SlideShare una empresa de Scribd logo
1 de 12
Twitter ,[object Object]
Welcome ,[object Object]
Content
Spam
Abuse
Trademark & Copyright
Privacy ,[object Object]
Privacy (cont) ,[object Object]
Privacy (cont) Who can access my information ,[object Object]
Privacy laws of the users country become irrelevant.
If a government or Law Enforcement Officials or Private Parties in the US gets a court order it can walk in to twitter headquarters and help itself to your data. the good news is it's primarily to stop illegal, unethical or legally actionable activity. The bad news is that there is no statement anywhere in the documents stating how long this data will be collected if not indefinitely.
Privacy (cont) ,[object Object]

Más contenido relacionado

La actualidad más candente

Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
Twitter in hotel marketing
Twitter in hotel marketingTwitter in hotel marketing
Twitter in hotel marketinghoteleuropa2
 
Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Cole_Hart
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prezstacyo
 
Script for Teaching Twitter
Script for Teaching TwitterScript for Teaching Twitter
Script for Teaching TwitterBovee and Thill
 
Tumblr - What did you agree to?
Tumblr - What did you agree to?Tumblr - What did you agree to?
Tumblr - What did you agree to?donttrustladygaga
 
What Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsWhat Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsRachel Beaney
 
Twitter: a case study
Twitter: a case studyTwitter: a case study
Twitter: a case studyClinton Forry
 
Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Mohammad Hijazi
 
Tweeting For NC State University
Tweeting For NC State UniversityTweeting For NC State University
Tweeting For NC State UniversityJason Austin
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersTessa Horehled
 
Twitter 101 for Government
Twitter 101 for GovernmentTwitter 101 for Government
Twitter 101 for Governmentcanada30
 
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ..."Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...Joshua Tree Internet Media, LLC
 

La actualidad más candente (20)

Twitter Training for Activists
Twitter Training for ActivistsTwitter Training for Activists
Twitter Training for Activists
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Twitter in hotel marketing
Twitter in hotel marketingTwitter in hotel marketing
Twitter in hotel marketing
 
Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1Twitter (signing up), P5, D1, M1
Twitter (signing up), P5, D1, M1
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prez
 
Script for Teaching Twitter
Script for Teaching TwitterScript for Teaching Twitter
Script for Teaching Twitter
 
Twitter Brochure
Twitter BrochureTwitter Brochure
Twitter Brochure
 
Tumblr - What did you agree to?
Tumblr - What did you agree to?Tumblr - What did you agree to?
Tumblr - What did you agree to?
 
What Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPsWhat Is Twitter: A guide for NFPs
What Is Twitter: A guide for NFPs
 
Twitter conventions
Twitter conventionsTwitter conventions
Twitter conventions
 
Twitter: A Final Friday presentation
Twitter: A Final Friday presentationTwitter: A Final Friday presentation
Twitter: A Final Friday presentation
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
Twitter: a case study
Twitter: a case studyTwitter: a case study
Twitter: a case study
 
Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)Introduction to Twitter (HUOC SM101 Spring 2012)
Introduction to Twitter (HUOC SM101 Spring 2012)
 
Tweeting For NC State University
Tweeting For NC State UniversityTweeting For NC State University
Tweeting For NC State University
 
Twitter conventions
Twitter conventionsTwitter conventions
Twitter conventions
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For Marketers
 
Twitter 101 for Government
Twitter 101 for GovernmentTwitter 101 for Government
Twitter 101 for Government
 
Twitter 2.0
Twitter 2.0Twitter 2.0
Twitter 2.0
 
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ..."Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
"Twitter Basics" - Brent Williams (Multifamily Insiders)- Apartment Internet ...
 

Similar a Twitter Terms Policy Primer

What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?abdullasshalhabsi
 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.BarkerCurtin2013
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteJake White
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2Nick Buonvicino
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacySolomben
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfFacebook
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on TwitterYansi Keim
 
Inputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesInputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesFaraedoon Farage
 
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...alanthall
 
The Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersThe Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersHM Revenue & Customs
 
Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Emma Mirrington
 
Online policy primer
Online policy primerOnline policy primer
Online policy primer15807539
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaBrian Miller, Solicitor
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyRamiro Cid
 

Similar a Twitter Terms Policy Primer (20)

What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?What lies behind twitter’s terms of service?
What lies behind twitter’s terms of service?
 
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
True Tales of Tumblr's Terms : Net Studies. A Policy Primer.
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake White
 
Policy Primer-Davida Aerlic
Policy Primer-Davida AerlicPolicy Primer-Davida Aerlic
Policy Primer-Davida Aerlic
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Twitter Success guide
Twitter Success guideTwitter Success guide
Twitter Success guide
 
Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdf
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Inputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposesInputted data to ChatGPT may be used for unauthorized purposes
Inputted data to ChatGPT may be used for unauthorized purposes
 
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...Tumblr Terms of Service Policy Primer: an Internet Communications student per...
Tumblr Terms of Service Policy Primer: an Internet Communications student per...
 
The Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for RecruitersThe Why and How of Social Recruiting for Recruiters
The Why and How of Social Recruiting for Recruiters
 
Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10Social Recruiting by Andy Headworth 14/10/10
Social Recruiting by Andy Headworth 14/10/10
 
Online policy primer
Online policy primerOnline policy primer
Online policy primer
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social Media
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 

Último

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Twitter Terms Policy Primer

  • 1.
  • 2.
  • 7.
  • 8.
  • 9.
  • 10. Privacy laws of the users country become irrelevant.
  • 11. If a government or Law Enforcement Officials or Private Parties in the US gets a court order it can walk in to twitter headquarters and help itself to your data. the good news is it's primarily to stop illegal, unethical or legally actionable activity. The bad news is that there is no statement anywhere in the documents stating how long this data will be collected if not indefinitely.
  • 12.
  • 13. Parents or Guardians must email privacy at twitter dot com to have the data deleted (unkown, 2009)
  • 14. In the Twitter sign up page there is NO checkbox to tick stating the user is 13 or over.
  • 15. Meaning that if a child under the age of 13 tries to sign up to Twitter they have no idea that it is against Twitter policy unless they read the privacy agreement.
  • 16.
  • 17. this sentence is then followed by all of the rights you are giving to Twitter explained in the next slide
  • 18. your rights section is really an extension of the Twitter rights section with a friendly title.
  • 19.
  • 20.
  • 21.
  • 22. Privacy such as addresses, credit card information not permited (crystal, 2009)
  • 23. this does not seem to be a large issue at this stage but a good safeguard non the less.
  • 24. Violence or threats (crystal, 2009)
  • 25. a reprehensible form of cyber bullying that will only be acted upon after the person under attack has complained.
  • 26.
  • 27. References unknown. (2009, September). Twitter / Twitter Terms of Service. Retrieved October 4, 2009, from https://twitter.com/tos . unknown. (2007, March). Twitter / Twitter Privacy Policy. Retrieved October 4, 2009, from https://twitter.com/privacy . crystal. (2009, January). Twitter Support :: The Twitter Rules. Retrieved October 4, 2009, from http://help.twitter.com/forums/26257/entries/18311 .