Dribbble Emily Donahue. Contents What is Dribbble? What Dribbble Collects......and What They Don’t What Does Dribbble Do With My Info? Creative Commons.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA Health Insurance Portability and Accountability Act 1.
Using Technology the CCSD Way by Dr. Kathi Vanderbilt.
Do you own video you create for teaching? Kevin L. Smith Duke University Libraries Office for Copyright & Scholarly Communications, Duke University Libraries.
By: Brad Templeton Presented by: Kelly Canales “10 Big Myths about Copyright Explained?”
Web sites should always post a privacy policy, where they tell you why they need information from you and what they will do with it. If you're not sure.
Privacy Online TC 310 June 17, Weekly Review Questions Courts v. FCC in mergers Jurisdiction of FCC in mergers Why FCC can block, even with DoJ.
Standards and Guidelines for Web Page Publishing December 9, 2009.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Career Planning. Copyright © Houghton Mifflin Company. All rights reserved.Career Planning- 2 Begin the process now You already know a lot about your.
Electronic Use Policies.   Social Media  Internet.
Copyrights and Wrongs Day 03. Essential Question How can I make responsible choices when I use other people’s creative work (pictures, etc)?
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Emily Adler, Megan Gasvoda, and Kristine McNally.
First Amendment TC 310 June 24, Specifically Free Speech Clause Purpose  Concerns of “Founding Fathers”  Biased towards political speech Balance.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Copyright Presentation Table of Contents 1.Understanding Copyright Tips for Identifying the License (March 6, 2014: updated from Sept 19, 2013) 2.Applying.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Contents: 1. The copyright context 2. Image copyright and teaching 3. Image databases: copyright clearance 4. Image databases: copyright management 5.
MTTS Standard 3 By Sara Angell. Legal use of digital media.
THE SAFE AND ETHICAL USE OF TECHNOLOGY IN SCHOOLS PRESENTED BY JESSICA CHAIDEZ TECH 503.
A copyright is basically the legal exclusive right of the author of a creative work to control the copying of that work. COPYRIGHT LAWS.
11 Copyright Myths By: Michael Armstrong. What is a copyright? A copyright is the exclusive right to make copies, license, and otherwise exploit a literary,
I promise…. To always ask my parents before going online.
Sears Privacy Policy & Security information Shaina Lacher.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Acceptable Use Policy By: Ashley Crehan Jessica Harmon Emily Edwards.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Chapter 1: Stats Starts Here Introduction. What is the difference between Statistics and statistics?  Statistics (singular) is a way of reasoning along.
“ 10 Big Myths about Copyright Explained” By: Brad Templeton Presented By: Nichole Au December 6, 2007.
Internet Literacy Evaluating Web Sites. Objective The Student will be able to evaluate internet web sites for accuracy and reliability The Student will.
Legal implications of using and editing graphical images By Jamie colclough.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
The Acceptable Use of Technology
UTS Library 2016 workshop Copyright for Researchers
Using the Computer Responsibly
By Laurel Bacon 12/1/16 8th grade Career Prep
4. Intellectual Property and Ethics on the Web
Latest Updates on BlackHawk Mines Music : Privacy Policy
LAUSD Responsible Use Policy (RUP)
Keep it Open: Building Public Sites in the Wild
Big Data, Big Responsibility
Keeping yourself right with copyright
General Data Protection Regulations
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
Google Privacy Policy Karen Tao.
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
Move this to online module slides 11-56
Internet Literacy Evaluating Web Sites.
Creative commons licenses 101
Everything you wanted to know about Creative Commons Licenses
Guess that number ? ? This document is released under Creative Commons License Attribution 4.0 International. Please feel free to share and adapt this.
Guess that number ? ? This document is released under Creative Commons License Attribution 4.0 International. Please feel free to share and adapt this.
This document is released under Creative Commons License Attribution 4
Copyright & Fair Use What You Need to Know!.
My Digital Footprint….
Browsing in Private Mode
You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance.
Photo by Jess Watters on Unsplash
Presentation transcript:

Dribbble Emily Donahue

Contents What is Dribbble? What Dribbble Collects......and What They Don’t What Does Dribbble Do With My Info? Creative Commons Sharealike License Conclusion Sources

What’s Dribbble? “Show and tell for designers” Graphic design, UI design Job postings Privacy policy based on Wordpress.com’s Creative Commons Sharealike license

What Dribbble Collects... Non-personally identifying information browser, time/date, referring site, etc. Personally identifying information IP address, address Cookies

... And What They Don’t “ We don’t ask you for personal information unless we truly need it. (We can’t stand services that ask you for things like your gender or income level for no apparent reason.) ”

What Does Dribbble Do With My Info? Complies with the law Develops products Protects rights Doesn’t store info unless needed to provide a service Statistics (non-identifying)

What Does Dribbble Do With My Info? “ Dribbble collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitors interaction with Dribbble ”

Creative Commons Sharealike License Commons Deed - license in layman’s terms Free to share and adapt the work Free to make commercial use of the work Doesn’t override copyright law

Conclusion First instinct: someone could profit from my work! Dribbble is a great resource for designers Would still consider using Dribbble

Sources