IEEE Technology and Society Magazine - June 2016 - 80

and went public in 2013 [36]. The company is now
worth over 10 billion dollars and has 230 million active
users per month [36].
Twitter takes a different approach to privacy than its
other social media counterparts. Twitter assumes that
any information posted on their service is information
the individual wishes to make public. As such, Twitter
collects nearly any type of information possible to gen-
erate using their platform. For a complete summary of
the information that Twitter collects see Table 1. All
information on profiles, tweets, people followed,
retweets, favorites, the user's name, and username is
considered public by default. Twitter only allows the
option to keep one-on-one messages private [51]. All
meta-data generated by the user can also be accessed
easily by third parties using the Twitter application pro-
graming interface (API), which Twitter makes available
to universities and other institutions that conduct
research. Accessible information can include the user's
Internet Protocol (IP) address and his/her location. Twit-
ter reserves the right to share all information within the
company as well as with third parties in order to use tar-
geted advertising, improve their services, and comply
with law enforcement agencies [51].
Twitter will disclose any information to law enforce-
ment as long as they believe it is necessary to comply
with the law/regulation; protect persons from harm and
their rights; protect the rights and property of Twitter;
and to prevent fraud, technical, and security issues [51].
Cookies are used on Twitter to collect information
about user's browsing habits when not active on the
Twitter platform, as well as to track what links are
clicked in relation to advertisements. However, cookies
are not required as part of Twitter with many services
still functioning properly if the user decides to disable
them [51]
There is no mention in Twitter's policy of security
measures used to protect the user's data. This could
possibly be because Twitter is public by default, and
they do not feel there is a need to invest in forms of
information security. The user has some control over
making certain aspects of their profile private, however,
there is not any opt-out function in regards to the data
that Twitter collects [51]. The best practice for this plat-
form is to abstain from sharing information that is
deemed private. The user is given the option to disable
their account. If a user decides to disable their account
they have 30 days to reinstate it before Twitter starts to
process of deleting the account which can take up to
seven days [51]. After the account is deleted, tweets
could still be accessed through search engines and
other third parties if they saved the account informa-
tion. There is no guarantee that the information will ever
truly be deleted.

80

Analysis of Privacy Policies
The privacy policies of each web platform discussed are
extensive and have a few areas that are relatively the
same. Each privacy policy has a section on data collec-
tion, data storage, use of collected data, data sharing,
law enforcement, and account deletion. In addition to
these main areas, each platform has a separate policy
dedicated to the use of cookies. For the most part the
sections on law enforcement and cookies do not devi-
ate much from platform to platform. The platforms do
vary on other aspects of the privacy policies. There are
minor differences in how the privacy policies address
information storage and account deletion. The major dif-
ferences in the privacy policies are found in data collec-
tion, sharing of data, and data security.

Data Collection
Each web platform collects data on the device used by
the user, user location, and information used in account
creation. This data collection breaks down to the user's
IP address, general location (city, state, and country),
email address, name, birthdate, type of computer, oper-
ating system, and web browser. Beyond those basic ele-
ments each privacy policy varies widely on the specific
data they collect. Part of this is due to each platform
having its own uses and expectations by the users. How-
ever, every platform uses the same three main methods
of collecting user information: registration, user IP
address trace, and search track recording cookies [5].
We found that the platform that collects the largest
variety of data is Facebook. Facebook collects every
piece of information that the user posts on the site, any
information posted about that user, payment informa-
tion, and also stretches to collect information about
their general Internet usage. Since the main purpose of
Facebook is social networking, the type of information
that the user posts can vary widely and is likely to
include potentially stigmatizing information [52]. Cur-
rently Facebook has the largest membership of all of
the platforms discussed, with users disclosing in depth
details of their lives. These circumstances make it pos-
sible that Facebook could also be collecting the largest
amount of data of any platform discussed here.
Even though Google's privacy policy covers all of
their web platforms, they collect the least amount of
information. Google has two different social media plat-
forms, Google+ and YouTube. Google+'s adoption has
not been nearly as widespread as the other web plat-
forms and consequently there is less information there
to collected [43]. YouTube would allow for a large
amount of data collection, but Google does not collect
user generated content unlike all of the other web plat-
forms discussed. The majority of data that Google col-
lects originates from its main function: search. Google

IEEE Technology and Society Magazine

∕

june 2016



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - June 2016

IEEE Technology and Society Magazine - June 2016 - Cover1
IEEE Technology and Society Magazine - June 2016 - Cover2
IEEE Technology and Society Magazine - June 2016 - 1
IEEE Technology and Society Magazine - June 2016 - 2
IEEE Technology and Society Magazine - June 2016 - 3
IEEE Technology and Society Magazine - June 2016 - 4
IEEE Technology and Society Magazine - June 2016 - 5
IEEE Technology and Society Magazine - June 2016 - 6
IEEE Technology and Society Magazine - June 2016 - 7
IEEE Technology and Society Magazine - June 2016 - 8
IEEE Technology and Society Magazine - June 2016 - 9
IEEE Technology and Society Magazine - June 2016 - 10
IEEE Technology and Society Magazine - June 2016 - 11
IEEE Technology and Society Magazine - June 2016 - 12
IEEE Technology and Society Magazine - June 2016 - 13
IEEE Technology and Society Magazine - June 2016 - 14
IEEE Technology and Society Magazine - June 2016 - 15
IEEE Technology and Society Magazine - June 2016 - 16
IEEE Technology and Society Magazine - June 2016 - 17
IEEE Technology and Society Magazine - June 2016 - 18
IEEE Technology and Society Magazine - June 2016 - 19
IEEE Technology and Society Magazine - June 2016 - 20
IEEE Technology and Society Magazine - June 2016 - 21
IEEE Technology and Society Magazine - June 2016 - 22
IEEE Technology and Society Magazine - June 2016 - 23
IEEE Technology and Society Magazine - June 2016 - 24
IEEE Technology and Society Magazine - June 2016 - 25
IEEE Technology and Society Magazine - June 2016 - 26
IEEE Technology and Society Magazine - June 2016 - 27
IEEE Technology and Society Magazine - June 2016 - 28
IEEE Technology and Society Magazine - June 2016 - 29
IEEE Technology and Society Magazine - June 2016 - 30
IEEE Technology and Society Magazine - June 2016 - 31
IEEE Technology and Society Magazine - June 2016 - 32
IEEE Technology and Society Magazine - June 2016 - 33
IEEE Technology and Society Magazine - June 2016 - 34
IEEE Technology and Society Magazine - June 2016 - 35
IEEE Technology and Society Magazine - June 2016 - 36
IEEE Technology and Society Magazine - June 2016 - 37
IEEE Technology and Society Magazine - June 2016 - 38
IEEE Technology and Society Magazine - June 2016 - 39
IEEE Technology and Society Magazine - June 2016 - 40
IEEE Technology and Society Magazine - June 2016 - 41
IEEE Technology and Society Magazine - June 2016 - 42
IEEE Technology and Society Magazine - June 2016 - 43
IEEE Technology and Society Magazine - June 2016 - 44
IEEE Technology and Society Magazine - June 2016 - 45
IEEE Technology and Society Magazine - June 2016 - 46
IEEE Technology and Society Magazine - June 2016 - 47
IEEE Technology and Society Magazine - June 2016 - 48
IEEE Technology and Society Magazine - June 2016 - 49
IEEE Technology and Society Magazine - June 2016 - 50
IEEE Technology and Society Magazine - June 2016 - 51
IEEE Technology and Society Magazine - June 2016 - 52
IEEE Technology and Society Magazine - June 2016 - 53
IEEE Technology and Society Magazine - June 2016 - 54
IEEE Technology and Society Magazine - June 2016 - 55
IEEE Technology and Society Magazine - June 2016 - 56
IEEE Technology and Society Magazine - June 2016 - 57
IEEE Technology and Society Magazine - June 2016 - 58
IEEE Technology and Society Magazine - June 2016 - 59
IEEE Technology and Society Magazine - June 2016 - 60
IEEE Technology and Society Magazine - June 2016 - 61
IEEE Technology and Society Magazine - June 2016 - 62
IEEE Technology and Society Magazine - June 2016 - 63
IEEE Technology and Society Magazine - June 2016 - 64
IEEE Technology and Society Magazine - June 2016 - 65
IEEE Technology and Society Magazine - June 2016 - 66
IEEE Technology and Society Magazine - June 2016 - 67
IEEE Technology and Society Magazine - June 2016 - 68
IEEE Technology and Society Magazine - June 2016 - 69
IEEE Technology and Society Magazine - June 2016 - 70
IEEE Technology and Society Magazine - June 2016 - 71
IEEE Technology and Society Magazine - June 2016 - 72
IEEE Technology and Society Magazine - June 2016 - 73
IEEE Technology and Society Magazine - June 2016 - 74
IEEE Technology and Society Magazine - June 2016 - 75
IEEE Technology and Society Magazine - June 2016 - 76
IEEE Technology and Society Magazine - June 2016 - 77
IEEE Technology and Society Magazine - June 2016 - 78
IEEE Technology and Society Magazine - June 2016 - 79
IEEE Technology and Society Magazine - June 2016 - 80
IEEE Technology and Society Magazine - June 2016 - 81
IEEE Technology and Society Magazine - June 2016 - 82
IEEE Technology and Society Magazine - June 2016 - 83
IEEE Technology and Society Magazine - June 2016 - 84
IEEE Technology and Society Magazine - June 2016 - 85
IEEE Technology and Society Magazine - June 2016 - 86
IEEE Technology and Society Magazine - June 2016 - 87
IEEE Technology and Society Magazine - June 2016 - 88
IEEE Technology and Society Magazine - June 2016 - Cover3
IEEE Technology and Society Magazine - June 2016 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com