Difference between revisions of "Privacy Regulation"
(→Context) |
(→Context) |
||
Line 8: | Line 8: | ||
There are four [[Entity|entities]] that are in play here. In most legislation all of the [[Entity|entities]] beside the user are considered in one lump as [[Data Controller]]s. | There are four [[Entity|entities]] that are in play here. In most legislation all of the [[Entity|entities]] beside the user are considered in one lump as [[Data Controller]]s. | ||
− | #The [[user]] on a user device (aka a | + | #The [[user]] on a user device (aka a [[User Agent]]). |
#The resource provider (aka a [[Relying Party]].) | #The resource provider (aka a [[Relying Party]].) | ||
#[[Identifier or Attribute Provider]]s. | #[[Identifier or Attribute Provider]]s. |
Revision as of 10:26, 19 August 2018
Full Title or Meme
A list of various ways in which Governments have responded to User's Privacy concerns.
Context
Governments typically respond to changes in their constituent's online Ecosystems only when the pressure to change becomes unbearable.
There are four entities that are in play here. In most legislation all of the entities beside the user are considered in one lump as Data Controllers.
- The user on a user device (aka a User Agent).
- The resource provider (aka a Relying Party.)
- Identifier or Attribute Providers.
- Data Harvester or Broker
All of these have lobbyists working in the halls of government, but the ones that represent the User do not carry the same clout as those that represent the corporate interests. Also the lobbyist that claim to represent the user typically do not bother to ask the user what problems they actually would prefer to solve, but rather represent "issues", which may, or may not be actual User concerns.
Problems as Seen by the User
Users have a variety of reasons not to let their personal information be broadly available, some of those are:
- The right to the "let alone" based on a legal theory of Warren and Brandies.
- Intimidation by people with evil intent (an active reason to be "let alone").
- Government harassment (not always your own government), or worse.
- Harassment by organizations what want to change the government, or worse.
- Annoyance by trolls or advertisements by scammers looking profit by your vulnerability.
- The easiest feature for any web site is allowing the user anytime access to remove themselves from any email.
- The best feature for any web site is allowing the user anytime access to remove all record of them.
- The use of personal data to "steal you identity"; often lumped with privacy, this is usually criminal larceny.
- Loss of potential (or real) earnings or direct attack on funds on deposit.
- Tracking on-line makes you feel weird (where there is not any direct personal loss).
- Pretending to be you in order to cause you legal or social problems, possibly as a means of blackmail.
- Embarrassment over one's past behavior or attributes (may also create direct personal loss).
- Discrimination based on one's personal attributes, health history or behavior.
- You are a crook or deviant.