![]() Our private information policy also covers threats, bounties, or encouragement to expose someone’s private information, including through hacking.Our private information policy covers the sharing of private information without consent, regardless of how the private information was obtained.Note: Other portions of the Twitter Rules may apply to material obtained through hacking, or to the actions of individuals associated with a hack. In addition, we may label Tweets containing or linking to hacked materials to help people understand the authenticity or source of these materials and provide additional context. As such, we don’t permit the use of our services to directly distribute content obtained through hacking by the people or groups associated with a hack. We do not condone attempts to compromise or infiltrate computer systems. The use of hacks and hacking to exfiltrate information from private computer systems can be used to manipulate the public conversation, and makes all of us less secure online.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |