Comparison of Privacy Policies

Embed Size (px)

Citation preview

  • 8/7/2019 Comparison of Privacy Policies

    1/20

    ICT3006

    Profession

    alIssues

  • 8/7/2019 Comparison of Privacy Policies

    2/20

    ICT3006 - Professional Issues Page 2

    Contents1. Introduction - What are social networking sites? ................................................................................. 4

    2. Why Privacy policies are more important for social networking sites? ............................................... 6

    3. Facebook ............................................................................................................................................... 7

    Standards .............................................................................................................................................. 7

    Age limit ................................................................................................................................................ 7

    Activities allowed .................................................................................................................................. 7

    Mandatory information to be supplied for signing up ......................................................................... 7

    Transactional Information .................................................................................................................... 7

    Information collected when interacting with Facebook ....................................................................... 7

    Access Device and Browser Information .............................................................................................. 7

    Cookie Information ............................................................................................................................... 8

    Information Facebook receive from third parties ................................................................................ 8

    Sharing information on Facebook Privacy ......................................................................................... 8

    How Facebook uses users information ................................................................................................ 9

    How Facebook share information ......................................................................................................... 9

    How users can change or remove information................................................................................... 10

    4. LinkedIn ............................................................................................................................................... 10

    Standards ............................................................................................................................................ 10

    Age limit .............................................................................................................................................. 10

    Activities allowed ................................................................................................................................ 10

    Mandatory information to be supplied for signing up ....................................................................... 10

    What LinkedIns Privacy Policy Covers ................................................................................................ 10

    Transactional Information .................................................................................................................. 11

    Sharing information on LinkedIn Privacy ......................................................................................... 11

    How LinkedIn uses users information................................................................................................ 12

    How LinkedIn share information ........................................................................................................ 12

    How users can change or remove information in LinkedIn ................................................................ 12

    05. Myspace ................................................................................................................................................ 13

    Website URL ........................................................................................................................................ 13

    Age limit .............................................................................................................................................. 13

    Personal Identification Information(PII) ............................................................................................. 13

  • 8/7/2019 Comparison of Privacy Policies

    3/20

    ICT3006 - Professional Issues Page 3

    Changeability of user information ...................................................................................................... 13

    Cookies ................................................................................................................................................ 13

    Use of user data at MySpace .............................................................................................................. 13

    Compliance with local authorities/laws .............................................................................................. 14

    06. Twitter ................................................................................................................................................... 14

    Age limit .............................................................................................................................................. 14

    Activities allowed ................................................................................................................................ 14

    Mandatory information to be supplied for signing up ....................................................................... 14

    Information collected when interacting with twitter ......................................................................... 14

    Access Device and Browser Information ............................................................................................ 14

    Cookie Information ............................................................................................................................. 15

    Information related to third parties ................................................................................................... 15

    Sharing information on Twitter Privacy ........................................................................................... 15

    How Twitter uses and shares users information ............................................................................... 16

    How users can change or remove information ................................................................................... 16

    07. Flicker .................................................................................................................................................... 17

    08. Orkut ..................................................................................................................................................... 17

    Comparison of Flicker and Orkut ........................................................................................................ 18

    Personal information .......................................................................................................................... 18

    Uses and Information Sharing ............................................................................................................. 19

    09. References ............................................................................................................................................ 19

    10. Group Members .................................................................................................................................... 20

  • 8/7/2019 Comparison of Privacy Policies

    4/20

    ICT3006 - Professional Issues Page 4

    1.Introduction - What are social networking sites?

    Social networking sites are websites that allows users to create a public profile in those websites

    and share their pictures, videos, interests, information, and meet new friends and communicate withthem via chat and other communication methods. Every member of a social networking site has an own

    profile that represents the information and interests of that specific member. Members can search the

    other members by using name, email address, country, and other various options.

    There are hundreds of social networking websites exist in the world, however, only few of them

    are very popular and get the attention of huge number of users. According to Alexa internet

    incorporation (http://www.alexa.com) that analyze the website traffic and user activities on the

    websites, the most popular social networking site is the Facebook (http://www.facebook.com) that has

    the Alexa traffic rank 2 means that accourding to Alexa estimations, facebook is the second most visited

    website in the world that only stay behind the Google (http://www.google.com) . Then comes the

    Twitter (http://www.twitter.com) as the seconded most popular and social networking and micro

    blogging network for its members. It has the Alexa traffic rank 10. Then the third most popular social

    networking site is Linkedin (http://www.linkedin.com) which has the Alexa traffic rank 19. The fourth

    most popular social networking site is MySpace (http://www.myspace.com) which has the Alexa traffic

    rank 62 at the time of writing this document.

  • 8/7/2019 Comparison of Privacy Policies

    5/20

    ICT3006 - Professional Issues Page 5

    Social networking sites became rapidly very popular during the last few years. There are several

    reasons for this rapid popularity.

    A social networking site is a platform for various communication tools. They provide text chat,massage sending, image sharing, video sharing, document sharing and other useful ways of

    communications.

    Members get opportunities to contact and identify lots of other people around the world withsimilar characteristics such as hobbies, interests, objectives, same age group etc. Whereever

    you live, with social network, you can find lots of people around the world and communicate

    with them more effectively.

    Using social networking sites is a cheap method of communication. Almost all popular socialnetworking sites are completely free for the members and so they only want a working internet

    connection to log into the website and communicate with other members.

    The main method of earning revenue for the social networking sites is the publishing

    advertisements from various advertisers on their websites. Although some social networking sites does

    not disclose their profits, according to estimations, most of the popular social networking sites earns

    billions of dollars in each years by selling advertisements to their advertisers. Most social networking

    sites allows their advertisers to choose their audience by considering the age, sex, country and various

    other interesting characteristics, so the advertisers can target their most appropriate niche very

    effectively.

    However, different types of privacy issues have been identified with these social networking

    sites so the site owners have defined their unique privacy policies and statements to indicate their

    commitment about the privacy of the users of their websites. At the later parts of this document, we are

    going to describe important aspects of the privacy for social networking sites and the privacy policies of

    different social networking sites and their good and bad effects on their members.

  • 8/7/2019 Comparison of Privacy Policies

    6/20

    ICT3006 - Professional Issues Page 6

    2.Why Privacy policies are more important for social networkingsites?When we consider about the contents of the general websites, most of the contents are

    managed by the site administrators. They are the people who add new information to the site, update

    the existing information in the site, and make modifications to the site as required. So the end-user

    (member) involvement is very low in determining the site contents. However, the situation is completely

    different in social networking sites. In social networking sites site administrators and developers only do

    the creation process of the desired function and the end-users and the contents of the site is created by

    the members of the sites using various methods such as entering their information and interests,

    uploading photos and videos, share their interesting pages and contents at social networking sites and

    other various ways of content sharing.

    After a registered members have entered his/her information into his/her profile, some of those

    information may be available to the people in all around the world depending of that specific users

    privacy settings and the global privacy settings of that specific social networking site. Actually, some

    information may be hard to hide and in some social networking sites, most of the information of the

    user profiles are visible to all others by default and if a specific user want to hide those information

    he/she have to manually edit those privacy settings. Sometimes new users may not aware about this

    information closure to the public and may not edit modify these default settings, so their information is

    available to the lots of bad people such as spammers.

    Another more important factor that should be considered very carefully is the using of third

    party applications that are associated with these social networking sites. Examples of such applications

    are games, quizzes, and other third party modules that can be integrated to the profiles. Most of the

    applications needs access to the personal information of that particular user to operate and then they

    can collect those information and they can use those information in for illegal or unethical purposes

    such as selling those personal information to the some organizations and spammers. Even though social

    networking sites cant completely prevent these kind of unethical usages of personal information of

    external applications, they can define some rules and regulations to third party applications to reduce

    these types of risks.

  • 8/7/2019 Comparison of Privacy Policies

    7/20

    ICT3006 - Professional Issues Page 7

    3.Facebook

    Standards

    Compliant with with TRUSTe Program and EU Safe Harbor framework.

    Age limit

    Age limit for using facebook is 13 years. Facebook does not collect any information from children under

    13 years and if they learn that they have done so, they will immediately delete that data from their

    databases.

    Activities allowed

    Update status, upload or take a photo, upload or record a video, share a link, create an event or

    a group, make a comment, write something on someones Wall, write a note, or send someone a

    message.

    Mandatory information to be supplied for signing up

    First name, last name, gender, email and birthday.

    Transactional Information

    Facebook retain the details of transactions or payments that anyone makes on Facebook. If

    anyone does not want Facebook to store his/her payment source account number, he/she can remove it

    using his/her payments page.

    Information collected when interacting with Facebook

    Adding connections (including joining a group or adding a friend), creating a photo album,

    sending a gift, poking another user, indicating you like a post, attending an event, or connecting with

    an application. In some cases you are also taking an action when you provide information or content to

    us. For example, if you share a video, in addition to storing the actual content you uploaded, we might

    log the fact that you shared it.

    Access Device and Browser Information

    When anyone accesses Facebook from a computer, mobile phone, or other device, Facebook

    may collect information from that device about users browser type, location, and IP address, as well as

    the pages he/she visits.

  • 8/7/2019 Comparison of Privacy Policies

    8/20

    ICT3006 - Professional Issues Page 8

    Cookie Information

    Facebook uses "cookies" (small pieces of data we store for an extended period of time on your

    computer, mobile phone, or other device) to make Facebook easier to use, to make their advertising

    better, and to protect both users and Facebook.

    Information Facebook receive from third parties

    Facebook PlatformFacebook does not own or operate the applications or websites that users use through

    Facebook Platform (such as games and utilities). Whenever users connect with a Platform

    application or website, Facebook will receive information from them, including information

    about actions users take. In some cases, in order to personalize the process of connecting,

    Facebook may receive a limited amount of information even before you connect with the

    application or website.

    Information from other websites.Facebook may institute programs with advertising partners and other websites in which

    they share information with Facebook:

    Information from other usersFacebook may collect information about their users from other Facebook users, such as

    when tagging in a photo, video, or place, provides friend details, or indicates a relationship with

    particular user.

    Sharing information on Facebook Privacy

    Name and Profile Picture. For easiness, name and profile picture do not have privacy settings.

    Contact Information. Control who can contact you on Facebook, and who can see your contact information such as

    your email and phone number(s).

    Personal Information.

  • 8/7/2019 Comparison of Privacy Policies

    9/20

    ICT3006 - Professional Issues Page 9

    Your personal information settings control who can see your personal information, such as your

    religious and political views, if you choose to add them.

    Posts by Me. You can select a privacy setting for every post you make using the publisher on our site. .

    Gender and Birth Date. Facebook asks for your date of birth to verify that you are 13 or older, and so that they can

    better limit your access to content and advertisements that are not age appropriate.

    How Facebook uses users information

    To manage the service. To contact users To serve personalized advertising to users To serve social ads To supplement user profiles To make suggestions To help friends find

    How Facebook share information

    When you make a payment.When you invite a friend to join.When you choose to share your information with marketers. To help your friends find you. To give search engines access to publicly available information. To help improve or promote our service. To provide you with services. To advertise our services. To offer joint services. To respond to legal requests and prevent harm.

  • 8/7/2019 Comparison of Privacy Policies

    10/20

    ICT3006 - Professional Issues Page 10

    How users can change or remove information

    Editing your profile.Delete uploaded contacts.Deactivating or deleting your account. Limitations on removal. Backup copies.Non-user contact information.

    4.LinkedIn

    Standards

    Personal information collected.

    Age limit

    Age limit for using LinkedIn is 18 years. LinkedIn does not collect any information under 18 years

    and if they learn that they have done so, LinkedIns higher age limits than 18 in some states.

    Activities allowed

    Update status, upload or take a photo, create an event or a group, make a comment, write

    something on someones Wall, send someone a message, Extreme Sports, Corporate Events, Gift

    Experiences, Gift Vouchers, Experience Days, Driving Experiences, Team Building.

    Mandatory information to be supplied for signing up

    First name, last name, gender, email and birthday. This are main things.

    What LinkedIns Privacy Policy Covers

    Information collected by LinkedIn.How LinkedIn uses your information. Your information choices. Your obligations as a user. Important information regarding service eligibility and US Department of Commerce Safe

    Harbor certification.

    Security.How to contact us.

  • 8/7/2019 Comparison of Privacy Policies

    11/20

    ICT3006 - Professional Issues Page 11

    Transactional Information

    Telecommunications, Financial Markets, Payments, Point of Sales, Information Technology and Services.

    Sharing information on LinkedIn Privacy

    Personal information collected. For easiness, name and profile picture do not have privacy settings.

    RegistrationName, email address, Country and password. We changed this section to clarify the data

    necessary to create an account on Linked In.

    Profile Information.The type of information you can share on LinkedIn.

    Contact Information. Control who can contact you on LinkedIn, and who can see your contact information such as

    your email and phone number(s).

    Customer Service.To provide more information about the function of LinkedIn s customer services team and to

    provide a link to the LinkedIn Customer Service website

    Personal Information. Your personal information settings control who can see your personal information, such as your

    religious and political views, if you choose to add them.

    CookiesA cookies is a tiny data.

  • 8/7/2019 Comparison of Privacy Policies

    12/20

    ICT3006 - Professional Issues Page 12

    Advertising and web Beacons. Posts by Me.

    You can select a privacy setting for every post you make using the publisher on our site.

    How LinkedIn uses users information

    To manage the service. To contact users To serve personalized advertising to users To supplement user profiles To make suggestions To help friends find

    How LinkedIn share information

    When you make a payment.When you invite a friend to join.When you choose to share your information with marketers. To help your friends find you. To give search engines access to publicly available information. To help improve or promote our service. To provide you with services. To advertise our services. To offer joint services. To respond to legal requests and prevent harm.

    How users can change or remove information in LinkedIn

    Editing your profile.Delete uploaded contacts.Deactivating or deleting your account. Limitations on removal. Backup copies.Non-user contact information.

  • 8/7/2019 Comparison of Privacy Policies

    13/20

    ICT3006 - Professional Issues Page 13

    05. Myspace

    Website URL

    www.myspace.com

    Age limit

    Age limit for using MySpace is 13 years.

    Personal Identification Information(PII)

    When MySpace collects PII from users it is because users are voluntarily submitting Registration

    PII in order to register as a Member of MySpace. MySpace may also collect PII from you if you choose to

    participate in MySpace Services activities like sweepstakes, contests, and surveys, because users want

    MySpace to furnish them with products, services, newsletters, or information, or in connection with

    content or suggestions users submit to MySpace for review.

    In addition, MySpace collects other non-PII including IP address, aggregate user data, and

    browser type. This data is used to manage and improve the MySpace Services, track usage, and for

    security purposes.

    Changeability of user information

    MySpace Members can change their Registration PII and Profile Information at any time and can

    control how Visitors, other Members and MySpace communicate with them by controlling their account

    settings, available within the Edit Profile portion of their MySpace profile.

    Cookies

    MySpace uses cookies to identify usersInternet browser, store Users preferences, and

    determine whether users have installed the enabling software needed to access certain material on the

    MySpace Services. Data in cookies may be read to authenticate user sessions or provide services.

    Third party advertisements displayed on MySpace Services may also contain cookies set by

    Internet advertising companies or advertisers (known as third party cookies). MySpace does not

    control these third party cookies and Users of the MySpace Services should check the privacy policy of

    the Internet advertising company or advertiser to see whether and how it uses cookies.

    Use of user data at MySpace

    At the time users provide their PII, MySpace will notify them of their options regarding

    MySpaces use of user PII. Except as described in their Privacy Policy, MySpace will not share users PII

    with third parties unless they have given MySpace permission to do so.

  • 8/7/2019 Comparison of Privacy Policies

    14/20

    ICT3006 - Professional Issues Page 14

    Compliance with local authorities/laws

    When a Member who is located in the European Union chooses to post Profile Information that

    will be publicly disclosed, that Member is responsible for ensuring that such information conforms to all

    local data protection laws. MySpace is not responsible under the EU local data protection laws for

    Member-posted information.

    06. Twitter

    Age limit

    Services are not available for people under 13 . They does not knownly collect information from

    people under 13. If they found any profile created at Twitter is belongs to a person under 13, they takes

    steps to remove those information from their databases and terminate that specific account.

    Activities allowed

    Update status using tweets, upload a photo, upload a video, share a link, follow other people

    (profiles), post and receive tweets via text (sms) messages, or send someone a message.

    Mandatory information to be supplied for signing up

    Full nameUsername Password E-mail address

    Information collected when interacting with twitter

    Member may enter, update, or remove other details other than the above mandatory details

    such as short biography, location information and profile picture as desired by them. When a memberwants to post or receive tweets via mobile phones, he or she must provide an appropriate mobile phone

    number for delivery of text messages. Twitter also collect and keep the tweets and metadata provided

    with those tweets. Twitter keeps the information about people followed by specific person, people who

    follow that specific person, and his Retweets. Also Twitter stores the private messages of every user that

    are not monitored but can be monitored as required in special cases.

    Access Device and Browser Information

    When someone accesses Twitter from a computer, mobile phone, or other device Twitter may

    collect the following information about that user.

    IP (Internet Protocol) address of that specific users device Browser type Referring domain Page visited Searches and keywords

  • 8/7/2019 Comparison of Privacy Policies

    15/20

    ICT3006 - Professional Issues Page 15

    Cookie Information

    Twitter uses both session and persistent "cookies" (small pieces of data that are stored for an

    extended period of time on your computer, mobile phone, or other device) to collect additional website

    usage data and improve the services of the Twitter with the time. However, cookies are not required to

    access the public profile information and search profiles on Twitter. If a user does not like to cookies to

    be enabled, he or she can modify the settings of his/her browser disable cookies.

    Information related to third parties

    External Service providersTwitter gets some services from trusted third party organizations and service providers.

    Twitter may share some information from the user profile created at Twitter with these

    third party service providers. This sharing is done only if it is essential and only pursuant

    to obligations mirroring the protections of the privacy policy

    Information from other websitesInformation from other websites and offers may appear at Twitter as advertisements

    and other promotion campaigns.

    Information from other usersTwitter may collect information about a specific user from other Twitter users, in

    situations such as his/her tweets are Retweeted by an another user.

    Sharing information on Twitter Privacy

    Full Name and Profile Picture. Full Name and the profile picture can be visible by everyone.

    E-mail addressE-mail address is not publicly available for other users. However, if you want you can enable the

    ability to others find you by your e-mail address. It means if someone knows your e-mail

    address, then he or she can check whether you have a profile at Twitter when this option is

    enabled.

    LocationSpecifying the location is not mandatory. If you enter your location, that it visible by others.

    Website or blogYou can specify the URL of your blog or website if you wish even though filling those

    information is not mandatory.

  • 8/7/2019 Comparison of Privacy Policies

    16/20

    ICT3006 - Professional Issues Page 16

    Tweets by MeBy default, all tweets of a member is publicly available to other users. However, if user wants toprotect his/her tweets, then he can enable Protect my tweets option, so his/her tweets will onlybe able to see by the other approved users specified by the author.

    Tweet LocationBy default, tweets Location option is disabled. If the user want he/she can enable it, so the others

    can see location at which that specific tweets has been made (e.g. at Colombo).

    Tweet MediaBy default, a Twitter member will see the photos and videos shared by the people who are

    followed by that specific members, however, if he/she enables this information, then he/she will

    be able to see the other persons pictures and videos too.

    How Twitter uses and shares users information

    To manage the service properly To improve the existing services To help your friends to easily find you To contact users when required To serve personalized promotions to members To serve specific information to the members To be used in special law issues and provide actions that are harmful to othersNon-private information will be shared with by third parties To match advertisers to specific users Provide the level of information access level to the search engines

    How users can change or remove information

    Editing your profile informationDeleting uploaded pictures and videosDeleting tweetsDeactivating the account.

  • 8/7/2019 Comparison of Privacy Policies

    17/20

    ICT3006 - Professional Issues Page 17

    07. Flicker

    Flickr is an image hosting and video hosting website, web services suite, and online

    community created by Ludicorp and later acquired by Yahoo!. In addition to being a popular

    website for users to share and embed personal photographs, the service is widely used

    by bloggers to host images that they embed in blogs and social media.

    Flickr offers two types of accounts: Free and Pro. Free account users are allowed to

    upload 300 MB of images a month and 2 videos. And Pro accounts allow users to upload an

    unlimited number of images and videos every month and receive unlimited bandwidth and

    storage.

    Flickr's functionality includes RSS and Atom feeds and an API that enables independent

    programmers to expand its services. This includes a large number of third-party Greasemonkey scripts which enhance and extend the functionality of the Flickr site. In

    2006, Flickr was the second most Greasemonkey-extended site.

    Flickr has increasingly been adopted by many web users as their primary photo storage

    site, especially members of the blogging community. In addition, it is popular

    with Macintosh and Linux users, who are locked out of photo-sharing sites that require

    Windows and Internet Explorer.

    08. OrkutOrkut is a social networking website that is owned and operated by Google Inc. The

    service is designed to help users meet new friends and maintain existing relationships. The

    website is named after its creator, Google employee Orkut Bykkkten.

    Originally hosted in California, in August 2008 Google announced that Orkut would be fully

    managed and operated in Brazil, by Google Brazil, in the city of Belo Horizonte. This was

    decided due to the large Brazilian user base and growth of legal issues.

    As of February 2011, Alexa traffic ranked Orkut 102nd in the world; the website

    currently has more than 100 million active users worldwide. Anyone 18 years old or older can

    join Orkut.

    An Orkut user can also add videos to their profile from either YouTube or Google

    Video with the additional option of creating either restricted or unrestricted polls for polling a

    community of users. There is an option to integrate GTalk(An instant messenger from Google)

  • 8/7/2019 Comparison of Privacy Policies

    18/20

    ICT3006 - Professional Issues Page 18

    with Orkut enabling chatting and file sharing. Currently GTalk has been integrated in Orkut -

    users can directly chat from their Orkut page.

    Comparison of Flicker and Orkut

    As we know Flickr & orkut are the social network sites which run by the yahoo and the

    Google search engines. So in yahoo and Google privacy policies they will mainly describe how

    they treat privacy of the user when they use flicker and orkut.

    In addition to that, there are additional policy statements that describes their privacy

    practices that are specific to flicker and orkut. So in this document we are going to give a

    comparison regarding those policy statements which are specific to the Flickr and the orkut.

    Personal information

    The Flickr users do not need to be registered to search or view public photos on Flickr,

    but they must be a registered member of Flickr or yahoo to post. But the orkut users need a

    Google account to post, view or search any photos on orkut.

    As an orkut member, we can create a profile or orkut community that includes personal

    information, such as our gender, age, occupation, hobbies, and interests, plus other content,

    such as photos. This information may be accessed and viewed by other orkut members, as

    determined by your privacy settings. These things are very much similar to the Flickr as well.

    There are much more similarities in orkut and Flickr under the information sharing and

    user practices.

    When the user invites new members into their network or sends messages through theFlickr or orkut, they collect and maintain information associated with those messages,

    including email addresses and content.

    The both orkut and Flickr websites maintain information associated with the messageswhich are coming from the websites, such as the phone number, the wireless carrier

    associated with the phone number, the content of the message, and the date and timeof the transaction.

  • 8/7/2019 Comparison of Privacy Policies

    19/20

    ICT3006 - Professional Issues Page 19

    Uses and Information Sharing

    The Flickr member can choose to make their photos public for anyone to access, restrict

    access to a limited number of other Flickr users, or keep those photos private so only the

    member can access them. The member can specify whether or not he/she want their photos tobe accessible to the public, accessible to a select few, or private (only you can access them with

    their Yahoo! ID and password).

    In orkut the users profile information is also displayed according to the preferences

    they set in their account. When user sends messages through orkut, their name and email

    address will be identified in the message. And use those name and email address to notify the

    user to new members, messages, or other information, such as invitations to join friends'

    networks, new testimonials or "fan" ratings, and crush notices.

    Orkut allows third-party developers to upload applications to the orkut application

    directory. The user may choose to use an application by adding it to their profile. If they add an

    application to their profile, the application may collect information from their profile or other

    information about user activities on orkut, and share that information with others.

    There are much more similarities between Flickr and the orkut regarding this Uses and

    Information Sharing section.

    09. Referenceshttp://info.yahoo.com/privacy/us/yahoo/flickr/details.html

    http://www.orkut.com/html/en-US/privacy.orkut.html?rev=6

    http://www.facebook.com/policy.php

    http://www.linkedin.com/static?key=privacy_policy

    http://www.myspace.com/index.cfm?fuseaction=misc.privacy

    https://www.flickercandles.co.nz/privacy_policy

    http://www.orkut.com.br/html/en-US/privacy.orkut.html?rev=6

    http://twitter.com/privacy

    http://info.yahoo.com/privacy/us/yahoo/flickr/details.htmlhttp://www.orkut.com/html/en-US/privacy.orkut.html?rev=6http://www.orkut.com/html/en-US/privacy.orkut.html?rev=6http://www.orkut.com/html/en-US/privacy.orkut.html?rev=6http://info.yahoo.com/privacy/us/yahoo/flickr/details.html
  • 8/7/2019 Comparison of Privacy Policies

    20/20

    ICT3006 - Professional Issues Page 20

    10. Group Members

    2008/ICT/004 Bandara W.M.S.K. 08020043

    2008/ICT/016 Ishara D.G.R. 08020167

    2008/ICT/018 Jayalath U.A. 08020183

    2008/ICT /029 Karunarathna A.C. 08020299

    2008/ICT/055 Roshan M. 08020558