Skip to main content

New Privacy Policy of Twitter

 


Twitter is one of the most commonly used social media networking platforms and is very popular amongst celebrities as well. People enjoy uploading tweets and retweets over Twitter. It is a good platform for social messaging, news and marketing, etc. But recently twitter has been in the news for a change in its privacy policy. Just a few weeks after the announcement that Elon Musk was going to acquire that social media platform, Twitter had revamped its privacy policy. Everyone was expecting something big after that announcement and many were curious to know if there will be any changes in that micro-blogging platform. Later on, Twitter introduced the privacy policy to their users by creating a video guide for users so that they can understand the privacy policy.


Also, Twitter has said that its new privacy policy is much more simplified and organized under three new heads namely data use, data sharing, and data collection. The new version of twitter’s privacy policy will take effect from June 10, 2022. They claim that the privacy policy explains how Twitter uses the data of their users, when they share the information of users and how much data they collect from users.


Twitter says it has used basic language for the privacy policy and it’s less legalese as compared to the earlier one so that every user can understand the key ingredients of the privacy policy. Just like a poor and duplicate version of ‘Super Mario’ they introduced the elements of the privacy policy via a game named ‘Twitter Dash Data’ which is a 2D game and a kind of fun way to take users through their privacy policy.

The new privacy policy on the website of Twitter has 6 main heads in the introductory part and it directs the users that even if they skip the whole part then also they must know these basic things. It includes the following clauses:

  • It states that it is a public platform and mentions what all can be viewed and what all can be searched on this platform ;

  • Mentions what information is collected from the users and how that information is collected from users;

  • Clarifies that some affiliates might have privacy policies that might differ from twitter;

  • It mentions how user’s data is used for making Twitter a better platform like for:  

  • Operating, improving, and personalizing their services;

  • For safety and security concerns;

  • For purpose of measuring, analyzing, and making their services better for users;

  • For communicating with the users about their services, and

  • For the purpose of research.

  • Then, it also mentions that users can control their experience on Twitter by updating the settings on it, and 

  • Lastly, it states that in case of any questions related to data usage, the users can freely contact them via their Privacy Policy Inquiries page or by reaching out at the addresses which have been mentioned in that clause.


It can be said that Twitter is trying to engage its users through that game so that they can create digital literacy and make everyone aware of the platform’s privacy policy. It is better for the users as they’ll understand the data protection and privacy options. Some people criticize it on the  grounds that the company’s privacy policy must reflect the disclaimer from the company’s perspective and must not be too user-centric. Some people also say that introduction about elements of privacy policy through the 2D game is not a fun idea and is very boring to play that game. But it cannot be denied that the simplified policy will attract the users to give it a read. 



By: Ritika Tejpal (Team Member. WCSF)


Stay connected with us: www.worldcybersecurities.com
To get latest updates on various cyber related events & other things, you can join our Whatsapp group/Telegram Channel





Comments

Post a Comment

Popular posts from this blog

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of...

Famous Cyber crimes That Targeted People Instead Of Money

  With the emergence in the field of technology, the number of cyber crimes have also emerged. Different types of cyber crimes daily take place such as phishing, email spoofing, data theft, identity theft, bullying, harassment, cyber extortion, ransomware attacks, etc. The majority of the people would opine that the Cyber criminals engage in these activities for the sake of money but there are numerous examples where money wasn’t the only target of the Cyber criminals, rather they targeted people.  The intent of cyber criminals,  targeting the people can differ from case to case. Sometimes it may target a single person or sometimes a large number of persons. Various examples show the instances where the target of the cyber crimes were people, be it belonging to specific religion or age group or sometimes a sole person. Various examples of such crimes are discussed below: Bulli Bai App - This app was created over the platform namely GitHub which is an open software develop...