Re: personal data policy

On 7/9/14 6:23 AM, Tim Holborn wrote:
> Reasonably; with special regard to decentralised opportunities, a user 
> in the future may be able to select from an array of standardised 
> positions, such as.
> - use my data for the transaction purpose only
> - add me to your loyalty program (perhaps permissions therein)
> - share my details to your partners, associates and sponsors (equally 
> - perhaps for a specified purpose - i.e. for the purpose of promoting 
> this online petition…).
> secondly; an aspect relating to the data storage and accessibility of 
> data stored by 3rd parties about an individual becomes a secondary 
> inclusion.
> - We’ll store your details securely in our database (you don’t have 
> access to it).
> - We’ll store your details securely and provide you an administration 
> interface
> - We’ll store your details and you can delete / append / modify / 
> change privacy settings
> - We’ll store your details and give you a copy (perhaps 5 star linked 
> data?)
> - You can store the data, we’ll get it from you when we need it, but 
> store a back-up
> - You store your data, if you loose it you’ll need to create a new 
> credential to gain access.
>  I’ve found 

You can't ask someone to perform these data access tasks on your behalf, 
and expect it to happen without privacy (self calibration of one's 
vulnerability, in any realm).

What you can do is publish you data from a personal data space that 
provides you with the ability to construct data access controls or 
policies. On the Web, such a system is basically what you end up with 
when the following are put to proper use:

2. RDF statements
3. Logic.

You can invert the current model (where they take your data for the 
illusion of $0.00 services on the Internet & Web), and leverage the 
nature of being a human individual en route to achieving all of the 
above. Remember, social network service providers can't really stop you 
creating encrypted content in the data space they provide i.e., in the 
most extreme cases, you can leverage symmetric and asymmetric data 
encryption. Email (where most privacy compromises start) has always had 
S/MIME (broadly implemented across existing operating systems -- desktop 
to mobile) as mechanism for achieving this goal, at internet scale. Add 
some RDF and Logic, and it works even better at Web-Scale, for instance.

Government is only useful (re., construction and evolution of relevant 
laws) when they properly understand privacy in the digital realm.


Kingsley Idehen	
Founder & CEO
OpenLink Software
Company Web:
Personal Weblog 1:
Personal Weblog 2:
Twitter Profile:
Google+ Profile:
LinkedIn Profile:
Personal WebID:

Received on Wednesday, 9 July 2014 11:08:48 UTC