11.07.2015 Views

Information Ethics in Africa: - Africa Information Ethics Portal

Information Ethics in Africa: - Africa Information Ethics Portal

Information Ethics in Africa: - Africa Information Ethics Portal

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ethical Dimensions of the <strong>Information</strong> Scoiety: Implications for <strong>Africa</strong>7. <strong>Ethics</strong> and social mediaSocial media providers expect users of their services to adhere to some basic standards of ethicalbehaviour, but the mechanisms for enforc<strong>in</strong>g compliance rema<strong>in</strong> weak. For example, Facebook has aStatement of Rights and Responsibilities and a user privacy policy that governs their relationship withusers and others who <strong>in</strong>teract with their social media platform. The privacy policy provides guidel<strong>in</strong>esof how <strong>in</strong>teraction with others takes place and how Facebook collects and uses clients’ content. Thecontent owner is required to grant Facebook exclusive, transferable, sub-licensable, royalty-free,worldwide licence to use the content (Facebook, 2012). This <strong>in</strong>tellectual property licence, <strong>in</strong> theory,ends when a client deletes the content or the account, unless the content has been shared withothers, and they have not deleted it. However, <strong>in</strong> practice, removed content may still exist <strong>in</strong> backupcopies for some time, while not be<strong>in</strong>g made available for access. Consequently, once <strong>in</strong>formation isout of the hands of the contributor, there is limited guarantee that even if it is deleted from thecontributor’s account, the <strong>in</strong>formation becomes permanently unavailable because it is likely to havebeen accessed by other users who would still be keep<strong>in</strong>g it.Facebook says it relies on client trust and goodwill <strong>in</strong> an attempt to protect other people’s rightsand to enhance safety (Facebook, 2012). Furthermore, Facebook <strong>in</strong> its user policy says it does notallow the under 13 age groups or sex offender convicts to use their services. However, there are noexplicit ways of ensur<strong>in</strong>g only legitimate users register to use their platform. In addition, Facebook hasno way of verify<strong>in</strong>g the <strong>in</strong>tegrity, honesty, reliability or accuracy of the <strong>in</strong>formation they receive fromusers (Facebook, 2012). This also applies to Twitter, which does not require e-mail verification oridentity authentication (Twitter, 2012). Generally, the user policy guidel<strong>in</strong>es of major social mediaplatforms explicitly <strong>in</strong>demnify service providers from liability <strong>in</strong> the event of any litigation aris<strong>in</strong>g out ofbreach of rights of their users or other parties. For example, Facebook’s user policy says “[…] Ifanyone br<strong>in</strong>gs a claim aga<strong>in</strong>st us related to your actions, content or <strong>in</strong>formation, you will <strong>in</strong>demnifyand hold us harmless from and aga<strong>in</strong>st all damages, losses, and expenses of any k<strong>in</strong>d (<strong>in</strong>clud<strong>in</strong>greasonable legal fees and costs) related to such a claim” (Facebook, 2012). Facebook’s user policyalso says there are no guarantees for the service providers to ensure strict compliance with ethicalprovisions, either through policy or technological <strong>in</strong>terventions. In this respect, Facebook is explicitthat “[w]e do our best to keep Facebook safe, but we cannot guarantee […] [o]ur platform is bug free,safe, and secure” (Facebook, 2012).In contrast, most Twitter profile <strong>in</strong>formation is public, so anyone can see it. Accord<strong>in</strong>g to Twitter(2012), non-public <strong>in</strong>formation about its users is only released as lawfully required by appropriatelegal processes such as a subpoena, court order, or other valid legal processes. Twitteracknowledges that the <strong>in</strong>formation they store from users may not be accurate. L<strong>in</strong>kedIn (2012), <strong>in</strong>contrast, states that the <strong>in</strong>formation the client provides is used to create and distribute advertis<strong>in</strong>grelevant to the [client’s] L<strong>in</strong>kedIn experience. Moreover, the responsibility for compliance with all theseprovisions is left solely to the user. L<strong>in</strong>kedIn’s policy acknowledges that whereas personal <strong>in</strong>formationthe user provides will be secured <strong>in</strong> accordance with <strong>in</strong>dustry standards and technology, the Internetis not a 100% secure environment, consequently there is no guarantee that <strong>in</strong>formation may not beaccessed, copied, disclosed, altered, or destroyed by breach of any of their physical, technical, ormanagerial safeguards. The YouTube Team (2012), on the other hand, states that every communitythat features on its platform <strong>in</strong>volves a certa<strong>in</strong> level of trust. The customer is therefore expected to beresponsible as millions of users respect that trust. The policy advises users to know that YouTubeworks closely with law enforcement agencies.Page 35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!