Social Media Privacy Case Study

Superior Essays
As technology continues to expand, reaching and connecting more people each and every day, social media and society become inseparable. Society as a whole relies on social media to get through the day, from merely checking early morning emails, to video chatting with family across the country. This strong connection between society and social media increases interactions with others near and far, yet, points out the issues of trust, security, and privacy in relation to applications and websites used. Who has control over information posted through social media? Will companies stay true to their terms, conditions, and policy statements, or will they had over personal information to outside sources? Skype, a video and instant messaging application, …show more content…
Two of the twenty third party affiliates named in the Privacy Policy, AdBlade and Xaxis, each publish a privacy and terms of use document, similar to Skype, and outline how the company will share, use, and distribute user’s information. In AdBlade’s General Privacy Policy, for example, the company uses “clickstream data,” which allows the company to track users’ Internet activity. This includes what a person used the site for and how long he or she was on it ("Adblade - Privacy Policy”). Xaxis’ Privacy Policy similarly describes how the company works with users’ information. Stating that Xaxis sees what a person does with not only their clients, but also their client’s clients, the company tracks what a person does before and after he or she comes into contact with Xaxis and distributes this information to multiple companies. However, Xaxis leaves specific information about users private by not collecting users’ names, addresses, and phone numbers, but by merely referring to a person as “you” or “your” ("Privacy Policy | …show more content…
However, unlike the third parties who are granted access through the application itself, Skype claims the government must file a formal request in order to receive information such as credit card numbers, names, and addresses. Anticipating the response of users over giving the government their information, Skype states that the company legally cooperates with the government and police (Timberg and Nakashima). Relating back to privacy issues, users want a sense of security that their information, conversations, and time spent on Skype remain private; however, allowing third party affiliates and the government to easily access this information and activity creates the opposite effect and leaves the user feeling apprehensive about interaction on the application. Additionally, in the peer reviewed academic journal, “Analysis of Information Leakage from Encrypted Skype Conversation,” detailed breakdown of Skype’s encryptions prove that the application is not as secure as it claims to be. Skype claimed to use a secure and protected Voice over Internet Protocol (VoIP), which allows companies and users to make voice calls over the Internet; however, detailed testing demonstrated that up to eighty-three percent could be understood (Dupasquier, Burschka, Mclaughlin and Sezer). This information means that people and companies other than Skype and its

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    In the beginning of this article, the author not only tells about himself, but provides many details that the readers will recognize such as Stanford which we attribute to being a noteworthy institution and thus a reliable place for information to come from. The author also state that he has worked for former President Barack Obama in something directly related to his area of expertise. By stating these things in the beginning of his article before the author even begins to layout his argument he is already trying to establish ethos with the readers. By doing this in the beginning the author hopes that he will ideally gain the readers trust and the readers will finish the article and look at things from his perspective. Herb makes the claim that “under current law, consumers have essentially no rights regarding this stored personal data”.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Masthead Enterprises Privacy Policy This Privacy Policy briefly explains our privacy practices for www.mastheadsailinggear.com. Our privacy policy applies specifically to information collected by this website. The following describes our handling and disposition of customer information and data, as well as, our procedures and practices of privacy: 1. Masthead Enterprises collects the minimum personal identifiable information.…

    • 1260 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    The world has registered huge technological intricacies concerning about social media. There are no contentions that the thrilling defect elevated to an extent that created the ethical issues governing social media. With increased usage of the social media for purposes other than personal affections, the question of privacy and confidentiality has been much highlighted by experts. Whereas the social media gives individuals the platform to publish and or share whatever they have in mind, there are expectations of limitations as to the extent to which personal information could be shared within these platforms.…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    We may collect and possess personal information about a Client use of our services (“Usage Information”). Usage Information may include IP address, operating system and version, and a unique device identifier or UDID. The source of the Usage Information is our _________________tracking system that collects information from a user’s device. We may legally collect this personal information by consent and for proper delivery of our services in the performance of the contract between the Client and Record360. Client Transaction Data.…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    One main point includes the fine line between stalking and customization. Acxiom collects data based on the consumer’s patterns and behaviors. In the article it explains how a journalist had to be aware of computer hackers, and to be more cautious as to who to give information to. Also, as to what is the argument Singer is making. Singer isn’t really making an argument, rather than raising a question.…

    • 930 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The thief performs this scheme by contacting the individual over the phone. While on the phone, the perpetrator acts as though they may be affiliated with a prestigious financial company. Their goal is to obtain the individuals personal information. Another variation of vishing is using robo-calls also known as pre-recorded messages urging the individual to contact a certain phone number. The recording typically states that the individual either won a prize, or an emergency has occurred that requires disclosing personal identifiable information (Most Common Schemes, 2009).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    This can cause issues with keeping information about oneself private and may even lead to certain, critical information being leaked out onto the internet. As Dr. Robert Howell put it in an online article, “Providing the third party access to the detailed customer data would, again, be a violation of privacy rights. This area is very tricky, as individual customers provide, and lose control of, their individual data, and it only takes an individual or small group to use such data inappropriately” (https://www.wsj.com/articles/should-companies-profit-by-selling-customers8217-data-1382635260). So, it's possible then for a person to do an untold amount of cyber-stalking, using personal data gathered off the internet to find exactly where people have been and where they go the most, what route they took to get there, or even phone numbers of relatives, friends, and coworkers. There is an ample amount of information that can be found on the internet and there is no good way of knowing who wants it and is going to use it maliciously.…

    • 1266 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    1984 Vs Today

    • 451 Words
    • 2 Pages

    There are over 1.2 million individuals on the NSA watch list, though many are unaware of the surveillance on them every day. (Gomez) Many popular phone companies such as Verizon and AT&T agreed to release customer data, phone numbers, and access to tap into phone lines and user calls, putting nearly everyone in the United States under constant watch. A person’s cellphone may be the most widely used.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Marisa Taylor is an investigative reporter and Jonathan Landay is a national security and intelligence reporter for McClatchy Newspapers, based in Washington, DC. The National Security Agency (NSA) is turning down requests from individuals who want to find out whether the agency is holding records of their telephone communications. Simply answering yes or no, the NSA argues, is classified information that would jeopardize the effectiveness of its data-collection program. That means that innocent people whose communications data may be held by the agency have no way of even finding out.…

    • 1514 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Tracking One's Privacy

    • 985 Words
    • 4 Pages

    The invasion of one's privacy is done for market reasons. If one is not…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    There are a plethora of social media sites today. Discovering Computers 2016 (2016) defines social media as "a website that encourages members in its online community to share their interests, ideas, stories, photos, music, and videos with other registered users" (p. 72). From Facebook, to Instagram and Twitter. There are websites where you can socialize and then websites, such as YouTube, that are used to just post short videos. No matter what the social platform, there are millions of people plugged into them.…

    • 1482 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    As humans continue to crave convenience, large technological companies are starting to add features to make products easier to use. However, the consumers do not realize that in order for them to receive such large amounts of convenience, they are sacrificing their privacy. Some of Samsung’s new Smart Televisions ship off “...voice data to an unnamed third party—presumably for the purpose of translating the speech to text”(Newman). This perfectly illustrates how today’s latest technology is invading privacy, one step at a time. People who use the voice command feature on their television can accidentally say something that they should no tell others.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Critical Analysis of Social Media Social media has been used in various contexts to refer to the many forms of web-based platforms and technologies that are used by people globally to interact socially with one another online. Some of the most prominent examples of social media that are commonly used to date are Facebook, Twitter, Youtube, Instagram, Tumblr and Google +, with Facebook, Youtube and Twitter being the most popular, while Pinterest, Tumblr, Instagram LinkedIn being the fastest growing since the year 2014 according to GlobalWebIndex (GWI Device Summary Q3, 2014 Social report). Others include Reddit, LinkedIn, Myspace, and Pinterest. All over the world, the use of social media has been fully integrated into the people’s daily lives…

    • 1870 Words
    • 8 Pages
    Great Essays