SlideShare a Scribd company logo
An Analysis of LinkedIn’s Terms of Service
By Angeline Hildreth
Image uploaded from LinkedIn.com
NET 303: Online Policy Primer
This Online Policy Primer Presentation was written as part of an
assignment for Bachelor of Arts (Internet communications) at Curtin
University, Perth, WA. It has no association with LinkedIn or affiliation
with LinkedIn. Every effort has been made to ensure the accuracy of the
information.
This presentation is for educational purposes only and not a substitute
for legal advice. Please seek professional advice from a lawyer for any
legal advice pertaining to legal issues.
DISCLAIMER
LinkedIn is a social media platform aimed at
providing social networking to professionals.
Image by GDJ (2015)
It claims to be “The World’s largest professional
network”.
Image uploaded from LinkedIn.com
The basic service is free to register. It also offers a
premium service with a monthly fee.
Image uploaded from LinkedIn.com
Regardless of the type of service; whether it is free or fee paying, you need to join
LinkedIn and become a member to use the service, though you can visit the web site
and browse member’s profiles.
By selecting ‘Join now’ you are agreeing to their Terms of Service (TOS or User
Agreement), Privacy Policy and Cookie Policy.
Image: uploaded from LinkedIn.com
“If you have any concerns about …any manner
permitted in this Privacy Policy and the User
Agreement, you should not become a Member,
visit our websites, apps or otherwise use our
Services (LinkedIn, 2014).”
What if you do not agree!
What LinkedIn is saying is, if you do not agree then you should not
use their service or visit their website.
If you do, they will apply the clauses mentioned in their Terms of
Agreement.
Terms of Service is a legal contract between you and your chosen service
provider.
Image by Sivvus (2009)
READ IT BEFORE YOU AGREE TO IT!
LinkedIn’s policies contain a number
of clauses relating to ownership,
privacy, copyright, censorship which
raise concerns and are worth a closer
look.
Image uploaded from LinkedIn.com Images: by Levis501 (2013)
But how many of us have time to read through pages and
pages of these complex documents before giving up and
blindly agreeing to them?
Image by Doodleguy (2014)Images uploaded from LinkedIn.com
Image by Palomaironique (2010)
In agreeing to LinkedIn Terms of Service, you are
obligated to them to:
 Be at least 14 years old in Australia and have no
restriction to use their site.
Provide them with your real name, email address
and password.
Agree to keep your information up to date.
Give them non-exclusive license: transferrable and
sub-licensable rights to your information.
Image by Mestre-kame (2008)
Your information is also collected by LinkedIn when
you visit their website.
“Our Privacy Policy applies to any Member or Visitor.
We collect information when you use our Services to
offer you a personalized and relevant experience,
including growing your network and enabling business
opportunities.”
Visitors BEWARE
These are just a few examples of what you have
agreed to when joining LinkedIn. Let’s have a
closer look at some areas you have agreed to.
Image: Uploaded from LinkedIn .com
“You own your content and are responsible for protecting your data. You are
also required to give LinkedIn non-exclusive license to your data and the
rights to retain your personal information, content of your posts. (LinkedIn,
2015).”
Who owns the content?
Simply put; the content and liabilities belong to
you.
LinkedIn has the rights to collect vast amounts of
your information including information on people
you associate with and your financial details for their
benefit. Though, they claim to use the information
for your benefit.
COPYRIGHT
“Please note that whether or not we disable access to
or remove content, LinkedIn may make a good faith
attempt to forward the written notification, including
the complainant’s contact information, to the Member
who posted the content and/or take other reasonable
steps to notify the Member that LinkedIn has received
notice of an alleged violation of intellectual property
rights or other content violation.”
But …
LinkedIn takes no responsibility to
stop others from copying your
information.
“ We collect information when you fill out
a profile… – like your job title, education,
and skills – helps you get found by other
people for opportunities.”
PRIVACY AND SURVEILLANCE
Image by Mav (2012)Image by GDJ (2015)
Basically, LinkedIn collects all of its member’s and visitor’s personal
information and has user's detailed profiles at their fingertips.
They also collect content from your email address book or calendar,
your participations in various activities and the web sites or ads you
clicked on.
Your every move is monitored using Cookie Technology (Lessig,
1998: August,).
LinkedIn use cookie technology to track your
browsing habits both on theirs and other sites you
visit (LinkedIn, 2014).
Though they claim it is to enable and support their
security features and to help them detect malicious
activity and violations of their User Agreement
(Harry, 2014).
“We may use cookies to show you relevant
advertising both on and off the LinkedIn site. We
may also use a cookie to learn whether members
who saw an ad on LinkedIn later visited the
advertiser's site… We may also work with a
partner to show you an ad on or off LinkedIn,
such as after you've visited a partner's site or
application (LinkedIn, 2014).”
So, who do you think is really benefitting from cookie
technologies here (Brown & Muchira, 2004, p. 66)!
Image by Last-Dino (2012)
“We also receive the internet protocol (“IP”)
address of your computer or the proxy server
that you use to access the web, your computer
operating system details, your type of web
browser, your mobile device (including your
mobile device identifier provided by your mobile
device operating system) … and the name of your
ISP or your mobile carrier.”
This is an invasion of privacy; DON’T YOU THINK
(Zittrain, 2009; Goettke & Christiana, 2007)!
LinkedIn does, and will exercise their
authority to deny access and remove
content/accounts without notifying you!
They will do this if they deem you to
have broken the agreement (Villeneuve,
2006).
Who is the gatekeeper censoring our content and
account?
“If there is a change in control or sale of all or part of
LinkedIn, we may share your information with a third
party, who will have the right to use that information
in line with this Privacy Policy.”
Image: by Hatalar205 (2013)
What this means is that you have unknowingly, as part of
the agreement, given LinkedIn the right to sell your
personal details as part of the company assets. Should
they decide to sell the company, don’t expect a share of
the capital gain. You won’t get any!
“We may change this Privacy Policy from time to time. If we make
significant changes in the way we treat your personal information, or
to the Privacy Policy, we will provide notice to you on the Services or
by some other means, such as email…Using our Services after a
notice of changes has been communicated to you or published on our
Services shall constitute consent to the changed terms or practices.”
They can change the policy at any time. They may email you or publish the
changes on their website. It is your responsibility to keep checking for changes
for they may not email you the changes. The onus is put back on you!
Knowing what you do now; would you try and read the Terms
of Service before signing up to any of the internet platforms?
I certainly would!
Reference
August, O. (2007). The Great Firewall: China's Misguided - and Futile - Attempt to Control What Happens
Online. Wired, 15(11).
Retrieved from
https://web.archive.org/web/20080626074423/http://www.wired.com/politics/security/magazine/15-
11/ff_chinafirewall?currentPage=1
Brown, M., & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concern and Online
Purchase Behavior. Journal of Electronic Commerce Research, 591, 62-70. Retrieved from
http://www.csulb.edu/web/journals/jecr/issues/20041/Paper6.pdf
Doodleguy. (2014). Man Giving Up [Clip art]. Retrieved from https://openclipart.org/detail/211086/man-
resigning
EbizMBA. (n.d.). Top 15 Most Popular Websites-October 2015 [Blog post]. Retrieved from
http://www.ebizmba.com/articles/most-popular-websites
Ernes. (2008). Lente – magnifying glass [Clip art]. Retrieved from
https://openclipart.org/search/?query=magnifying%20glass&page=2
GDJ. (2015). Social Media 2 [Clip art]. Retrieved from https://openclipart.org/detail/227111/social-media-2
GDJ. (2015). Professional People Silhouette [image]. Retrieved from
https://openclipart.org/detail/226095/professional-people-silhouette
Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r:
Special Topics in Computer Science Computation and Society: Privacy and Technology.
Available: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r:
Special Topics in Computer Science Computation and Society: Privacy and Technology.
Available: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
Harry, S. (2014). Everyone Watches, Nobody Sees: How Black Women Disrupt Surveillance Theory. Model
View Culture. Retrieved from https://modelviewculture.com/pieces/everyone-watches-nobody-sees-how-
black-women-disrupt-surveillance-theory
Hatalar205. (2013). Bell [Clip art]. Retrieved from https://openclipart.org/detail/177231/bell
Last-Dina. (2012). Binoculars [Clip art]. Retrieved from https://openclipart.org/detail/170639/binoculars
Levis501 (2013). Magnifying Glass with Transparent Glass [Clip art]. Retrieved from
https://openclipart.org/detail/176296/magnifying-glass-with-transparent-glass
Lessig, L. (1998). The Architecture of Privacy: Draft 2. Retrieved from .
https://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf
LinkedIn. (n.d.). Join Now [image]. Retrieved from https://www.linkedin.com/reg/join?trk=hb_ft_join
LinkedIn. (n.d.). What Is LinkedIn ? Retrieved from https://www.linkedin.com/static?key=what_is_linkedin
LinkedIn. (n.d.). User Agreement. Retrieved from https://www.linkedin.com/legal/user-
agreement?trk=hb_ft_userag
LinkedIn. (n.d.). Your Privacy Matters. Retrieved from https://www.linkedin.com/legal/privacy-
policy?trk=hb_ft_priv
LinkedIn. (2014). Cookies on the LinkedIn site. Retrieved from https://www.linkedin.com/legal/cookie-policy
LinkedIn (2015). Be great at what you do: Get started – it’s free. Retrieved from https://www.linkedin.com/
Mav. (2012). Im-watching-u [Claip art]. Retrieved from https://openclipart.org/detail/168864/imwatchingu
Mestre-Kame. (2008). Alert red icon [Clip art]. Retrieved from https://openclipart.org/detail/20715/alert-red-
icon
Milanovic, R. (2015, April 13). The World's 21 Most Important Social Media Sites and Apps in 2015
[Weblog]. Retrieved from http://www.socialmediatoday.com/social-networks/2015-04-13/worlds-21-
most-important-social-media-sites-and-apps-2015
Palomaironique. (2010). Handshake with Black Outline (white man and woman) [Clip art]. Retrieved from
https://openclipart.org/detail/57085/handshake-with-black-outline-white-man-and-woman
Sivvus. (2009). Scales. Retrieve from https://openclipart.org/detail/26865/scales
Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation
of borders in cyberspace. First Monday, 11(1). Retrieved
from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307/1227
Zittrain, J. (2009, July 19). Lost in the Cloud. The New York Times. Retrieved from
http://www.nytimes.com/2009/07/20/opinion/20zittrain.html?tntemail1=y&_r=3&emc=tnt&pagewanted
=all

More Related Content

PDF
Digital magna carta privacy rights
PPTX
Update on Access to Digital Assets: Are We There Yet?
PPT
The Legal Implications of Social Media
PPT
Legal Implications Of Social Media
PPTX
Google Policy Primer
PPT
Tony Nadalin' presentation at eComm 2008
PPT
Social Media and Intellectual Property
PDF
Identity 101: Boot Camp for Identity North 2016
Digital magna carta privacy rights
Update on Access to Digital Assets: Are We There Yet?
The Legal Implications of Social Media
Legal Implications Of Social Media
Google Policy Primer
Tony Nadalin' presentation at eComm 2008
Social Media and Intellectual Property
Identity 101: Boot Camp for Identity North 2016

What's hot (20)

PDF
Social Media Privacy Laws and Legal Liabilities
PDF
My Identiverse: The Evolution of Digital Identity and Openness
PPTX
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
PDF
Google's Effort to Fight Content Piracy
PPTX
Social Media Law: The Legal Do's and Don'ts of Social Media
PPTX
Social media and intellectual property
DOCX
Why it's so hard for users to control their data
PDF
Domains of Identity
PDF
Using Social Media Ethically
PPT
Nytlegal #56866-v3-ona 2013-_ds_draft
PPTX
Team Lecture Presentation 2
PPTX
Chapter 8 Big Data and Privacy
PPTX
Cybertort Imp Slides For Pub. Internet
PDF
Data Ownership: Who Owns 'My Data'?
PPT
Personal Clouds + Augmented Reality
PPT
Personal Data Store Project
PPTX
Social Media and Estate Planning presented to Wayne State University Law Scho...
PDF
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
PDF
E commerce: Expanding Business Online
PDF
Hacking back in self defense
Social Media Privacy Laws and Legal Liabilities
My Identiverse: The Evolution of Digital Identity and Openness
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
Google's Effort to Fight Content Piracy
Social Media Law: The Legal Do's and Don'ts of Social Media
Social media and intellectual property
Why it's so hard for users to control their data
Domains of Identity
Using Social Media Ethically
Nytlegal #56866-v3-ona 2013-_ds_draft
Team Lecture Presentation 2
Chapter 8 Big Data and Privacy
Cybertort Imp Slides For Pub. Internet
Data Ownership: Who Owns 'My Data'?
Personal Clouds + Augmented Reality
Personal Data Store Project
Social Media and Estate Planning presented to Wayne State University Law Scho...
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
E commerce: Expanding Business Online
Hacking back in self defense
Ad

Viewers also liked (6)

PPTX
Net 213 Policy Primer
PPTX
Snapchat Policy Primer
PPTX
Online Policy Primer: Flickr Terms of Service
PDF
Net23 - Slideshare Policy Primer
PDF
Workshop Student 2.0 - Pauline Maas - SNRD16
PPTX
Workshop 'Big data' Simon Hania
Net 213 Policy Primer
Snapchat Policy Primer
Online Policy Primer: Flickr Terms of Service
Net23 - Slideshare Policy Primer
Workshop Student 2.0 - Pauline Maas - SNRD16
Workshop 'Big data' Simon Hania
Ad

Similar to NET 303: Online Policy Primer (20)

PPTX
Linked in policy primer mwilson
PPTX
Policy and primer linked in mwilson
PPTX
TLE 8 EAGLE Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
PPTX
TLE 8 EAGLE Q1WEEK 2.pptx PIS VIDEO EDITING
PPTX
Cyber Safety
PPTX
7 - DIGITAL FOOTPRINTS AND IDENTITY.pptx
PPTX
Policy primer net303 study period 3, 2017
PPTX
Social Computing – The Promise And The Perils Final
PDF
JS Fest 2019. Vitaly Friedman. Bringing Personality Back To The Web
PPTX
Linkedin policy primer
ODP
Matthew Hopkins Primer
PDF
LoginRadius Explores: The Evolution of Social Login
PDF
LoginRadius Explores the Future of Social Login
PPTX
Juliette van balen; sociale netwerken, juridische aspecten
PPTX
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
PPTX
Group 2 privacy and me in a web 2.0 world final
PPTX
Designing for Privacy in an Increasingly Public World
PPTX
information practices project by legend chaitanya upreti
PPTX
2ndnov_txicybersec& SAFETY.pptx
PPTX
Transacting PPT.pptx
Linked in policy primer mwilson
Policy and primer linked in mwilson
TLE 8 EAGLE Q1 WEEK 2.pOWERPOINT PRESENTATION LESSON
TLE 8 EAGLE Q1WEEK 2.pptx PIS VIDEO EDITING
Cyber Safety
7 - DIGITAL FOOTPRINTS AND IDENTITY.pptx
Policy primer net303 study period 3, 2017
Social Computing – The Promise And The Perils Final
JS Fest 2019. Vitaly Friedman. Bringing Personality Back To The Web
Linkedin policy primer
Matthew Hopkins Primer
LoginRadius Explores: The Evolution of Social Login
LoginRadius Explores the Future of Social Login
Juliette van balen; sociale netwerken, juridische aspecten
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Group 2 privacy and me in a web 2.0 world final
Designing for Privacy in an Increasingly Public World
information practices project by legend chaitanya upreti
2ndnov_txicybersec& SAFETY.pptx
Transacting PPT.pptx

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Lesson notes of climatology university.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
master seminar digital applications in india
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Classroom Observation Tools for Teachers
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Cell Structure & Organelles in detailed.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
01-Introduction-to-Information-Management.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Institutional Correction lecture only . . .
Abdominal Access Techniques with Prof. Dr. R K Mishra
human mycosis Human fungal infections are called human mycosis..pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
master seminar digital applications in india
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
GDM (1) (1).pptx small presentation for students
Classroom Observation Tools for Teachers
Module 4: Burden of Disease Tutorial Slides S2 2025
Cell Structure & Organelles in detailed.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
01-Introduction-to-Information-Management.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Anesthesia in Laparoscopic Surgery in India
Chapter 2 Heredity, Prenatal Development, and Birth.pdf

NET 303: Online Policy Primer

  • 1. An Analysis of LinkedIn’s Terms of Service By Angeline Hildreth Image uploaded from LinkedIn.com NET 303: Online Policy Primer
  • 2. This Online Policy Primer Presentation was written as part of an assignment for Bachelor of Arts (Internet communications) at Curtin University, Perth, WA. It has no association with LinkedIn or affiliation with LinkedIn. Every effort has been made to ensure the accuracy of the information. This presentation is for educational purposes only and not a substitute for legal advice. Please seek professional advice from a lawyer for any legal advice pertaining to legal issues. DISCLAIMER
  • 3. LinkedIn is a social media platform aimed at providing social networking to professionals. Image by GDJ (2015)
  • 4. It claims to be “The World’s largest professional network”. Image uploaded from LinkedIn.com
  • 5. The basic service is free to register. It also offers a premium service with a monthly fee. Image uploaded from LinkedIn.com
  • 6. Regardless of the type of service; whether it is free or fee paying, you need to join LinkedIn and become a member to use the service, though you can visit the web site and browse member’s profiles. By selecting ‘Join now’ you are agreeing to their Terms of Service (TOS or User Agreement), Privacy Policy and Cookie Policy. Image: uploaded from LinkedIn.com
  • 7. “If you have any concerns about …any manner permitted in this Privacy Policy and the User Agreement, you should not become a Member, visit our websites, apps or otherwise use our Services (LinkedIn, 2014).” What if you do not agree!
  • 8. What LinkedIn is saying is, if you do not agree then you should not use their service or visit their website. If you do, they will apply the clauses mentioned in their Terms of Agreement.
  • 9. Terms of Service is a legal contract between you and your chosen service provider. Image by Sivvus (2009) READ IT BEFORE YOU AGREE TO IT!
  • 10. LinkedIn’s policies contain a number of clauses relating to ownership, privacy, copyright, censorship which raise concerns and are worth a closer look. Image uploaded from LinkedIn.com Images: by Levis501 (2013)
  • 11. But how many of us have time to read through pages and pages of these complex documents before giving up and blindly agreeing to them? Image by Doodleguy (2014)Images uploaded from LinkedIn.com
  • 12. Image by Palomaironique (2010) In agreeing to LinkedIn Terms of Service, you are obligated to them to:  Be at least 14 years old in Australia and have no restriction to use their site. Provide them with your real name, email address and password. Agree to keep your information up to date. Give them non-exclusive license: transferrable and sub-licensable rights to your information.
  • 13. Image by Mestre-kame (2008) Your information is also collected by LinkedIn when you visit their website. “Our Privacy Policy applies to any Member or Visitor. We collect information when you use our Services to offer you a personalized and relevant experience, including growing your network and enabling business opportunities.” Visitors BEWARE
  • 14. These are just a few examples of what you have agreed to when joining LinkedIn. Let’s have a closer look at some areas you have agreed to.
  • 15. Image: Uploaded from LinkedIn .com “You own your content and are responsible for protecting your data. You are also required to give LinkedIn non-exclusive license to your data and the rights to retain your personal information, content of your posts. (LinkedIn, 2015).” Who owns the content?
  • 16. Simply put; the content and liabilities belong to you. LinkedIn has the rights to collect vast amounts of your information including information on people you associate with and your financial details for their benefit. Though, they claim to use the information for your benefit.
  • 17. COPYRIGHT “Please note that whether or not we disable access to or remove content, LinkedIn may make a good faith attempt to forward the written notification, including the complainant’s contact information, to the Member who posted the content and/or take other reasonable steps to notify the Member that LinkedIn has received notice of an alleged violation of intellectual property rights or other content violation.”
  • 18. But … LinkedIn takes no responsibility to stop others from copying your information.
  • 19. “ We collect information when you fill out a profile… – like your job title, education, and skills – helps you get found by other people for opportunities.” PRIVACY AND SURVEILLANCE
  • 20. Image by Mav (2012)Image by GDJ (2015) Basically, LinkedIn collects all of its member’s and visitor’s personal information and has user's detailed profiles at their fingertips. They also collect content from your email address book or calendar, your participations in various activities and the web sites or ads you clicked on. Your every move is monitored using Cookie Technology (Lessig, 1998: August,).
  • 21. LinkedIn use cookie technology to track your browsing habits both on theirs and other sites you visit (LinkedIn, 2014). Though they claim it is to enable and support their security features and to help them detect malicious activity and violations of their User Agreement (Harry, 2014).
  • 22. “We may use cookies to show you relevant advertising both on and off the LinkedIn site. We may also use a cookie to learn whether members who saw an ad on LinkedIn later visited the advertiser's site… We may also work with a partner to show you an ad on or off LinkedIn, such as after you've visited a partner's site or application (LinkedIn, 2014).” So, who do you think is really benefitting from cookie technologies here (Brown & Muchira, 2004, p. 66)!
  • 23. Image by Last-Dino (2012) “We also receive the internet protocol (“IP”) address of your computer or the proxy server that you use to access the web, your computer operating system details, your type of web browser, your mobile device (including your mobile device identifier provided by your mobile device operating system) … and the name of your ISP or your mobile carrier.” This is an invasion of privacy; DON’T YOU THINK (Zittrain, 2009; Goettke & Christiana, 2007)!
  • 24. LinkedIn does, and will exercise their authority to deny access and remove content/accounts without notifying you! They will do this if they deem you to have broken the agreement (Villeneuve, 2006). Who is the gatekeeper censoring our content and account?
  • 25. “If there is a change in control or sale of all or part of LinkedIn, we may share your information with a third party, who will have the right to use that information in line with this Privacy Policy.” Image: by Hatalar205 (2013)
  • 26. What this means is that you have unknowingly, as part of the agreement, given LinkedIn the right to sell your personal details as part of the company assets. Should they decide to sell the company, don’t expect a share of the capital gain. You won’t get any!
  • 27. “We may change this Privacy Policy from time to time. If we make significant changes in the way we treat your personal information, or to the Privacy Policy, we will provide notice to you on the Services or by some other means, such as email…Using our Services after a notice of changes has been communicated to you or published on our Services shall constitute consent to the changed terms or practices.” They can change the policy at any time. They may email you or publish the changes on their website. It is your responsibility to keep checking for changes for they may not email you the changes. The onus is put back on you!
  • 28. Knowing what you do now; would you try and read the Terms of Service before signing up to any of the internet platforms? I certainly would!
  • 29. Reference August, O. (2007). The Great Firewall: China's Misguided - and Futile - Attempt to Control What Happens Online. Wired, 15(11). Retrieved from https://web.archive.org/web/20080626074423/http://www.wired.com/politics/security/magazine/15- 11/ff_chinafirewall?currentPage=1 Brown, M., & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concern and Online Purchase Behavior. Journal of Electronic Commerce Research, 591, 62-70. Retrieved from http://www.csulb.edu/web/journals/jecr/issues/20041/Paper6.pdf Doodleguy. (2014). Man Giving Up [Clip art]. Retrieved from https://openclipart.org/detail/211086/man- resigning EbizMBA. (n.d.). Top 15 Most Popular Websites-October 2015 [Blog post]. Retrieved from http://www.ebizmba.com/articles/most-popular-websites Ernes. (2008). Lente – magnifying glass [Clip art]. Retrieved from https://openclipart.org/search/?query=magnifying%20glass&page=2 GDJ. (2015). Social Media 2 [Clip art]. Retrieved from https://openclipart.org/detail/227111/social-media-2 GDJ. (2015). Professional People Silhouette [image]. Retrieved from https://openclipart.org/detail/226095/professional-people-silhouette Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in Computer Science Computation and Society: Privacy and Technology. Available: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf
  • 30. Goettke, R., & Christiana, J. (2007). Privacy and Online Social Networking Websites. Computer Science 199r: Special Topics in Computer Science Computation and Society: Privacy and Technology. Available: http://www.eecs.harvard.edu/cs199r/fp/RichJoe.pdf Harry, S. (2014). Everyone Watches, Nobody Sees: How Black Women Disrupt Surveillance Theory. Model View Culture. Retrieved from https://modelviewculture.com/pieces/everyone-watches-nobody-sees-how- black-women-disrupt-surveillance-theory Hatalar205. (2013). Bell [Clip art]. Retrieved from https://openclipart.org/detail/177231/bell Last-Dina. (2012). Binoculars [Clip art]. Retrieved from https://openclipart.org/detail/170639/binoculars Levis501 (2013). Magnifying Glass with Transparent Glass [Clip art]. Retrieved from https://openclipart.org/detail/176296/magnifying-glass-with-transparent-glass Lessig, L. (1998). The Architecture of Privacy: Draft 2. Retrieved from . https://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf LinkedIn. (n.d.). Join Now [image]. Retrieved from https://www.linkedin.com/reg/join?trk=hb_ft_join LinkedIn. (n.d.). What Is LinkedIn ? Retrieved from https://www.linkedin.com/static?key=what_is_linkedin LinkedIn. (n.d.). User Agreement. Retrieved from https://www.linkedin.com/legal/user- agreement?trk=hb_ft_userag LinkedIn. (n.d.). Your Privacy Matters. Retrieved from https://www.linkedin.com/legal/privacy- policy?trk=hb_ft_priv LinkedIn. (2014). Cookies on the LinkedIn site. Retrieved from https://www.linkedin.com/legal/cookie-policy
  • 31. LinkedIn (2015). Be great at what you do: Get started – it’s free. Retrieved from https://www.linkedin.com/ Mav. (2012). Im-watching-u [Claip art]. Retrieved from https://openclipart.org/detail/168864/imwatchingu Mestre-Kame. (2008). Alert red icon [Clip art]. Retrieved from https://openclipart.org/detail/20715/alert-red- icon Milanovic, R. (2015, April 13). The World's 21 Most Important Social Media Sites and Apps in 2015 [Weblog]. Retrieved from http://www.socialmediatoday.com/social-networks/2015-04-13/worlds-21- most-important-social-media-sites-and-apps-2015 Palomaironique. (2010). Handshake with Black Outline (white man and woman) [Clip art]. Retrieved from https://openclipart.org/detail/57085/handshake-with-black-outline-white-man-and-woman Sivvus. (2009). Scales. Retrieve from https://openclipart.org/detail/26865/scales Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday, 11(1). Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307/1227 Zittrain, J. (2009, July 19). Lost in the Cloud. The New York Times. Retrieved from http://www.nytimes.com/2009/07/20/opinion/20zittrain.html?tntemail1=y&_r=3&emc=tnt&pagewanted =all