- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Wed, 09 Jul 2014 07:08:25 -0400
- To: public-rww@w3.org
- Message-ID: <53BD22A9.8000707@openlinksw.com>
On 7/9/14 6:23 AM, Tim Holborn wrote: > Reasonably; with special regard to decentralised opportunities, a user > in the future may be able to select from an array of standardised > positions, such as. > > - use my data for the transaction purpose only > - add me to your loyalty program (perhaps permissions therein) > - share my details to your partners, associates and sponsors (equally > - perhaps for a specified purpose - i.e. for the purpose of promoting > this online petition…). > > secondly; an aspect relating to the data storage and accessibility of > data stored by 3rd parties about an individual becomes a secondary > inclusion. > > - We’ll store your details securely in our database (you don’t have > access to it). > - We’ll store your details securely and provide you an administration > interface > - We’ll store your details and you can delete / append / modify / > change privacy settings > - We’ll store your details and give you a copy (perhaps 5 star linked > data?) > - You can store the data, we’ll get it from you when we need it, but > store a back-up > - You store your data, if you loose it you’ll need to create a new > credential to gain access. > > I’ve found > http://wiki.creativecommons.org/CC-inspired_projects_for_Terms_of_Service_and_Privacy_policies You can't ask someone to perform these data access tasks on your behalf, and expect it to happen without privacy (self calibration of one's vulnerability, in any realm). What you can do is publish you data from a personal data space that provides you with the ability to construct data access controls or policies. On the Web, such a system is basically what you end up with when the following are put to proper use: 1. HTTP URIs 2. RDF statements 3. Logic. You can invert the current model (where they take your data for the illusion of $0.00 services on the Internet & Web), and leverage the nature of being a human individual en route to achieving all of the above. Remember, social network service providers can't really stop you creating encrypted content in the data space they provide i.e., in the most extreme cases, you can leverage symmetric and asymmetric data encryption. Email (where most privacy compromises start) has always had S/MIME (broadly implemented across existing operating systems -- desktop to mobile) as mechanism for achieving this goal, at internet scale. Add some RDF and Logic, and it works even better at Web-Scale, for instance. Government is only useful (re., construction and evolution of relevant laws) when they properly understand privacy in the digital realm. -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog 1: http://kidehen.blogspot.com Personal Weblog 2: http://www.openlinksw.com/blog/~kidehen Twitter Profile: https://twitter.com/kidehen Google+ Profile: https://plus.google.com/+KingsleyIdehen/about LinkedIn Profile: http://www.linkedin.com/in/kidehen Personal WebID: http://kingsley.idehen.net/dataspace/person/kidehen#this
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Wednesday, 9 July 2014 11:08:48 UTC