By
Raul Bernardino (Dino), B of Comp. Sc., MSc in ISM
Abstract:
Digital democracy is a place for you to use your
ideas and talents in order to develop an engaging, innovative, and simple to
use digital solution that will encourage more people to engage within Timorse society
and the globe communities.
The Digital Democracy enables you and your
community to discuss and prioritize issues, then challenges your member of the government
and parliament to respond. The positive aspects of using this digital
technology are bringing global communities to your own desk and start to share
and help one another with knowledge and best practices. It brings an effective
and efficiency solution to the problems that you normally experience.
The digital democracy also brings us some negatives
aspect of it. It is a free place to express and interact. Technology helps to
bring multi culture to interact and it might create a culture shock. Whereas,
the use of social media for free expressing, - not use a common sense or
constructive critiques anymore but use of threatening, negative arguments, offensive
words, etc.
Introduction:
Far
before digital era, knowledge sharing was costly and holds by certain groups. It
combines with copy rights and intellectual properties. The knowledge impacts to
the societies in general were very limited.
Nowadays,
the dissemination of the information and knowledge share across the globe is
just within a second. The digital technology helps to record and accessible at
any time and from anywhere. Even, the digital technology can transform old
available information and knowledge into digital industry.
We
all agree that, science and innovation are fundamental elements keys’ for the
economic advancement, competitiveness, and the wellbeing of the nations, while
the link between scientific researches, technological innovations, national
wealth, and social wellbeing are complex and involve many interacting elements.
During
20th century, the developed countries increased the resources to invest for
research, development, and technological innovation to improve living standard.
The step of change in innovation, with potential to impact on most facets of
our lives, is not showing any signs of diminishing as we enter the 21st
century.
Major
scientific discoveries of the 20th century namely: The splitting of the atom in
1932 at Cambridge University. The
invention of the transistor was at the Bell Laboratories in the USA in 1947. The
isolation of penicillin and the discovery of its antibiotic potency were in the
UK. The elucidation of the structure of
DNA was at Cambridge University in 1953 and followed by the separating of the
genetic code of all living organisms. The 20th century saw a diminution in the
time span between a major scientific discovery and its exploitation for the
benefit or non-benefit of mankind.
The
transistor could be considered to have had the greatest impact on our lives
within the revolution of information communication and technology, including
the development of the personal computer, the Internet, World Wide Web (WWW),
electronic applications, and electronic mail.
Therefore, small group in Timor- Leste has to commit to making the
Digital Democracy Challenge platform into
‘One Timor Concept’ as a great place to meet and interact with one and another.
By entering or participating in the Digital Democracy
Challenge you agree to abide by Code of Conduct. The Digital Democracy Challenge platform
may also have additional guidelines that govern your use, so be sure to review
them in addition to this Code of Conduct. Digital
Democracy Challenge is not responsible for any user-created content or
other user activities through the Digital Democracy Challenge platform. All
activity on the site is also governed by the Site's Terms of Use.
Timor-Leste Context:
Da Silva addressed Information Communication and Technology
(ICT) infrastructure in Timor-Leste in his writing on the digital review of
Asia Pacific (2009-2010). He specifically focused on the Timor-Leste National
Development Plan (NDP) for 2020. In this publication, he wrote about the
telecommunication monopoly by Timor Telcom (TT) – owned and operated by
Portugal Telecom International (PTI). Since March 2002, TT or PTI has been the
only telecom operator and the formal ICT backbone in Timor-Leste. However, the
international institutions (World Bank Group, Asia Development Bank, Embassies,
etc.) are allowed to have their own communication networks.
Recently, this situation has been changed. The
government of Timor-Leste reviewed the NDP in 2011 and renamed the document
‘Timor-Leste Strategy National Development Plan (SNDP) 2011-2030. In this
strategy, the government of Timor-Leste has stated that the telecommunication
sector will be a priority in 2015.
The government of Timor-Leste has adopted telecom
liberalization and the implementation in which is now on track. There are three
licenses issued by the government of Timor-Leste for telecom operators (Timor
Telecom, Telin – Telecommunication Indonesia International latest known as Telekomcel,
and Vittel-Vietnam telecommunication- latest known as Telmor). The goal of the
liberalization is to establish stable, modern telecommunication networks to
connect the people of Timor-Leste to the rest of world within affordable and
reliable access (tools for Digital Democracy).
Dale addressed social networking in Timor-Leste as a
construct of preexisting social culture, such as with elite politicians and
leaders using Facebook to establish their own support networks. She
specifically stated that “social networks can play a beneficial role
by channeling information, bringing new ideas, or providing social support in
times of emergency”, Dale (2011). Bernardino commented on one of her blogs
that: ”people are social and tend to
interact with one another by connecting to the people who share their knowledge
and ideas, the best practices around, and communicate their needs and
coordinate the available resources, and collaborate their different ideas and
form new ideas”, Bernardino (8 March 2012).
Tambowon’s (2011) dissertation “proposed to design and build a digital community by using available ICT
infrastructure” to facilitate Timorese students learning the Portuguese
language. Furthermore, Tambowon referred to this idea as a global community of
language learning along with promoting the global cooperation worldwide. She suggested
the use of digital storytelling and a web site as the community platform, with
the focus on a community platform interface in which to link or connect the
Portuguese speaking people around the world with Timorese students that are
learning Portuguese. Form this we can infer that Tambowon’s global community
refers to social networking capability.
Silove’s psychiatric research publication described
that: “Timor-Leste workers need a
capacity building management because they are in low and middle income”,
Silove (2011). Furthermore, Silove phrased that, it is important to be
proactively identifying the effective programs for a staff’s psychosocial
needs. Here, it can be assured that the ICT tools can help the workers or staff
to perform their tasks more efficiently and effectively while continuing their
education. For instance, ICT tools can establish an online community where
staff or workers can build their own capacity and gain knowledge by using
online learning programs, connecting and interacting with the right person
(exchange knowledge and experiences), get online mentoring, etc. from other
parts of the world without having to leave office and travel overseas.
At this point in time,
global communication has been extended by the social capability tools which
have become an integral part of the new technology development implementation.
Social capability will improve and maintain the business operations, personal,
and professional relationship in their dependency of the computing and
networks.
Moreover, technology
development brings the innovations and imitates a real social environment
virtually. This technology enables people to connect and establish
communication with other people around the world which allows them to more
easily interact with the right, skillful person and to share their expertise.
Additionally, doctors can save lives via virtual conferences. In some
instances, they simply share their knowledge and expertise and learn from
others. The technology allows work from remote locations and can eliminate the
need to travel. Other good examples of
the benefits of social technology are distance learning with the use of video
conferencing tools to facilitate the learning process, the on-line or virtual
classes using the internet as a tool for interaction between students and
professors, etc. Potashnik and Capper
quoted that “distance education is
becoming increasingly popular as economic forces encourage, and new
technologies facilitate, its spread”, Potashnik and Capper (1998). This
means social technology allows us to have classes and meet classmates
virtually.
In reality, Timor-Leste
Face-Bookers and other social networking users are not really maximizing the
collaboration and coordination of the best practices in order to facilitate
their daily work to be efficient and effective. Most face-bookers and other
social networking use of offensive words, unconstructive critics etc. This situation may also contribute to the
instability of the nation.
Another
issue in the government of Timor-Leste ICT implementation is the digitalizing of
office documents for archiving. For example, civil servants were not archiving
official documents properly, but rather in local data storage (USBs, desktops, or
laptops). Although the data is centralized by the department file sharing
system - there are many duplications across the system. As a consequence of
local data storage, much of it cannot be shared, there is less accurate
information available for the decision making process, staff time is consumed by
searching for one particular document or another, there are higher storage costs
borne by the institution, and the risk of data loss is very high due to lack of
proper backups. In some circumstances, staff time is consumed by rebuilding a lost
document, especially if no version track is available. Additionally, security,
integrity, and document auditing are other issues associated with local data
storage. According to Gartner (2009), “employees
spend between 30 and 40 percent of their time creating, searching for,
retrieving, repurposing and organizing documents”.
Documents
are often shared across departments. But by using Microsoft file sharing tools
in which we cannot track or audit when or how the documents were last modified or
deleted. Recently, in August 2012, the fifth iteration of the government of Timor-Leste
formed to replace the previous government. This new government has had no data
or information handed over to assist in the continuation of governmental operations.
The result of this is that some programs or plans will not be continued. The new
political appointments of the fifth government may have to redo the work. This
means that a great deal of time will be consumed rebuilding lost or corrupted
data. One way to avoid this issue in the future is for the government of Timor-Leste
to create policies and procedures for data management. Furthermore, the
government needs to hire business analyst consultants to take part in the analysis
of information across government departments and to build a business process
model accordingly. The system analyst will be required to define the system
specification details and the developer will develop according to the design
and specifications provided.
Document
management is a critical issue for the government of Timor-Leste’s future
operations and a part of the institutional memories that Timorese youth and
students can use as a resource for future studies and research. Additionally,
it will provide a framework for future governments to build on. The government
of Timor-Leste has to take immediate action and develop a comprehensive plan to
create a system of national data management and an archive to hold this newly
organized information.
Another
problem encountered in government institutions is manual paper work which slows
down the decision making processes. For instance, the process of developing a
document on a computer, printing the document, and signing and copying the
document before the originals are sent to various destinations and the copies are
archived in a filing cabinet. People have to be diligent in filing all documents
according to the topic, version, and date. If a document is missing, it may be
hard to find. Therefore, it is important to digitalize and automate manual
paper work and the signature process. Moreover, digitalizing and automating
these processes can facilitate auto workflow capability which will move the
object (document, form, etc.) according to the role and functions in the
organizational hierarchies.
According
to Morphy (2012), “the IBM industry has
enhanced the social enterprise application with IBM connections. This IBM
connection can integrate the user’s wikis, blogs, emails, and calendars which
are attached to the person”. IBM has simplified business file sharing,
social networking, online meetings and instant messaging including real time document
editing via a cloud based productivity suite. This product facilitates
effective operations, especial those involving communication.
Furthermore,
Rozwell at Gartner (2012) stated that, it is important “to communicate and educate the employees on the role of social media
and record management policy”. The conclusion is that social media needs to
be regulated. However, how to regulate it becomes a big question for every
industry and most organizations as it impacts the data protection and privacy. The Constitution of Timor-Leste states that the
“right
to honor and privacy, inviolability of home and correspondence,
and protection of personal data”
(Timor-Leste Constitution, 2002:36-38).
The
current ICT infrastructure, through which each government department is connected,
is not reliable. The fiber optic connections that run from building to building,
which are designed to connect government departments in Dili, do not function properly.
Most of the ICT infrastructure uses access points to establish communication
among the departments and staffs.
Moreover,
there are very few email and file printing servers in government departments.
Almost all Non-Government organizations, civil servants and ministers use
public email servers such as Gmail or Yahoo to communicate with coworkers and
line ministers. For instance, if one staff member sent an email with an
attachment to her supervisor for review in the next room, or even a supervisor
sitting directly beside her, it would take ages to reach them. This is because
the email has to go out to the international servers before coming back to the supervisor’s
desk. Almost all government business operations are centralized in the capital.
Because of the centralization, there is not much ICT infrastructure connecting the
central government with authorities in the districts or future municipals. Some
government institutions that have offices in the capital and the districts currently
use Very Small Aperture Terminal (VSAT) for
internet communication. Others use Timor Telecom 3G and Telecomcel. The
internet bandwidths in Timor-Leste are too expensive. Timor Telecom 3G cost is 2$
an hour. Despite this, most of the government departments use Timor-Telecom’s
internet services. The bandwidth speed for these services is 1 MB per second for
uploads and downloads at a total cost of about $10,000 per month. To overcome
the low bandwidth distribution among government entities, several government
institutions have leased internet services through VSAT communications. The
cost of leasing VSAT for 1MB per second upload and 2 MB per second download is about
$8,000-$9,000 per month.
The
question is why do we have to rely on internet communication, while most of the
interactions are between Timor-Leste government officials? The answer is because
these officials use public emails (Gmail, Yahoo, etc.) for their daily
operations. This is evidence that the government of Timor-Leste has wrongly
invested in the ICT sector. Also, the government must bear in mind that the current
ICT system and its infrastructure are not secure, not cost effective, and not
efficient. Therefore, it is important to build an internal or local loop for
government communication. This means that the communication among the staff is
done on internal servers, while only external communication would rely on the
internet. By using the internal or local loop for communication, the government
could secure its communication and save a lot of money.
To
achieve this local loop communication, the government needs to invest in local
back bone infrastructure in order to connect both local departments and departments
out in the districts or future municipals. Secondly, the government needs to
invest in a data center and local server
infrastructure for each department. Finally, the government of Timor-Leste
has to create a single directory in which communication is established based on
a central point of contact where government employees are allowed to securely connect, communicate, coordinate and collaborate
(4Cs).
Once
the local loop and data center are established, users need training in order to
optimize the use the technology. One part of the training is to improve security
by improving understanding of specific topics, tips and tricks, with mentoring and
desk side coaching. This optimizes the use of technological features and helps avoid
the risks such as viruses, phishing, spam, etc.
Conclusion:
It is important to
underline that, social technology allows us to connect, communicate,
coordinate, and collaborate with the intended people from anywhere in the world
and at any time we need. We have to connect and establish a communication in
order to coordinate and collaborating the ideas and knowledge in order to
improve our own productivity, skills, knowledge, and also maintain our contact
relationships. Technology has changed document
centric into people centric
environments.
The challenges of having
social capability in the ICT system environment are that people have different
cultures, languages, time zone, and work and life balance. These difficult
situations can be easily overcome by having common missions, objectives, and
goals.
Reference
Lists:
Adams, A. A. &
McCrindle, R. J. (2008). ‘Pandora’s Box’:
Social and
Professional issues of the
Information age. West Sussex, England: John Wiley &
Sons, Ltd.
Atos (2012) Code of Condact for Digital Democracy
Challenges [On-line].
Available from: http://www.digitaldemocracychallenge.co.uk/content/code-conduct
(Accessed: 9 January 2013)
Benaroch, M. (28
May 2002) Managing Information Technology
Investment Risk:
A real options Perspective [On-Line].
Available from: http://myweb.whitman.syr.edu/mbenaroc/PAPERS/jmis/jmis-1.pdf (Accessed: 9 January 2013)
Bernardino, R. (15
October 2011), Virtual team Challenges
[On-Line].
Available
from: https://api.turnitin.com/dv?o=208114469&u=22718044&s=&student_user=1&lang=en_us&session-id=80777bff0bed75724ccdf5795545191f
(Accessed: 21 August 2012)
Bird, J. (2003) Work-life Balance Defined – what it really
means [On-Line].
Available
from: http://www.worklifebalance.com/worklifebalancedefined.html
(Accessed: 21 August 2012)
Buecker et al (2012)
Enterprise Single Sign-On Design Guide Using
IBM
Security
Access Manager for Enterprise Single Sign On [On-Line].
Available from:
http://www.redbooks.ibm.com/redpieces/abstracts/sg247350.html?Open
(accessed: 21 August 2012)
California Department
of Education (2005) History-Social
Science Frame
work
[On-Line]. Available from: http://www.cde.ca.gov/ci/cr/cf/documents/histsocsciframe.pdf
(Accessed: 21 August 2012)
Cole, B. (2012)
Communication, Policy vital to social media records
management
[On-Line]. Available from: http://searchcompliance.techtarget.com/tip/Communication-policy-vital-to-social-media-records-management?utm_content=SMPL2&asrc=EM_USC_18458730&pre=off&Offer=mn_eh082212COMPUNSC_SMPL2&
(Accessed: 21 August 2012)
Clemons, E.K.
and Weber, B. (1990) Strategic Information Technology
Investments: Guidelines for decision making, Journal
of Management Information Systems, Vol. 7, No. 2, p. 9-28.
Dale, P. (2011). ‘Timor-Leste’: Ties
that Bind: Studying Social Networks in
Timor-Leste [On-Line].
Available from:
http://blogs.worldbank.org/publicsphere/ties-bind-studying-social-networks-timor-leste
(Accessed: 21 August 2012)
Dehning, B. and
Richardson, V. J. (2002) Return of Investment in
Information
Technology:
A Research Synthesis, Journal of
Information Systems Vol. 16 No.1 Spring, p.7-30 [On-Line]. Available from: http://web.chapman.edu/asbe/faculty/bdehning/papers/JIS.pdf
(Accessed: 21 August 2012)
Deirdre, A. and Clare, K. (2009) Flexible
working and engagement: the
importance
of choice, Strategy HR Review, Volume 8, Number 2, 2009 , pp.
13-18(6) [On-Line]. Available
from: http://www.ingentaconnect.com/search/article?option1=tka&value1=Flexible+working&pageSize=10&index=3
(Accessed: 21 August 2012)
Fry, S. (2011) Real-world
engineering & technology special
[on-line].
Available
from:
http://issuu.com/realworldmagazine/docs/_11_new_engineering?mode=window&backgroundColor=%23222222
(accessed: 21 August 2012
Hall, P. A.V. &
Fernandez-Ramil, J. (2007) Managing the Software
Enterprise:
Software Engineering and Information
Systems in Context. London: Thomson Learning.
Heizer, J. and Render, B. (2011), Operations Management, 10th
edition,
Global Edition: Pearson
Hoke, C. and et al (6
December 2011) Workshop on Governance of
Technology,
Information, and Policies (GTIP): Addressing
the challenges of Worldwide Interconnectivity [On-Line]. Available from: http://www.acsac.org/2011/workshops/gtip/
(Accessed: 21 August 2012)
Huczynski, A. &
Buchanan, D. (2010) Organizational Behavior (7th Ed)
Essex:
Pearson Education
IBM (2008) Lotus Domino going green: The
new Lotus Domino
attachment
and object service [On-Line]. Available from: http://www.ibm.com/developerworks/lotus/library/domino-green/
(accessed: 17 August 2012)
IBM
(2012) IBM Connections Takes Further Lead In
Enterprise
Social Networking: Everything Old Is New
Again In The Digital Age [On-Line]. Available from: http://revmediamarketing.com/ibm-connections-takes-further-lead-in-enterprise-social-networking/
(accessed: 21 August 2012)
IBM (2012) IBM Hones
Social Enterprise Tools [On-Line]. Available from:
http://www.technewsworld.com/story/74200.html
(Accessed: 21 August 2012)
IBM (2012) Lotus
Workflow [On-Line]. Available from:
http://www-01.ibm.com/software/lotus/products/workflow/
(Accessed: 21 August 2012)
iDM (2009) Innovative Document Management [On-Line].
Available from:
http://www.idmafrica.co.za/ (Accessed: 21 August 2012)
ISO/IEC 27002:2005 Information technology —
Security techniques —
Code
of practice for information security management [On-Line].
Available from:
http://www.iso27001security.com/html/27002.html
(Accessed: 10 September 2012)
Kremp, E. and Mairesse,
J. (January 2004) Knowledge Management,
Innovation,
and Productivity: A Firm Level
Exploration Based on French Manufacuring CIS3 Data [On-Line]. Available
from: http://www.nber.org/papers/w10237
(Accessed: 21 August 2012)
Limi, A. (10 December
2009) Powerful Workflow Capabilities [On-Line].
Available
from: http://plone.org/products/plone/features/old/3.0/new/powerful-workflow-capabilities
(Accessed: 21 August 2012)
MacCormack, A., Verganti, R. & lansiti, M.
(2001) Developing Products on
Internet Time: The
Anatomy of a Flexible Development Process, Management Science 47, no. 1
(January 2001).
MacCormack, A. (2001) Product Development Practices
that work: How
Internet Companies
Build Software, MIT Sloan Management Review,
Winter 2001 pp. 75-84
O’Lear, S. (2010)
Siemens PLM Software: Enabling innovation
through
Enterprise data management [On-Line].
Available from: http://www.plm.automation.siemens.com/en_us/Images/8937_tcm1023-38461.pdf
(Accessed: 21 August 2012)
Pemberton, S. (2012) Open Standards Rich Internet Application
[On-Line].
Available
from: http://www.w3.org/2007/Talks/09-26-steven-berlin/
(Accessed: 21 August 2012)
Potashnik, M. and
Capper, J. (1998) World Bank’s Education and
Technology
Team, Distance Education: Growth and Diversity
[On-Line]. Available from: https://tojde.anadolu.edu.tr/fdmarchnws.htm
(Accessed: 21 August 2012)
Quest Software (2012) Single Sign On (SSO) [On-Line].
Available from:
http://www.quest.com/identity-administration/sso.aspx
(Accessed: 21 August 2012)
Schwalbe, K. (2011)
Information Technology: Project
Management,
Revised
6th edition,
Scott, C. (27 March
2012) Study Finds Major Weaknesses in the
SSO
systems
[On-Line]. Available from:
http://www.cio.com/article/702973/Study_Finds_Major_Weaknesses_in_Single_Sign_on_Systems
(accessed: 21 August 2012)
Social Media Framework
(2011): Online Identity [On-Line].
Available from:
(Accessed:
21 August 2012)
Stewart, W., Coulson, S. and Wilson, R. (2007)
Information Technology:
When
is the Worth the Investment? [On-Line]. Available
from: http://www.iima.org/CIIMA/14%20CIIMA%207-3-07%20Stewart%20119-122.pdf
(Accessed: 21 August 2012)
The New York, Albany
University publication (2012) Chapter One: ROI
and the Need for Smart IT
Investment Decisions [On-Line]. Available from:http://www.ctg.albany.edu/publications/guides/roi?chapter=3§ion=3
(Accessed: 21 August 2012)
The Open Group (2010) Introduction to Single Sign On (SSO)
[On-Line].
Available
from: http://www.opengroup.org/security/sso/sso_intro.htm
(Accessed: 21 August 2012)
The Texas A&M
University System (2012): Single Sign On [On-line].
Available
from: https://sso.tamus.edu/Logon.aspx?ReturnUrl=%2f
(Accessed: 21 August 2012)
Warren, C. (16 February
2012) the pros and Cons of Cross-Platform App
Desin
[On-Line]. Available from: http://mashable.com/2012/02/16/cross-platform-app-design-pros-cons/
(Accessed: 21 August 2012)
Waynforth, C. (2010) Single Sign On (SSO) definition [On-Line].
Available
from:
http://searchsecurity.techtarget.com/definition/single-sign-on
(Accessed: 21 August 2012)
Appendix:
Code of Conduct of Digital
Democracy within One Timor Concept and It’s Challenges
Respect Each Other:
One Timor Concept team encourages everyone to treat each other
equally with mutual respect. Do not
use the Digital Democracy Challenge platform (future 1TimorConnect) to
threaten, harass, stalk, or abuse others. The Digital Democracy Challenge
reserves the right to remove posts that advocate or encourage expressions of
violence, bigotry, racism, hatred, or profanity. Digital Democracy Challenge
within One Timor Concept administrators may remove postings that are
deemed inappropriate, offensive or that violate guidelines or this Code of
Conduct. Digital Democracy Challenge may also eject or ban any user from their
area who behaves in a manner deemed inappropriate, offensive or who violates
guidelines or this Code of Conduct. By participating in any area of the Site,
you agree to be bound to the rules of that area.
Keep It Legal
Digital Democracy Challenge does not allow any illegal activities.
You cannot use the Digital Democracy Challenge platform to publish, post,
distribute, or disseminate defamatory, infringing, obscene, or other unlawful
material or information, specifically, but not limited to, child pornography,
bestiality and incest. Also, you may not use the Digital Democracy Challenge
platform for chats relating to illegal drugs. You may not use the Digital
Democracy Challenge platform for the purpose of linking to external sites that
violate this Code of Conduct. Do not upload files or post messages that contain
photos, music, software or other material protected by intellectual property
laws, rights of privacy or publicity or any other applicable law unless you own
or control the rights thereto or have received all necessary consents. Digital
Democracy Challenge is not responsible for any use of anything you say or post.
Do not post any materials (including software and other information) that could
harm (or is designed to harm) other users' computers or would allow others to
inappropriately access software or Web sites. Digital Democracy Challenge does
not tolerate disruptive activity online, such as persistent off-topic comments
and postings or statements that incite others to violate this Code of Conduct
or participate in illegal activities. Our Site's users want to post on our
Digital Democracy Challenge platform in a positive environment. Digital
Democracy Challenge does not allow the posting of destructive features, use of
computer programs that contain such features, or access to any content that
contains destructive features such as: viruses, worms, Trojan horses, or bots
for the use of scrolling, showing multiple screens, and other activities that
can be disruptive to online communication. Falsely impersonating a Digital
Democracy Challenge employee, agent, manager, host, or any other person with
the intent to mislead or cause harm to others is forbidden.
Please don't Spam
Please don't "spam" through our Digital Democracy
Challenge platform, none of our users like it. To spam includes sending
identical and irrelevant submissions to many different discussion groups,
mailing lists, chats or communities. Usually such postings have nothing to do
with the particular topic of the group or are of no real interest to those on
the mailing list. To spam also includes misrepresenting the source of anything
you say or post. Spamming and trolling in chat rooms are serious violations of
online etiquette. Digital Democracy Challenge reserves the right to ban a user
at any time, without notice, from any or all Digital Democracy Challenge
platform for spamming.
Keep it personal
The Digital Democracy Challenge platform areas may be used to
provide supplementary information regarding your own business (provided you do
not use spam to provide this information); however, the Digital Democracy
Challenge platform areas are not designed to be used as the primary mechanism
for operating your business or providing core information about your business.
Any space provided to you, if any, in any Digital Democracy Challenge platform
is for your own personal use. You may not sell, license, give away, exchange or
barter any space provided to you within the Site for any purpose including,
without limitation, selling, licensing, exchanging or bartering space for
advertisements.
Be responsible and liable
You are responsible and liable for all your activities while
participating in any Digital Democracy Challenge platform area. Remember, you
are responsible for anything you say or post and for protecting your own
computer system. We recommend you install a virus protection program on your
computer. Our Digital Democracy Challenge platform areas are not designed as
the primary places to store any materials; you are responsible for creating
backups of materials you post to any Digital Democracy Challenge platform such
as photos or documents. Digital Democracy Challenge is not responsible for loss
of, access to, or deletion or alteration of any materials included on the Site.
Digital Democracy Challenge reserves the right to remove at any time, without
notice, any posting to the Site. Some users may post external website links on
the Site. Please be advised that Digital Democracy Challenge is not responsible
for any of the content on these linked websites. Some content and links on the
Internet may contain adult content and may not be suitable for children. You
are responsible for any actions you may take based on advice or information you
receive online. Use your own good judgment when evaluating information provided
through this Site's Digital Democracy Challenge platform or any other such
services, remember that the information provided could be from people at any
age and experience level. The decision to conduct transactions with anyone is
your own and you should conduct your own research prior to making any
decisions.
Uphold the Code
In helping to make our Site a great place to meet and exchange
information, you must do your part to uphold this Code of Conduct. Digital
Democracy Challenge also reserves our right to amend or change the Code of
Conduct at any time without notice. You agree to periodically review this
document to ensure you are doing your part. Digital Democracy Challenge is not
obliged to send users or hosts a warning before deleting any content.
Protect Your Privacy
We caution you against giving out personally identifiable
information (such as social security numbers, credit card numbers, names and
addresses, telephone numbers, driver license numbers) to strangers online,
which may be used for illegal or harmful purposes. Some personal information
you provide to Digital Democracy Challenge may be stored outside of the country
in which you reside.
Thank you for following this Code of Conduct and joining the
Digital Democracy Challenge online community!