education new york online education new york online education new york online
Today's Info Policy News
Weekly Archive
Information Policy
Protecting your children's privacy: The Facts
contact us
site map
With the exact phrase
With all of the words
With at least one of the words
Without these words
Within these fields         
Date range limit

      Pick Date
Item(s) found: 47
Illinois RIght to Privacy in the School Setting Act
Date CapturedThursday October 23 2014, 12:27 AM
Privacy management on social media sites
Date CapturedWednesday April 04 2012, 3:10 PM
Mary Madden Senior Research Specialist, Pew Internet Project: Most users choose restricted privacy settings while profile “pruning” and unfriending people is on the rise.
ACLU: Social Networking, your privacy rights explained
Date CapturedThursday March 08 2012, 9:05 AM
The vast majority of young people living in the United States go online daily and use social networking sites like Twitter, Facebook and YouTube. With all this information-sharing, many questions about ownership of personal information and possible discipline for postings arise. This guide will answer some of those questions so that you can better understand the rights you have when using social networking both in and out of school.
Social Media: Federal Agencies Need Policies and Procedures for Managing and Protecting Information They Access and Disseminate
Date CapturedThursday July 28 2011, 6:51 PM
Federal agencies increasingly use recently developed Internet technologies that allow individuals or groups to create, organize, comment on, and share online content. The use of these social media services-- including popular Web sites like Facebook, Twitter, and YouTube-- has been endorsed by President Obama and provides opportunities for agencies to more readily share information with and solicit feedback from the public. However, these services may also pose risks to the adequate protection of both personal and government information. GAO was asked to (1) describe how federal agencies are currently using commercially provided social media services and (2) determine the extent to which agencies have developed and implemented policies and procedures for managing and protecting information associated with this use. To do this, GAO examined the headquarters-level Facebook pages, Twitter accounts, and YouTube channels of 24 major federal agencies; reviewed pertinent policies, procedures, and guidance; and interviewed officials involved in agency use of social media. Agency: Department of Education; Records management: Document processes and policies and record-keeping roles and responsibilities for how social media records are identified and managed: Did not develop policies and procedures for use of social media services; Privacy protection: Update privacy policy to discuss use of PII made available through social media: Did not develop policies and procedures for use of social media services; Privacy protection: Conduct privacy impact assessment for social media use: Developed policies and procedures that guided use of some but not all services; Security risk management: Identify security risks associated with agency use of social media and security controls to mitigate risks: Did not develop policies and procedures for use of social media services. ***** Appendix IX: Comments from the Department of Education:
FERPA and Social Media
Date CapturedThursday March 10 2011, 2:50 PM
When students are assigned to post information to public social media platforms outside of the university LMS, they should be informed that their material may be viewed by others. Students should not be required to release personal information on a public site. Instructor comments or grades on student material should not be made public. (Interestingly, grades given by other students on “peer-graded” work can be made public under FERPA). (ACE, 2008) While not clearly required by law, students under the age of 18 should get their parent’s consent to post public work. FERPA does not forbid instructors from using social media in the classroom, but common sense guidelines should be used to ensure the protection of students.
The effect of Twitter on college student engagement and grades
Date CapturedSaturday February 12 2011, 9:17 PM
R. Junco,G. Heiberger & E. Loken; This study provides the first piece of controlled experimental evidence that using Twitter in educationally relevant ways can increase student engagement and improve grades, and thus, that social media can be used as an educational tool to help students reach desired college outcomes. We provided evidence to suggest that students and faculty were both highly engaged in the learning process through communication and connec- tions on Twitter. As there is continuing growth in the use of social media by college students and faculty, it is hoped that this study will motivate further controlled studies of Twitter and other social media to evaluate how emerging technologies can be best used in educational settings and to tease out the variance between the effects of the actual technology and of the ‘Web 2.0 mentality.’
8% of online Americans use Twitter
Date CapturedThursday December 09 2010, 3:39 PM
Pew Research Center’s Internet & American Life Project -- by Aaron Smith, Lee Rainie: [Eight percent of the American adults who use the internet are Twitter users. It is an online activity that is particularly popular with young adults, minorities, and those who live in cities.]
Online Privacy: What Does It Mean to Parents and Kids?
Date CapturedFriday October 08 2010, 2:07 PM
Zogby International conducted a poll for Common Sense Media, asking both teens and parents about their views of online privacy and how they feel their personal information is being used by websites, social networks, and other online platforms.
On the Leakage of Personally Identi?able Information Via Online Social Networks
Date CapturedWednesday June 02 2010, 10:01 PM
Balachander Krishnamurthy and Craig E. Wills - [Abstract For purposes of this paper, we de?ne “Personally identi?- able information” (PII) as information which can be used to distinguish or trace an individual’s identity either alone or when combined with other information that is linkable to a speci?c individual. The popularity of Online Social Net- works (OSN) has accelerated the appearance of vast amounts of personal information on the Internet. Our research shows that it is possible for third-parties to link PII, which is leaked via OSNs, with user actions both within OSN sites and else- where on non-OSN sites. We refer to this ability to link PII and combine it with other information as “leakage”. We have identi?ed multiple ways by which such leakage occurs and discuss measures to prevent it.]
Reputation Management and Social Media
Date CapturedSunday May 30 2010, 6:57 PM
by Mary Madden, Aaron Smith - May 26, 2010 -- Pew Internet and American Life Project -- [When compared with older users, young adults are more likely to restrict what they share and whom they share it with. “Contrary to the popular perception that younger users embrace a laissez-faire attitude about their online reputations, young adults are often more vigilant than older adults when it comes to managing their online identities,” said Madden. ]
A Bill of Privacy Rights for Social Network Users Commentary-- by Kurt Opsahl
Date CapturedThursday May 20 2010, 1:07 AM
EFF -- [Social network services must ensure that users have ongoing privacy and control over personal information stored with the service. Users are not just a commodity, and their rights must be respected. Innovation in social network services is important, but it must remain consistent with, rather than undermine, user privacy and control. Based on what we see today, therefore, we suggest three basic privacy-protective principles that social network users should demand: #1: The Right to Informed Decision-Making, #2: The Right to Control, #3: The Right to Leave.]
FACEBOOK - Complaint, Request for Investigation, Injunction, and Other Relief
Date CapturedMonday May 10 2010, 9:54 AM
[This complaint concerns material changes to privacy settings made by Facebook, the largest social network service in the United States, that adversely impact the users of the service. Facebook now discloses personal information to the public that Facebook users previously restricted. Facebook now discloses personal information to third parties that Facebook users previously did not make available. These changes violate user expectations, diminish user privacy, and contradict Facebook’s own representations. These business practices are Unfair and Deceptive Trade Practices, subject to review by the Federal Trade Commission (the “Commission”) under section 5 of the Federal Trade Commission Act.]
FACEBOOK privacy policy link:
Date CapturedMonday April 26 2010, 8:32 PM
Facebook’s Privacy Policy. This policy contains eight sections: 1. Introduction; 2. Information We Receive; 3. Information You Share With Third Parties; 4. Sharing Information on Facebook; 5. How We Use Your Information; 6. How We Share Information; 7. How You Can View, Change, or Remove Information; 8. How We Protect Information; 9. Other Terms.
FACEBOOK privacy policy link:
Date CapturedMonday April 26 2010, 8:32 PM
Facebook’s Privacy Policy. This policy contains eight sections: 1. Introduction; 2. Information We Receive; 3. Information You Share With Third Parties; 4. Sharing Information on Facebook; 5. How We Use Your Information; 6. How We Share Information; 7. How You Can View, Change, or Remove Information; 8. How We Protect Information; 9. Other Terms.
How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies?
Date CapturedThursday April 15 2010, 6:12 PM
Chris Jay Hoofnagle - University of California, Berkeley - School of Law, Berkeley Center for Law & Technology; Jennifer King -UC Berkeley School of Information; Berkeley Center for Law & Technology; Su Li- University of California, Berkeley- School of Law, Center for the Study of Law and Society; Joseph Turow - University of Pennsylvania - Annenberg School for Communication: [Abstract: Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators therefore claim that young people “are less concerned with maintaining privacy than older people are.” Surprisingly, though, few empirical investigations have explored the privacy attitudes of young adults. This report is among the first quantitative studies evaluating young adults’ attitudes. It demonstrates that the picture is more nuanced than portrayed in the popular media. ] [Among the findings: _ Eighty-eight percent of people of all ages said they have refused to give out information to a business because they thought it was too personal or unnecessary. Among young adults, 82 percent have refused, compared with 85 percent of those over 65. _ Most people — 86 percent — believe that anyone who posts a photo or video of them on the Internet should get their permission first, even if that photo was taken in public. Among young adults 18 to 24, 84 percent agreed — not far from the 90 percent among those 45 to 54. _ Forty percent of adults ages 18 to 24 believe executives should face jail time if their company uses someone's personal information illegally — the same as the response among those 35 to 44 years old.]
Facebook users lose privacy to developers when they add new applications
Date CapturedThursday April 01 2010, 8:20 PM
NY Daily News - ROSEMARY BLACK - [How much can strangers find out about you on Facebook? Maybe more than you think. Thousands of Facebook-approved developers that come up with quizzes, games and other applications are able to gain basic information about a user, CNN reports. It’s possible when a Facebook friend starts to use the developer’s app, CNN reports. And while Facebook offers instructions on how users can hide personal information from outside applications, users don’t necessarily understand how to do this, according to some observers.]
FACEBOOK: Another Step in Open Site Governance
Date CapturedThursday April 01 2010, 4:42 PM
Michael Richter - Friday, March 26, 2010 at 12:04pm - [We're proposing another set of revisions to our Privacy Policy and Statement of Rights and Responsibilities to make way for some exciting new products we're contemplating. Not all of these products have been finalized and many aren't yet built at all. However, we've definitely identified some interesting opportunities to improve the way you share and connect with the people and things in your life. ]
Free Speech Coalition v. Holder
Date CapturedSunday March 07 2010, 6:12 PM
Electronic Frontier Foundation (EFF) has filed a friend-of-the-court brief urging a federal court judge to block two criminal statutes that unconstitutionally limit the free expression of millions of adults who use the Internet and other electronic forms of communication, bringing the threat of criminal sanctions for private, lawful speech. At issue are provisions of federal law that require anyone who produces a visual depiction of sexually explicit expression to maintain extensive records -- including copies of drivers' licenses, the dates and times images were taken, and all URLs where images were posted -- and often force public disclosure of a creator's home address. Even more troubling, the regulations allow law enforcement warrantless entry into homes or offices in order to inspect the records that are supposed to be kept. While these statutes regulate the commercial pornography industry, they also likely apply to a staggering number of Americans who create and share images of themselves over social networks, online dating services, personal erotic websites, and text messaging. The current implementation of 18 U.S.C. § 2257 unconstitutionally encroaches on the free expression of a staggering number of Americans. Section 2257, which originally targeted producers of child pornography by creating a rebuttable presumption that an individual depicted in sexually explicit expression was a minor in a child pornography prosecution if the producer did not maintain records, has been amended to expand its scope such that it now applies to individual photographers and videographers who create and publish sexual content for personal and non-commercial purposes.1 As a result, the use of social networking applications, dating profiles, personal erotic websites, sexual text messaging and other forms of adult expression are burdened by onerous recordkeeping requirements of which most speakers are likely not even aware. The price of failure to comply is potential criminal penalties and significant prison time.
FTC Probes Facebook's EPIC Privacy Fail
Date CapturedThursday January 21 2010, 8:44 AM
Media Post -- Wendy Davis writes - [In addition, a Facebook employee allegedly said recently that users' messages are stored in a database regardless of whether users attempt to delete them. "We track everything. Every photo you view, every person you're tagged with, every wall-post you make, and so forth," the employee allegedly added. EPIC alleges that these public statements demonstrate that Facebook engages in unfair and deceptive trade practices. The new filing also questions a new iPhone synching feature that transfers users' iPhone contacts to Facebook, even when the phone contacts are not Facebook friends with the users.]
Facebook fights back, disallows the Suicide Machine
Date CapturedThursday January 07 2010, 8:17 PM
Los Angeles Times reports - [The Suicide Machine is a clever Web site out of the Netherlands that was designed to free users from their social network lives on Facebook, Twitter, MySpace and LinkedIn. You just pick one of the networks, start up the machine, and it graphically shows you unfriending your contacts, one by one, and eliminating all your other contacts with your profile. Forever.]
Teens and Sexting
Date CapturedMonday December 21 2009, 9:39 AM
Pew Internet -- Amanda Lenhart, Senior Research Specialist -- December 15, 2009. [Overview In a nationally representative survey of those ages 12-17 conducted on landline and cell phones, the Pew Research Center’s Internet & American Life Project found: • 4% of cell-owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images of themselves to someone else via text messaging • 15% of cell-owning teens ages 12-17 say they have received sexually suggestive nude or nearly nude images of someone they know via text messaging on their cell phone. • Older teens are much more likely to send and receive these images; 8% of 17-year-olds with cell phones have sent a sexually provocative image by text and 30% have received a nude or nearly nude image on their phone. • The teens who pay their own phone bills are more likely to send “sexts”: 17% of teens who pay for all of the costs associated with their cell phones send sexually suggestive images via text; just 3% of teens who do not pay for, or only pay for a portion of the cost of the cell phone send these images. • Our focus groups revealed that there are three main scenarios for sexting: 1) exchange of images solely between two romantic partners; 2) exchanges between partners that are shared with others outside the relationship and 3) exchanges between people who are not yet in a relationship, but where at least one person hopes to be.]
Two German Killers Demanding Anonymity Sue Wikipedia’s Parent
Date CapturedFriday November 13 2009, 6:29 PM
NYT John Schwartz writes [ Wolfgang Werlé and Manfred Lauber became infamous for killing a German actor in 1990. Now they are suing to force Wikipedia to forget them. The legal fight pits German privacy law against the American First Amendment. German courts allow the suppression of a criminal’s name in news accounts once he has paid his debt to society, noted Alexander H. Stopp, the lawyer for the two men, who are now out of prison.]
Facebook to modify its privacy guidelines
Date CapturedSaturday August 22 2009, 6:55 PM
By Matt Hartley, Financial Post [Facebook Inc. says it's on the same page as Canada's top privacy watchdog and plans to tweak its privacy and security policies to bring the world's largest social network in line with Canadian privacy law.]
The Obama Administration’s Silence on Privacy
Date CapturedWednesday June 03 2009, 7:03 PM
By Saul Hansell [Peter Swire, an Ohio State law professor who served on the Obama transition team, offered one reason it might be difficult for the administration to find its voice on privacy. There is a split, he told the conference, between the typical view of privacy among technology experts and the emerging view of people brought up in the social networking, Web 2.0 world. “The Web 2.0 movement is opposed to the privacy movement,” he said. Traditionally, privacy advocates have pushed for a policy of “data minimization,” he argued. The less information kept about people, this theory goes, the less there is for government or corporations to use to hurt individuals. The new ideology revolves around what Mr. Swire called “data empowerment.” People assemble and control information about themselves through online social networking and other sites. And access to data can create political and social movements, just as volunteers met each other and organized during the Obama presidential campaign.]
A Facebook ‘Bug’ Revealed Personal E-mail Addresses
Date CapturedThursday May 07 2009, 7:12 PM
NY Times -- Gadget -- Riva Richmond [“In the course of one day I had Facebook go through over 10,000 e-mail addresses; ranging from reporters of prominent newspapers and CNN, to board of directors of Microsoft, Google, and Gates Foundation, and even the entire staff directories of government organizations and the World Bank,” Mr. Sheppard said in an e-mail message to a New York Times editor. “Of those it did find on Facebook, over 30% had their personal email addresses listed, which Facebook gladly gave me, without any of [the Facebook users] knowing.”]
Facebook Makes Another Privacy Blooper
Date CapturedThursday May 07 2009, 6:58 PM
Daily Examiner -- Wendy Davis - [Regardless of whether Facebook broke the law, users likely aren't going to be thrilled to learn that the site believes it can censor messages. If the company wants to be taken seriously as a communications platform, executives are going to have to start giving more consideration to users' privacy rights. ]
MySpace Musings Aren't Private, Appeals Court Rules
Date CapturedMonday April 06 2009, 8:32 PM
Mike McKee - The Recorder - April 6, 2009 [Moreno, a University of California at Berkeley student at the time, posted her "Ode to Coalinga" on her MySpace page fresh after visiting the town of 19,000 residents off Interstate 5 midway between Sacramento and Los Angeles. She began by saying "the older I get, the more I realize how much I despise Coalinga," and then made several negative comments about the town and its inhabitants. The entry was posted only six days, but that was long enough for Roger Campbell, principal of Coalinga High School, to find the ode and forward it to Pamela Pond, editor of the Coalinga Record. The ode was published in the newspaper's letters section.]
Why privacy plays a part in social network's fiscal future
Date CapturedWednesday April 01 2009, 4:26 PM
By C.g. Lynch , CIO , 04/01/2009 [The common assumption that social networking users don't care about privacy is misguided. The majority of people who use social networks (nearly 60 percent or more) have already modified their privacy settings, according to two separate research studies from the Pew Internet & American Life Project and School of Information and Library Science. Furthermore, privacy experts warn that an unfortunate (but perhaps inevitable) security breach that exposes user data over social networks in the coming years could cause a privacy tipping point in which users push back in a more substantive and widespread way.]
LinkedIn Privacy Settings: What You Need to Know
Date CapturedMonday March 23 2009, 4:11 PM
IT World --C.G. Lynch [Since LinkedIn doesn't require you to share the same types of personal information as you do on Facebook, the service's privacy settings appear to be much more straightforward than its less business-oriented competitor. But if you leave the default settings in place, you might be surprised to know what information you make public on LinkedIn.]
Facebook Bug Reveals Private Photos, Wall Posts
Date CapturedSaturday March 21 2009, 12:52 PM
Washington Post Jason Kincaid (with HT to Anjool) writes [This isn't the first privacy bug to affect Facebook - users have previously been able to access private photos and view private profile information in search results. The error also serves as yet another blemish on the privacy controls of web-based services. Only two weeks ago, Google Docs revealed that it had inadvertently shared thousands of documents with users who should not have had access to them.]
Date CapturedThursday February 26 2009, 6:07 PM
Associate Director John B. Horrigan (202-419-4500) - September 2008 - Pew/Internet - [Convenience and flexibility are the watchwords for those who engage in cloud computing activities: 51% of internet users who have done a cloud computing activity say a major reason they do this is that it is easy and convenient. 41% of cloud users say a major reason they use these applications is that they like being able to access their data from whatever computer they are using. 39% cite the ease of sharing information as a major reason they use applications in cyberspace or store data there. At the same time, users report high levels of concern when presented with scenarios in which companies may put their data to uses of which they may not be aware. 90% of cloud application users say they would be very concerned if the company at which their data were stored sold it to another party. 80% say they would be very concerned if companies used their photos or other data in marketing campaigns. 68% of users of at least one of the six cloud applications say they would be very concerned if companies who provided these services analyzed their information and then displayed ads to them based on their actions.]
Date CapturedWednesday February 18 2009, 8:45 AM
NY Post publishes AP story: -- ["FACEBOOK INFO FUROR" -- Tens of thousands of Facebook users are protesting new policies that they say grant the social-networking site the ability to control their information forever, even after they cancel their accounts. Facebook's new terms of use, updated Feb. 4, largely went unnoticed until the popular consumer-rights advocacy blog pointed out the changes Sunday.]
Twitter and status updating
Date CapturedThursday February 12 2009, 6:13 PM
Pew Internet - Amanda Lenhart and Susannah Fox -- [As of December 2008, 11% of online American adults said they used a service like Twitter or another service that allowed them to share updates about themselves or to see the updates of others.] [The use of Twitter is highly intertwined with the use of other social media; both blogging and social network use increase the likelihood than an individual also uses Twitter. Twitter users and status updaters are also a mobile bunch; as a group they are much more likely to be using wireless technologies -- laptops, handhelds and cell phones -- for internet access, or cell phones for text messaging. Overall, Twitter users engage with news and own technology at the same rates as other internet users, but the ways in which they use the technology -- to communicate, gather and share information -- reveals their affinity for mobile, untethered and social opportunities for interaction. Moreover, Twitter as an application allows for and enhances these opportunities, so it is not so surprising that users would engage in these kinds of activities and also be drawn to an online application that expands those opportunities]
Quinn Emanuel Brochure Spills Value of Confidential Facebook Settlement
Date CapturedWednesday February 11 2009, 7:17 PM
The Reporter - Zusha Elinson -- [Facebook paid the founders of ConnectU $65 million to settle lawsuits accusing Facebook CEO Mark Zuckerberg of stealing the idea for the wildly successful social-networking Web site, according to a law firm's marketing brochure. Lawyers in the heavyweight fight had expended great effort to keep the settlement secret -- even going as far as persuading a judge to clear the courtroom of reporters on one occasion. But ConnectU's former lawyers from Quinn Emanuel Urquhart Oliver & Hedges published the settlement amount in a firm advertisement trumpeting the firm's prowess.] [The ConnectU dispute got started at Harvard, where ConnectU's founders, Cameron and Tyler Winklevoss and Divya Narendra hired fellow student Zuckerberg to work on code for a dating Web site for Harvard students. They sued Facebook in 2004, accusing Zuckerberg of delaying the project while using the information to start his own Web site. He quit Harvard and moved to Palo Alto, Calif., to start the company. ConnectU's lawyers argued that it amounted to trade secret theft and copyright infringement. Last February, Facebook agreed to settle the matter by paying to acquire ConnectU.]
Enhancing Child Safety and Online Technologies
Date CapturedTuesday January 27 2009, 5:45 PM
The Internet Safety Technical Task Force was created in February 2008 in accordance with the Joint Statement on Key Principles of Social Networking Safety announced in January 2008 by the Attorneys General Multi-State Working Group on Social Networking and MySpace. The scope of the Task Force's inquiry was to consider those technologies that industry and end users - including parents - can use to help keep minors safer on the Internet.
Health care meets social networking
Date CapturedThursday January 22 2009, 3:59 PM
Jacksonville Business Journal - Kimberly Morrison -- [Mayo Clinic, which has a campus in Jacksonville, has come a long way in just a few years, since adding a Facebook page with more than 3,000 friends, a YouTube channel with videos of doctors talking about illness, treatments and research, a health blog for consumers and another for media to improve the process of medical reporting. It’s also creating “secret groups” on Facebook to connect patients to others with similar illnesses, an area it hopes to expand in the future. But that’s just the tip of the iceberg in the brave new world of Health 2.0.]
Bullies Worse than Predators On Social Networks
Date CapturedSunday January 18 2009, 7:26 PM
Wired -- Kim Zetter - [encounters online often engage in risky behaviors or come from environments that make them more susceptible to risks, such as environments where there is little adult supervision or where there is drug abuse or physical and mental abuse. "Those who are most at risk often engage in risky behaviors and have difficulties in other parts of their lives. The psychosocial makeup of and family dynamics surrounding particular minors are better predictors of risk than the use of specific media or technologies," the report says. The report also says that although cyberbullying is a greater problem than predators, there is no evidence that bullying has increased because of social networking sites and that bullying still occurs more often offline than online, although social networking sites have created another avenue for expressing it. The report, titled "Enhancing Child Safety & Online Technologies," was commissioned by the National Association of Attorneys General, which is trying to determine the best way to combat cyberthreats against minors. It was produced by a task force headed by the Berkman Center for Internet and Society at Harvard University and is based on reviews of existing research in the area, of which the task force says there's a paucity, as well as an examination of existing tools that offer online safety features.]
- Adults and Social Network Websites
Date CapturedWednesday January 14 2009, 6:20 PM
Pew Internet, Amanda Lenhart -- [When users do use social networks for professional and personal reasons, they will often maintain multiple profiles, generally on different sites. Most, but not all adult social network users are privacy conscious; 60% of adult social network users restrict access to their profiles so that only their friends can see it, and 58% of adult social network users restrict access to certain content within their profile.]
Facebook and the Social Dynamics of Privacy (DRAFT)
Date CapturedMonday December 08 2008, 6:08 PM
James Grimmelmann. 2008. "Facebook and the Social Dynamics of Privacy" The Selected Works of James Grimmelmann -- [This Article provides the first comprehensive analysis of the law and policy of privacy on social network sites, using Facebook as its principal example. It explains how Facebook users socialize on the site, why they misunderstand the risks involved, and how their privacy suffers as a result. Facebook offers a socially compelling platform that also facilitates peer-to-peer privacy violations: users harming each others’ privacy interests. These two facts are inextricably linked; people use Facebook with the goal of sharing some information about themselves. Policymakers cannot make Facebook completely safe, but they can help people use it safely. The Article makes this case by presenting a rich, factually grounded description of the social dynamics of privacy on Facebook. It then uses that description to evaluate a dozen possible policy interventions. Unhelpful interventions—such as mandatory data portability and bans on underage use—fail because they also fail to engage with key aspects of how and why people use social network sites. The potentially helpful interventions, on the other hand—such as a strengthened public-disclosure tort and a right to opt out completely—succeed because they do engage with these social dynamics.]
Hackers: Social networking sites flawed
Date CapturedMonday August 06 2007, 11:42 AM
AP reports, "Social networking Web sites such as are increasingly juicy targets for computer hackers, who are demonstrating a pair of vulnerabilities they claim expose sensitive personal information and could be exploited by online criminals."
Bill seeks to 'delete' Web site predators
Date CapturedWednesday July 04 2007, 8:44 AM
Rochester Democrat and Chronicle reports, "According to the U.S. Department of Justice, one in five children are approached by an online predator and only 25 percent of those children tell their parents about the situation. About 50,000 sexual predators are online at any given time, and many of them often utilize social networking sites, according to data compiled by the National Center for Missing and Exploited Children."
’Net lessons are worth restating
Date CapturedMonday June 18 2007, 9:50 AM
The Daily Star opines, "First and foremost, no amount of spyware, password protection or other technological barriers will keep teens away from a site they want to visit. Because of this, Vacher emphasized the need for parents to communicate with their children and be knowledgeable about how those sites operate. One of the key reasons social-networking sites are troubling is that people’s personal information is out in the open for all to see. Well, that means parents can see it, too. A teen who’s gotten a MySpace friend request from Mom or Dad might be a little more careful about what she posts on her profile. The other key to Vacher’s presentation was pointing out that, with the growing popularity and ubiquity of the sites, what you post today can come back to haunt you tomorrow -- or 10 years from now."
Teachers find adjusting to technology a real education
Date CapturedTuesday May 01 2007, 8:17 AM
Times Herald-Record reports, "Education is way behind, Richardson said. Business and the media, even politics, have adjusted to the wave of technology and its changes. Students have changed as well: 55 percent of them use social networking sites such as MySpace or Facebook; 57 percent of students have created material for the Internet. They use information sites like Wikipedia. They blog and send instant messages, create videos and more."
1,600 educators to arrive in Ithaca today
Date CapturedFriday March 23 2007, 9:33 AM
Ithaca Journal reports, "The conference offers teachers and support staff from within the T-S-T BOCES system 134 workshops, which will be held throughout Ithaca. Workshops are located at Cornell's main campus, Cornell Lab of Ornithology, Ithaca High School and T-S-T BOCES. Among the more popular workshops are 'undoing racism,' 'how to lose five to 10 pounds quickly' and workshops focused on 21st Century literacy. 'Those address how to use iPods educationally or create infinity groups for kids so they can be engaged in social networking around a topic,' Fontana [director of staff development and research for the ICSD] said."
Dealing with Cyberbullies
Date CapturedWednesday January 31 2007, 12:56 PM
From the Desk of CSCIC's Information Security Officer, "Cyberbullying can occur via cell phone text messaging, email, instant messaging, or even within online games and social networking sites. The threats, rumors, abuse, and lies that are often used in cyberbullying are not only difficult to escape, they can also have long lasting, detrimental effects on children."
School district wants to inform about dangers of social networking
Date CapturedMonday November 06 2006, 2:53 PM reports, "'We take student privacy issues very seriously, and we are very careful about releasing student information,' said McArdle[Lexington school Superintendent]. 'Unfortunately, many times students are too willing to share too much information on Web sites (such as,,, or with no thought that someone might use it inappropriately.' In response, the school district, in conjunction with the Lexington Council of Churches, will sponsor a presentation at 7:30 p.m. Wednesday featuring Jack Bristow, former DARE officer for Livingston County. Bristow serves as the liaison for Pontiac High School and gave a social networking presentation at a recent meeting of the Illinois Principals Association."
MySpace parent company pledges millions for safety campaign
Date CapturedThursday July 13 2006, 8:01 AM
USA Today reports, "The campaign comes as parents, schools and law-enforcement officials increasingly warn about the dangers of sexual predators at social-networking sites, which provide messaging and other tools to encourage users to expand their circles of friends."

Back to Top of Page