SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
Twitter Inc.
SUBMITTED TO
DR. GAURAV GUPTA
CYBER SECURITY AND FORENSICS
1
Submitted By
YANSI KEIM
M.TECH (I.S.M.) 1ST SEMESTER, I.G.D.T.U.W.
CONTENTS
2
1.ABOUT TWITTER
2.Privacy Policy
3.Information Collection and Use
4.Cookies
5.Log Data
6.Information Sharing and Disclosure
7.Accessing and Modifying Your Personal Information
8. References
3
Tip ! “ What you say on the Twitter Services may be viewed all
around the world instantly. You are what you Tweet! “
@keim_yansi
1. ABOUT
Continued…
What is Twitter?
 Twitter is an information network made up of 140-character messages called
Tweets. It's an easy way to discover the latest news related to subjects you
care about
4
How is it useful?
 Twitter contains information you will find valuable. Messages from users you
choose to follow will show up on your home page for you to read. It’s like
being delivered a newspaper whose headlines you’ll always find interesting
– you can discover news as it’s happening, learn more about topics that are
important to you, and get the inside scoop in real time.
1. ABOUT
@keim_yansi
5
1.About Twitter
2.PRIVACY POLICY
3.Information Collection and Use
4.Cookies
5.Log Data
6.Information Sharing and Disclosure
7.Accessing and Modifying Your Personal Information
8.References
CONTENTS
2. Twitter’s Privacy Policy
This Privacy Policy (“Policy”) describes
• how and when Twitter collects, uses and shares your information when
you use our Services.
Twitter receives your information through various
• websites,
• SMS,
• APIs,
• email notifications,
• applications,
• buttons,
• widgets,
• ads,
• commerce services (the “Twitter Services”), and
• other covered services that link to this Policy (collectively, the “Services”)
and
• from Twitter partners and other third parties. 6
@keim_yansi
For example, you send Twitter
information when you use its
Services on the
• web,
• via SMS,
or from an application such as
• Twitter for Mac,
• Twitter for Android or
• TweetDeck.
When using any of its Services
you consent to the collection,
transfer, storage, disclosure, and
use of your information as
described in this Privacy Policy.
Continued…
7
If you live in the United States, your information is controlled by Twitter, Inc., 1355 Market Street, Suite 900,
San Francisco, CA 94103 U.S.A.
“Irrespective of which country you reside in or supply information from, you authorize Twitter to use
your information in the United States, Ireland, and any other country where Twitter operates.”
@keim_yansi
CONTENTS
8
1. About Twitter
2. Privacy Policy
3. INFORMATION COLLECTION AND USE
i. Basic Account Information
ii. Contact Information
iii. Location Information
iv. Links
4. Cookies
5. Log Data
6. Information Sharing and Disclosure
7. Accessing and Modifying Your Personal Information
8. References
3. TWITTER’S INFORMATION COLLECTION AND USE
9
Tip! Twitter collect and use your
information below to provide its
Services and to measure and improve
them over time
Continued…
@keim_yansi
When you create or reconfigure an account, you
provide some personal information, such as
 your name,
 username,
 password,
 email address, or
 phone number.
On the Twitter Services, your NAME AND USERNAME ARE
LISTED PUBLICLY, INCLUDING ON YOUR PROFILE PAGE and
in search results, and you can use either your real name
or a pseudonym.
Some Twitter Services, such as
 searching and
 viewing public user profiles,
do not require registration. 10
@keim_yansi
Continued…
i. Basic Account Information:
Figure. Sign In/Sign Up Interface
ii. Contact Information
You may use your contact information, such as your
• email address or
• phone number
to customize your account or enable Services, for example,
• for login verification,
• Twitter via SMS, or
• Digits by Twitter.
If you provide Twitter with your phone number, you agree to receive text messages to that number from
Twitter. When you use Digits by Twitter to sign up for or login to a third-party application, you are directing
Twitter to share your contact information, such as your phone number, with that application. We may use your
contact information to send you information about our Services, to market to you, to help prevent spam,
fraud, or abuse, and to help others find your account, including through third-party services and client
applications. You may use your settings for email and mobile notifications to control notifications you receive
from the Twitter Services. You may also unsubscribe from a notification by following the instructions
contained within the notification or the instructions on our website..
11 @keim_yansi
Continued..
Figure. Twitter’s Contact Information
III. LOCATIONINFORMATION
12
Twitter may receive information about your location.
For example,
• you may choose to publish your location in your Tweets and in your Twitter profile.
• You may also tell us your location when you set your trend location on Twitter.com.
Twitter may also determine location by using other data from your device, such as
• precise location information from GPS,
• information about wireless networks or
• cell towers near your mobile device, or your IP address.
Twitter may use and store information about your location to
provide features of its Services, such as
• Tweeting with your location, and
• to improve and customize the Services,.
For example, with more relevant content like
• local trends, stories,
• ads, and
• suggestions for people to follow.
@keim_yansi
Figure. Location Information on Twitter
Continued..
13
Twitter may keep track of
how you interact with links
across our Services, including
our email notifications, third-
party services, and client
applications, by redirecting
clicks or through other means.
We do this to help improve
our Services, to provide more
relevant advertising, and to
be able to share aggregate
click statistics such as how
many times a particular link
was clicked on.
IV.LINKS
Figure. Representation of Twitter’s User Profile
@keim_yansi
CONTENTS
14
1.About Twitter
2.Privacy Policy
3.Information collection and use
4. COOKIES
5. Log Data
6. Information Sharing and Disclosure
7. Accessing and Modifying Your Personal Information
8. References
15
• COOKIES are small files that websites place on your computer as you browse the web. Like many
websites, Twitter uses cookies to discover how people are using our services and to make them
work better.
• A PIXEL is a small amount of code on a web page or in an email notification. As many services do,
we use pixels to learn whether you’ve interacted with certain web or email content. This helps us
measure and improve our services and personalize your experience on Twitter.
• LOCAL STORAGE is an industry-standard technology that allows a website or application to store
information locally on your computer or mobile device. We use local storage to customize what
we show you based on your past interactions with Twitter.
4. Twitter’s use of Cookies and
similar technologies
@keim_yansi
Continued..
Why does Twitter use these technologies?
 Authentication and security
 Preferences
 Analytics and research
 Personalized content
 Advertising
16
Twitter uses cookies and other similar technologies, such as PIXELS or LOCAL STORAGE, to help
provide you with a better, faster, and safer experience. Here are some of the ways that the Twitter
services—including our various websites, SMS, APIs, email notifications, applications, buttons, widgets,
and ads—use these technologies:
 to log you into Twitter,
 save your preferences,
 personalize the content you see,
 protect against spam and abuse, and
 show you more relevant ads.
@keim_yansi
CONTENTS
17
1.About Twitter
2.Privacy Policy
3.Information collection and use
4.Cookies
5. LOG DATA
i. Third Parties and Affiliates
6. Information Sharing and Disclosure
7. Accessing and Modifying Your Personal Information
8. References
5. LOG DATA:
When you use Twitter’s Services, Twitter may receive
information (“Log Data”) such as your
 IP address,
 browser type,
 operating system,
 the referring web page,
 pages visited,
 location,
 your mobile carrier,
 device information (including device and application
IDs),
 search terms, and
 cookie information.
18
Twitter receive Log Data when you interact with its Services, for
example,
 when you visit its websites,
 sign into its Services,
 interact with its email notifications,
 use your account to authenticate to a third-party website or
application, or
 visit a third-party website that includes a Twitter button or
widget.
Twitter may also receive Log Data when you
 click on,
 view or
 interact
with links on our Services, including links to third-party applications,
such as when you choose to install another application through
Twitter. Twitter uses Log Data to provide, understand, and improve
our Services, to make inferences, like what topics you may be
interested in, and to customize the content it show you, including
ads.
If not already done earlier, for example, as provided below for Widget Data, it will either delete Log Data or remove any
common account identifiers, such as your username, full IP address, or email address, after a maximum of 18 months.
@keim_yansi
Continued..
I. THIRD-PARTIES AND AFFILIATES:
Twitter uses a variety of third-party services to help provide its Services, such as
• hosting its various blogs and wikis, and
• to help us understand and improve the use of its Services, such as Google Analytics.
These third-party service providers may collect information sent by your browser as part of a web page
request, such as cookies or your IP address.
Third-party ad partners may share information with Twitter, like
• a browser cookie ID,
• website URL visited,
• mobile device ID, or
• cryptographic hash of a common account identifier (such as an email address),
to help them measure and tailor ads.
For example, this allows Twitter to display ads about things you may have already shown interest in off of
its Services. If you prefer, you can turn off tailored ads in your privacy settings so that your account will
not be matched to information shared by ad partners for tailoring ads.
19
@keim_yansi
CONTENTS
20
1.About Twitter
2.Privacy Policy
3.Information collection and use
4.Cookies
5. Log data
6. INFORMATION SHARING AND DISCLOSURE
i. User Consent and Direction
ii. Service Providers
iii. Laws and Harms
iv. Non-Private or Non-Personal Information
7. Accessing and Modifying Your Personal Information
8. References
6. INFORMATION SHARING AND DISCLOSURE
TIP: Twitter do not disclose your private personal
information except in the limited circumstances
described here.
21@keim_yansi
Continued..
I. USER CONSENT OR DIRECTION
Twitter may share or disclose your information at your direction, such as when
you authorize a third-party web client or application to access your account.
Other users may share or disclose information about you, such as when they
mention you, share a photo of you, or tag you in a photo.
Your privacy settings control who can tag you in a photo on the Twitter
Services. If you’ve shared information, like direct messages or protected Tweets,
with another user who accesses the Twitter Services through a third-party
service, keep in mind that the information may be shared with the third-party
service.
22
@keim_yansi
Continued..
23
Twitter engage service providers to perform functions and provide services to them in the
United States, Ireland, and other countries.
“They may share your private personal information with such service providers subject to
obligations consistent with this Privacy Policy and any other appropriate confidentiality and
security measures, and on the condition that the third parties use your private personal data
only on our behalf and pursuant to their instructions.”
They share your Payment Information with payment services providers to
 process payments;
 prevent, detect and investigate fraud or other prohibited activities;
 facilitate dispute resolution such as chargebacks or refunds; and
 for other purposes associated with the acceptance of credit or debit cards.
Twitter may share your credit or debit card number with payment services providers or card
networks to monitor card transactions at participating merchants and track redemption
activity for the purposes of providing card-linked services.
II. SERVICE PROVIDERS @keim_yansi
Continued..
III. Law and Harm
Notwithstanding anything to the contrary in this Policy, Twitter may preserve or disclose your information if
they believe that it is reasonably necessary to comply with a
▪ law,
▪ regulation,
▪ legal process, or
▪ governmental request;
to
▪ protect the safety of any person;
▪ to address fraud, security or technical issues; or
▪ to protectTwitter’s rights or property.
However, nothing in this Privacy Policy is intended to limit any legal defenses or objections that you may
have to a third party’s, including a government’s, request to disclose your information. 24
@keim_yansi
Continued..
IV. NON-PRIVATE OR NON-PERSONAL INFORMATION
Twitter may share or disclose your non-private, aggregated or otherwise non-
personal information, such as
 your public user profile information,
 public Tweets,
 the people you follow or that follow you, or
 the number of users who clicked on a particular link (even if only one did),
 reports to advertisers about unique users who saw or clicked on their ads
after they have removed any private personal information (such as your
name or contact information). 25
@keim_yansi
Continued..
CONTENTS
26
1.About Twitter
2.Privacy Policy
3.Information collection and use
4.Cookies
5. Log data
6. Information Sharing And Disclosure
7. ACCESSING AND MODIFYING YOUR PERSONAL INFORMATION
8. References
27
 If you are a registered user of Twitter’s Services, they provide you with tools
and account settings to access, correct, delete, or modify the personal information you
provided to us and associated with your account. You can download certain account
information, including your Tweets,

You can also permanently delete your Twitter account. When your account is
deactivated, it is not viewable on Twitter.com. For up to 30 days after deactivation it is
still possible to restore your account if it was accidentally or wrongfully deactivated.
Absent a separate arrangement between you and Twitter to extend your deactivation
period, after 30 days, we begin the process of deleting your account from our systems,
which can take up to a week.

Keep in mind that search engines and other third parties may still retain copies of your
public information, like your user profile information and public Tweets, even after you
have deleted the information from the Twitter Services or deactivated your account.
7. ACCESSING AND MODIFYING YOUR PERSONAL INFORMATION
@keim_yansi
28
CONTENTS
29
1.About Twitter
2.Privacy Policy
3.Information collection and use
4.Cookies
5. Log data
6. Information Sharing And Disclosure
7. Accessing and modifying your personal information
8. REFERENCES
30
 https://twitter.com/privacy?lang=en
 https://twitter.com/signup
 https://twitter.com/about
 https://www.google.co.in/search?q=twitter+create+account&biw=1280&bih=923&source=lnms&tbm=is
ch&sa=X&ved=0CAgQ_AUoA2oVChMIw9WphsPHyAIVicSOCh3JTQSx#tbm=isch&q=twitter+contact+inf
ormation&imgrc=LZeHo7kg-3zpaM%3A
 https://support.twitter.com/articles/20170514
 https://ads.twitter.com/accounts/18ce546xify/one_time_setup?encoded_account_id=18ce546xify
 https://support.twitter.com/
 https://twitter.com/download?logged_out=1&lang=en&lang=en
8. References
31THANK YOU
-YANSI KEIM
@keim_yansi

Mais conteúdo relacionado

Mais procurados

Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
What is WHOIS?
What is WHOIS?What is WHOIS?
What is WHOIS?ICANN
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
A5-Security misconfiguration-OWASP 2013
A5-Security misconfiguration-OWASP 2013   A5-Security misconfiguration-OWASP 2013
A5-Security misconfiguration-OWASP 2013 Sorina Chirilă
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
SQL Injection attack
SQL Injection attackSQL Injection attack
SQL Injection attackRayudu Babu
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Brian Huff
 

Mais procurados (20)

System Security
System SecuritySystem Security
System Security
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
Security policies
Security policiesSecurity policies
Security policies
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Snort ppt
Snort pptSnort ppt
Snort ppt
 
What is WHOIS?
What is WHOIS?What is WHOIS?
What is WHOIS?
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Hacking
HackingHacking
Hacking
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
A5-Security misconfiguration-OWASP 2013
A5-Security misconfiguration-OWASP 2013   A5-Security misconfiguration-OWASP 2013
A5-Security misconfiguration-OWASP 2013
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
SQL Injection attack
SQL Injection attackSQL Injection attack
SQL Injection attack
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 

Destaque

Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Mark Matienzo
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7RIAH ENCARNACION
 
NTFS file system
NTFS file systemNTFS file system
NTFS file systemRavi Yasas
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Windows nt istallation
Windows nt istallationWindows nt istallation
Windows nt istallationHarleen Johal
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformBasis Technology
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolBrent Muir
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations ToolsMandy Jenkins
 
Become an Internet Sleuth!
Become an Internet Sleuth!Become an Internet Sleuth!
Become an Internet Sleuth!Nearpod
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionSeccuris Inc.
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Mark Matienzo
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsMike Spaulding
 

Destaque (20)

Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
 
Windows 7-cheat-sheet
Windows 7-cheat-sheetWindows 7-cheat-sheet
Windows 7-cheat-sheet
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
NTFS Forensics
NTFS Forensics NTFS Forensics
NTFS Forensics
 
NTFS file system
NTFS file systemNTFS file system
NTFS file system
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
File carving tools
File carving toolsFile carving tools
File carving tools
 
Windows nt istallation
Windows nt istallationWindows nt istallation
Windows nt istallation
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
 
Become an Internet Sleuth!
Become an Internet Sleuth!Become an Internet Sleuth!
Become an Internet Sleuth!
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 

Semelhante a Forensic Anaysis on Twitter

Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfFacebook
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteJake White
 
Privacy statement
Privacy statementPrivacy statement
Privacy statementKaya Ota
 
Dinero fácil !Vici privacypolicy
Dinero fácil !Vici privacypolicyDinero fácil !Vici privacypolicy
Dinero fácil !Vici privacypolicyedwardcabrera14
 
Terms of Use and Privacy Policies
Terms of Use and Privacy PoliciesTerms of Use and Privacy Policies
Terms of Use and Privacy PoliciesMarius Adomnica
 
RIGit Privacy Policy
RIGit Privacy PolicyRIGit Privacy Policy
RIGit Privacy PolicyApril Mellas
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxWeb Scraping Expert
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policywedsupply1
 

Semelhante a Forensic Anaysis on Twitter (20)

Twitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdfTwitter_Privacy_Policy_EN (1).pdf
Twitter_Privacy_Policy_EN (1).pdf
 
Twitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake WhiteTwitter Terms of Service Explained - Jake White
Twitter Terms of Service Explained - Jake White
 
Twitter terms of service
Twitter terms of serviceTwitter terms of service
Twitter terms of service
 
Twitter Success guide
Twitter Success guideTwitter Success guide
Twitter Success guide
 
Privacy statement
Privacy statementPrivacy statement
Privacy statement
 
Dinero fácil !Vici privacypolicy
Dinero fácil !Vici privacypolicyDinero fácil !Vici privacypolicy
Dinero fácil !Vici privacypolicy
 
Terms of Use and Privacy Policies
Terms of Use and Privacy PoliciesTerms of Use and Privacy Policies
Terms of Use and Privacy Policies
 
Privacy policy
Privacy policyPrivacy policy
Privacy policy
 
RIGit Privacy Policy
RIGit Privacy PolicyRIGit Privacy Policy
RIGit Privacy Policy
 
Privacy policy
Privacy policyPrivacy policy
Privacy policy
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Twitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptxTwitter Data Scraping Services.pptx
Twitter Data Scraping Services.pptx
 
Promake policy
Promake policyPromake policy
Promake policy
 
Promake policy
Promake policyPromake policy
Promake policy
 
Privacy Policy_page.pdf
Privacy Policy_page.pdfPrivacy Policy_page.pdf
Privacy Policy_page.pdf
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
 

Mais de Yansi Keim

Different climatic regions of the world
Different climatic regions of the worldDifferent climatic regions of the world
Different climatic regions of the worldYansi Keim
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentalsYansi Keim
 
Introduction to Facebook
Introduction to FacebookIntroduction to Facebook
Introduction to FacebookYansi Keim
 
Using Smartphones
Using SmartphonesUsing Smartphones
Using SmartphonesYansi Keim
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browserYansi Keim
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
The design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocolsThe design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocolsYansi Keim
 
Vartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatvVartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatvYansi Keim
 
Sleeping beauty
Sleeping beautySleeping beauty
Sleeping beautyYansi Keim
 
Virtualization
VirtualizationVirtualization
VirtualizationYansi Keim
 
Virtualization
VirtualizationVirtualization
VirtualizationYansi Keim
 
Mobile Communication Generation
Mobile Communication GenerationMobile Communication Generation
Mobile Communication GenerationYansi Keim
 

Mais de Yansi Keim (16)

Citrix
CitrixCitrix
Citrix
 
Different climatic regions of the world
Different climatic regions of the worldDifferent climatic regions of the world
Different climatic regions of the world
 
E commerce
E commerceE commerce
E commerce
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Introduction to Facebook
Introduction to FacebookIntroduction to Facebook
Introduction to Facebook
 
Using Smartphones
Using SmartphonesUsing Smartphones
Using Smartphones
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browser
 
Security economics
Security economicsSecurity economics
Security economics
 
The design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocolsThe design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocols
 
Vartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatvVartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatv
 
Sleeping beauty
Sleeping beautySleeping beauty
Sleeping beauty
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
BitCoins
BitCoinsBitCoins
BitCoins
 
Mobile Communication Generation
Mobile Communication GenerationMobile Communication Generation
Mobile Communication Generation
 
Docker
DockerDocker
Docker
 

Último

Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 

Último (20)

Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 

Forensic Anaysis on Twitter

  • 1. Twitter Inc. SUBMITTED TO DR. GAURAV GUPTA CYBER SECURITY AND FORENSICS 1 Submitted By YANSI KEIM M.TECH (I.S.M.) 1ST SEMESTER, I.G.D.T.U.W.
  • 2. CONTENTS 2 1.ABOUT TWITTER 2.Privacy Policy 3.Information Collection and Use 4.Cookies 5.Log Data 6.Information Sharing and Disclosure 7.Accessing and Modifying Your Personal Information 8. References
  • 3. 3 Tip ! “ What you say on the Twitter Services may be viewed all around the world instantly. You are what you Tweet! “ @keim_yansi 1. ABOUT Continued…
  • 4. What is Twitter?  Twitter is an information network made up of 140-character messages called Tweets. It's an easy way to discover the latest news related to subjects you care about 4 How is it useful?  Twitter contains information you will find valuable. Messages from users you choose to follow will show up on your home page for you to read. It’s like being delivered a newspaper whose headlines you’ll always find interesting – you can discover news as it’s happening, learn more about topics that are important to you, and get the inside scoop in real time. 1. ABOUT @keim_yansi
  • 5. 5 1.About Twitter 2.PRIVACY POLICY 3.Information Collection and Use 4.Cookies 5.Log Data 6.Information Sharing and Disclosure 7.Accessing and Modifying Your Personal Information 8.References CONTENTS
  • 6. 2. Twitter’s Privacy Policy This Privacy Policy (“Policy”) describes • how and when Twitter collects, uses and shares your information when you use our Services. Twitter receives your information through various • websites, • SMS, • APIs, • email notifications, • applications, • buttons, • widgets, • ads, • commerce services (the “Twitter Services”), and • other covered services that link to this Policy (collectively, the “Services”) and • from Twitter partners and other third parties. 6 @keim_yansi For example, you send Twitter information when you use its Services on the • web, • via SMS, or from an application such as • Twitter for Mac, • Twitter for Android or • TweetDeck. When using any of its Services you consent to the collection, transfer, storage, disclosure, and use of your information as described in this Privacy Policy. Continued…
  • 7. 7 If you live in the United States, your information is controlled by Twitter, Inc., 1355 Market Street, Suite 900, San Francisco, CA 94103 U.S.A. “Irrespective of which country you reside in or supply information from, you authorize Twitter to use your information in the United States, Ireland, and any other country where Twitter operates.” @keim_yansi
  • 8. CONTENTS 8 1. About Twitter 2. Privacy Policy 3. INFORMATION COLLECTION AND USE i. Basic Account Information ii. Contact Information iii. Location Information iv. Links 4. Cookies 5. Log Data 6. Information Sharing and Disclosure 7. Accessing and Modifying Your Personal Information 8. References
  • 9. 3. TWITTER’S INFORMATION COLLECTION AND USE 9 Tip! Twitter collect and use your information below to provide its Services and to measure and improve them over time Continued… @keim_yansi
  • 10. When you create or reconfigure an account, you provide some personal information, such as  your name,  username,  password,  email address, or  phone number. On the Twitter Services, your NAME AND USERNAME ARE LISTED PUBLICLY, INCLUDING ON YOUR PROFILE PAGE and in search results, and you can use either your real name or a pseudonym. Some Twitter Services, such as  searching and  viewing public user profiles, do not require registration. 10 @keim_yansi Continued… i. Basic Account Information: Figure. Sign In/Sign Up Interface
  • 11. ii. Contact Information You may use your contact information, such as your • email address or • phone number to customize your account or enable Services, for example, • for login verification, • Twitter via SMS, or • Digits by Twitter. If you provide Twitter with your phone number, you agree to receive text messages to that number from Twitter. When you use Digits by Twitter to sign up for or login to a third-party application, you are directing Twitter to share your contact information, such as your phone number, with that application. We may use your contact information to send you information about our Services, to market to you, to help prevent spam, fraud, or abuse, and to help others find your account, including through third-party services and client applications. You may use your settings for email and mobile notifications to control notifications you receive from the Twitter Services. You may also unsubscribe from a notification by following the instructions contained within the notification or the instructions on our website.. 11 @keim_yansi Continued.. Figure. Twitter’s Contact Information
  • 12. III. LOCATIONINFORMATION 12 Twitter may receive information about your location. For example, • you may choose to publish your location in your Tweets and in your Twitter profile. • You may also tell us your location when you set your trend location on Twitter.com. Twitter may also determine location by using other data from your device, such as • precise location information from GPS, • information about wireless networks or • cell towers near your mobile device, or your IP address. Twitter may use and store information about your location to provide features of its Services, such as • Tweeting with your location, and • to improve and customize the Services,. For example, with more relevant content like • local trends, stories, • ads, and • suggestions for people to follow. @keim_yansi Figure. Location Information on Twitter Continued..
  • 13. 13 Twitter may keep track of how you interact with links across our Services, including our email notifications, third- party services, and client applications, by redirecting clicks or through other means. We do this to help improve our Services, to provide more relevant advertising, and to be able to share aggregate click statistics such as how many times a particular link was clicked on. IV.LINKS Figure. Representation of Twitter’s User Profile @keim_yansi
  • 14. CONTENTS 14 1.About Twitter 2.Privacy Policy 3.Information collection and use 4. COOKIES 5. Log Data 6. Information Sharing and Disclosure 7. Accessing and Modifying Your Personal Information 8. References
  • 15. 15 • COOKIES are small files that websites place on your computer as you browse the web. Like many websites, Twitter uses cookies to discover how people are using our services and to make them work better. • A PIXEL is a small amount of code on a web page or in an email notification. As many services do, we use pixels to learn whether you’ve interacted with certain web or email content. This helps us measure and improve our services and personalize your experience on Twitter. • LOCAL STORAGE is an industry-standard technology that allows a website or application to store information locally on your computer or mobile device. We use local storage to customize what we show you based on your past interactions with Twitter. 4. Twitter’s use of Cookies and similar technologies @keim_yansi Continued..
  • 16. Why does Twitter use these technologies?  Authentication and security  Preferences  Analytics and research  Personalized content  Advertising 16 Twitter uses cookies and other similar technologies, such as PIXELS or LOCAL STORAGE, to help provide you with a better, faster, and safer experience. Here are some of the ways that the Twitter services—including our various websites, SMS, APIs, email notifications, applications, buttons, widgets, and ads—use these technologies:  to log you into Twitter,  save your preferences,  personalize the content you see,  protect against spam and abuse, and  show you more relevant ads. @keim_yansi
  • 17. CONTENTS 17 1.About Twitter 2.Privacy Policy 3.Information collection and use 4.Cookies 5. LOG DATA i. Third Parties and Affiliates 6. Information Sharing and Disclosure 7. Accessing and Modifying Your Personal Information 8. References
  • 18. 5. LOG DATA: When you use Twitter’s Services, Twitter may receive information (“Log Data”) such as your  IP address,  browser type,  operating system,  the referring web page,  pages visited,  location,  your mobile carrier,  device information (including device and application IDs),  search terms, and  cookie information. 18 Twitter receive Log Data when you interact with its Services, for example,  when you visit its websites,  sign into its Services,  interact with its email notifications,  use your account to authenticate to a third-party website or application, or  visit a third-party website that includes a Twitter button or widget. Twitter may also receive Log Data when you  click on,  view or  interact with links on our Services, including links to third-party applications, such as when you choose to install another application through Twitter. Twitter uses Log Data to provide, understand, and improve our Services, to make inferences, like what topics you may be interested in, and to customize the content it show you, including ads. If not already done earlier, for example, as provided below for Widget Data, it will either delete Log Data or remove any common account identifiers, such as your username, full IP address, or email address, after a maximum of 18 months. @keim_yansi Continued..
  • 19. I. THIRD-PARTIES AND AFFILIATES: Twitter uses a variety of third-party services to help provide its Services, such as • hosting its various blogs and wikis, and • to help us understand and improve the use of its Services, such as Google Analytics. These third-party service providers may collect information sent by your browser as part of a web page request, such as cookies or your IP address. Third-party ad partners may share information with Twitter, like • a browser cookie ID, • website URL visited, • mobile device ID, or • cryptographic hash of a common account identifier (such as an email address), to help them measure and tailor ads. For example, this allows Twitter to display ads about things you may have already shown interest in off of its Services. If you prefer, you can turn off tailored ads in your privacy settings so that your account will not be matched to information shared by ad partners for tailoring ads. 19 @keim_yansi
  • 20. CONTENTS 20 1.About Twitter 2.Privacy Policy 3.Information collection and use 4.Cookies 5. Log data 6. INFORMATION SHARING AND DISCLOSURE i. User Consent and Direction ii. Service Providers iii. Laws and Harms iv. Non-Private or Non-Personal Information 7. Accessing and Modifying Your Personal Information 8. References
  • 21. 6. INFORMATION SHARING AND DISCLOSURE TIP: Twitter do not disclose your private personal information except in the limited circumstances described here. 21@keim_yansi Continued..
  • 22. I. USER CONSENT OR DIRECTION Twitter may share or disclose your information at your direction, such as when you authorize a third-party web client or application to access your account. Other users may share or disclose information about you, such as when they mention you, share a photo of you, or tag you in a photo. Your privacy settings control who can tag you in a photo on the Twitter Services. If you’ve shared information, like direct messages or protected Tweets, with another user who accesses the Twitter Services through a third-party service, keep in mind that the information may be shared with the third-party service. 22 @keim_yansi Continued..
  • 23. 23 Twitter engage service providers to perform functions and provide services to them in the United States, Ireland, and other countries. “They may share your private personal information with such service providers subject to obligations consistent with this Privacy Policy and any other appropriate confidentiality and security measures, and on the condition that the third parties use your private personal data only on our behalf and pursuant to their instructions.” They share your Payment Information with payment services providers to  process payments;  prevent, detect and investigate fraud or other prohibited activities;  facilitate dispute resolution such as chargebacks or refunds; and  for other purposes associated with the acceptance of credit or debit cards. Twitter may share your credit or debit card number with payment services providers or card networks to monitor card transactions at participating merchants and track redemption activity for the purposes of providing card-linked services. II. SERVICE PROVIDERS @keim_yansi Continued..
  • 24. III. Law and Harm Notwithstanding anything to the contrary in this Policy, Twitter may preserve or disclose your information if they believe that it is reasonably necessary to comply with a ▪ law, ▪ regulation, ▪ legal process, or ▪ governmental request; to ▪ protect the safety of any person; ▪ to address fraud, security or technical issues; or ▪ to protectTwitter’s rights or property. However, nothing in this Privacy Policy is intended to limit any legal defenses or objections that you may have to a third party’s, including a government’s, request to disclose your information. 24 @keim_yansi Continued..
  • 25. IV. NON-PRIVATE OR NON-PERSONAL INFORMATION Twitter may share or disclose your non-private, aggregated or otherwise non- personal information, such as  your public user profile information,  public Tweets,  the people you follow or that follow you, or  the number of users who clicked on a particular link (even if only one did),  reports to advertisers about unique users who saw or clicked on their ads after they have removed any private personal information (such as your name or contact information). 25 @keim_yansi Continued..
  • 26. CONTENTS 26 1.About Twitter 2.Privacy Policy 3.Information collection and use 4.Cookies 5. Log data 6. Information Sharing And Disclosure 7. ACCESSING AND MODIFYING YOUR PERSONAL INFORMATION 8. References
  • 27. 27  If you are a registered user of Twitter’s Services, they provide you with tools and account settings to access, correct, delete, or modify the personal information you provided to us and associated with your account. You can download certain account information, including your Tweets,  You can also permanently delete your Twitter account. When your account is deactivated, it is not viewable on Twitter.com. For up to 30 days after deactivation it is still possible to restore your account if it was accidentally or wrongfully deactivated. Absent a separate arrangement between you and Twitter to extend your deactivation period, after 30 days, we begin the process of deleting your account from our systems, which can take up to a week.  Keep in mind that search engines and other third parties may still retain copies of your public information, like your user profile information and public Tweets, even after you have deleted the information from the Twitter Services or deactivated your account. 7. ACCESSING AND MODIFYING YOUR PERSONAL INFORMATION @keim_yansi
  • 28. 28
  • 29. CONTENTS 29 1.About Twitter 2.Privacy Policy 3.Information collection and use 4.Cookies 5. Log data 6. Information Sharing And Disclosure 7. Accessing and modifying your personal information 8. REFERENCES
  • 30. 30  https://twitter.com/privacy?lang=en  https://twitter.com/signup  https://twitter.com/about  https://www.google.co.in/search?q=twitter+create+account&biw=1280&bih=923&source=lnms&tbm=is ch&sa=X&ved=0CAgQ_AUoA2oVChMIw9WphsPHyAIVicSOCh3JTQSx#tbm=isch&q=twitter+contact+inf ormation&imgrc=LZeHo7kg-3zpaM%3A  https://support.twitter.com/articles/20170514  https://ads.twitter.com/accounts/18ce546xify/one_time_setup?encoded_account_id=18ce546xify  https://support.twitter.com/  https://twitter.com/download?logged_out=1&lang=en&lang=en 8. References