship

description

Succinct presentation summarizing the key features, and related issues, of the terms of Service for Google

Transcript of Google Terms of Service, Privacy, Surveillance and Censorship

Page 1: Google Terms of Service, Privacy, Surveillance and Censorship

Google’s Terms Of Service

Google’s Terms Of Service

Privacy, Surveillance &

Censorship

Privacy, Surveillance &

Censorship

Page 2: Google Terms of Service, Privacy, Surveillance and Censorship

Privacy and Personal Information

Privacy and Personal Information

When using Google’s services you agree to the use of your data in accordance with Google’s privacy policies

When using Google’s services you agree to the use of your data in accordance with Google’s privacy policies

Page 3: Google Terms of Service, Privacy, Surveillance and Censorship

Search PrivacySearch Privacy

When you access Google’s search services, their servers record information that your browser sends whenever you visit a website. Information such as your IP address, browser type, browser language and the date and time of your request is collected.

When you access Google’s search services, their servers record information that your browser sends whenever you visit a website. Information such as your IP address, browser type, browser language and the date and time of your request is collected.

Page 4: Google Terms of Service, Privacy, Surveillance and Censorship

If search logs are revealed to third parties great harm can be caused, these logs make it quite easy for government agencies or other individuals to “subpoena your search provider and get access to your search history” potentially exposing highly private information.

If search logs are revealed to third parties great harm can be caused, these logs make it quite easy for government agencies or other individuals to “subpoena your search provider and get access to your search history” potentially exposing highly private information.

Page 5: Google Terms of Service, Privacy, Surveillance and Censorship

SurveillanceSurveillance

Google’s privacy policy states that location data is collected trough services such as Google Maps for mobile. This enables Google to receive information about your actual location or information that can be used to approximate your location.

Google’s privacy policy states that location data is collected trough services such as Google Maps for mobile. This enables Google to receive information about your actual location or information that can be used to approximate your location.

Page 6: Google Terms of Service, Privacy, Surveillance and Censorship

The Internet, and subsequent technologies that rely on the Internet such as Google maps for mobile, has enabled individuals to jeopardize privacy more thoroughly than in years past, providing a challenge for legislators to govern breaches of privacy.

The Internet, and subsequent technologies that rely on the Internet such as Google maps for mobile, has enabled individuals to jeopardize privacy more thoroughly than in years past, providing a challenge for legislators to govern breaches of privacy.

Page 7: Google Terms of Service, Privacy, Surveillance and Censorship

Through the implementation of services such as, Google Street View Australia, privacy advocates are concerned that Google is putting commercial gain before privacy rights.

Through the implementation of services such as, Google Street View Australia, privacy advocates are concerned that Google is putting commercial gain before privacy rights.

Page 8: Google Terms of Service, Privacy, Surveillance and Censorship

Although the images containing faces and number plates used for Google Street View have had blurring technology applied, the concern of identification through other distinguishing features remains.

Although the images containing faces and number plates used for Google Street View have had blurring technology applied, the concern of identification through other distinguishing features remains.

Page 9: Google Terms of Service, Privacy, Surveillance and Censorship

Not only is privacy a concern with regards to Google’s application of data collection but the points raised also lead me to question the levels of surveillance undertaken by Google for commercial gain through services such as Google Street View.

Not only is privacy a concern with regards to Google’s application of data collection but the points raised also lead me to question the levels of surveillance undertaken by Google for commercial gain through services such as Google Street View.

Page 10: Google Terms of Service, Privacy, Surveillance and Censorship

CensorshipCensorship

Google reserves the right, without obligation to pre screen, review, flag, filter, modify, refuse or remove any or all content from any service.

Google reserves the right, without obligation to pre screen, review, flag, filter, modify, refuse or remove any or all content from any service.

Page 11: Google Terms of Service, Privacy, Surveillance and Censorship

This right to ‘censor information’ by Google is evident within China where Google.cn is trying to balance censorship with the company’s goal of making the world’s information widely available.

This right to ‘censor information’ by Google is evident within China where Google.cn is trying to balance censorship with the company’s goal of making the world’s information widely available.

Page 12: Google Terms of Service, Privacy, Surveillance and Censorship

China has invested over $700 million in trying to purify the Internet through censorship and is currently achieving this goal with the assistance of Google.

China has invested over $700 million in trying to purify the Internet through censorship and is currently achieving this goal with the assistance of Google.

Page 13: Google Terms of Service, Privacy, Surveillance and Censorship

Conclusion Conclusion

You are solely responsible for any content that you create, transmit or display while using any services offered by Google and for the consequences of your actions by doing so.

You are solely responsible for any content that you create, transmit or display while using any services offered by Google and for the consequences of your actions by doing so.

Page 14: Google Terms of Service, Privacy, Surveillance and Censorship

ReferencesReferences• August, O. (2007). "The Great Firewall: China's Misguided — and Futile —

Attempt to Control What Happens Online." Retrieved 24th Oct, 2009.

• Colley, A. (2008). Privacy advocates say Google's gone too far. The Australian.

• Kaushal, N. (2009). "Google Employee Sued For TOS Violation." Retrieved 23rd Oct, 2009, from http://www.webpronews.com/blogtalk/2009/04/13/google-employee-sued-for-tos-violation-0.

• Krazit, T. (2009). "Google's censorship struggles continue in China." Retrieved 24th Oct, 2009, from http://news.cnet.com/8301-17939_109-10265123-2.html.

• Muhl, C. (2003). "Workplace e-mail and Internet use: employees and employers beware." Monthly Labor Review, February.

• August, O. (2007). "The Great Firewall: China's Misguided — and Futile — Attempt to Control What Happens Online." Retrieved 24th Oct, 2009.

• Colley, A. (2008). Privacy advocates say Google's gone too far. The Australian.

• Kaushal, N. (2009). "Google Employee Sued For TOS Violation." Retrieved 23rd Oct, 2009, from http://www.webpronews.com/blogtalk/2009/04/13/google-employee-sued-for-tos-violation-0.

• Krazit, T. (2009). "Google's censorship struggles continue in China." Retrieved 24th Oct, 2009, from http://news.cnet.com/8301-17939_109-10265123-2.html.

• Muhl, C. (2003). "Workplace e-mail and Internet use: employees and employers beware." Monthly Labor Review, February.

Page 15: Google Terms of Service, Privacy, Surveillance and Censorship

ReferencesReferences• Peter Eckersley, S. S., Kevin Bankston, and Derek Slater. (2006). "Six

Tips to Protect Your Search Privacy." Retrieved 25th Oct, 2009, from http://www.eff.org/wp/six-tips-protect-your-search-privacy.

• Technology, C. f. D. a. (2005). "Why Am I Getting All This Spam?

• Unsolicited Commercial E-mail Research Six Month Report." Retrieved 23rd Oct, 2009, from http://www.cdt.org/speech/spam/030319spamreport.shtml.

• Waterfield, B. (2007). Google to pay £2.4m over 'copyright breach'. Telegraph.co.uk.

• Zittrain, J. (n.d.). "Meeting the Risks of Generativity." Privacy 2.0. Retrieved 24th Oct, 2009, from http://yupnet.org/zittrain/archives/20.

• Peter Eckersley, S. S., Kevin Bankston, and Derek Slater. (2006). "Six Tips to Protect Your Search Privacy." Retrieved 25th Oct, 2009, from http://www.eff.org/wp/six-tips-protect-your-search-privacy.

• Peter Eckersley, S. S., Kevin Bankston, and Derek Slater. (2006). "Six Tips to Protect Your Search Privacy." Retrieved 25th Oct, 2009, from http://www.eff.org/wp/six-tips-protect-your-search-privacy.

• Technology, C. f. D. a. (2005). "Why Am I Getting All This Spam?

• Unsolicited Commercial E-mail Research Six Month Report." Retrieved 23rd Oct, 2009, from http://www.cdt.org/speech/spam/030319spamreport.shtml.

• Waterfield, B. (2007). Google to pay £2.4m over 'copyright breach'. Telegraph.co.uk.

• Zittrain, J. (n.d.). "Meeting the Risks of Generativity." Privacy 2.0. Retrieved 24th Oct, 2009, from http://yupnet.org/zittrain/archives/20.

• Peter Eckersley, S. S., Kevin Bankston, and Derek Slater. (2006). "Six Tips to Protect Your Search Privacy." Retrieved 25th Oct, 2009, from http://www.eff.org/wp/six-tips-protect-your-search-privacy.

Page 16: Google Terms of Service, Privacy, Surveillance and Censorship

ReferencesReferences• Technology, C. f. D. a. (2005). "Why Am I Getting All This Spam?

• Unsolicited Commercial E-mail Research Six Month Report." Retrieved 23rd Oct, 2009, from http://www.cdt.org/speech/spam/030319spamreport.shtml.

• Waterfield, B. (2007). Google to pay £2.4m over 'copyright breach'. Telegraph.co.uk.

• Zittrain, J. (n.d.). "Meeting the Risks of Generativity." Privacy 2.0. Retrieved 24th Oct, 2009, from http://yupnet.org/zittrain/archives/20.

• Technology, C. f. D. a. (2005). "Why Am I Getting All This Spam?

• Unsolicited Commercial E-mail Research Six Month Report." Retrieved 23rd Oct, 2009, from http://www.cdt.org/speech/spam/030319spamreport.shtml.

• Waterfield, B. (2007). Google to pay £2.4m over 'copyright breach'. Telegraph.co.uk.

• Zittrain, J. (n.d.). "Meeting the Risks of Generativity." Privacy 2.0. Retrieved 24th Oct, 2009, from http://yupnet.org/zittrain/archives/20.