Difference between revisions of "Personal Privacy"

From MgmtWiki
Jump to: navigation, search
(Problems)
(Problems)
Line 20: Line 20:
  
 
User have a variety of reasons not to let their personal information be broadly available, some of those are:
 
User have a variety of reasons not to let their personal information be broadly available, some of those are:
* The right to the let alone based on  
+
* The right to the "let alone" based on a legal theory of Warren and Brandies.
 
* The use of personal data to "steal you identity".
 
* The use of personal data to "steal you identity".
 
* Embarrassment over one's past behavior or attributes.
 
* Embarrassment over one's past behavior or attributes.
 
* Loss of potential (or real) earnings.
 
* Loss of potential (or real) earnings.
* Intimidation by people with evil intent.
+
* Intimidation by people with evil intent (an active reason to be "let alone").
  
 
==Solutions==
 
==Solutions==

Revision as of 08:14, 21 June 2018

Full Title or Meme

A list of various ways in which user private information can be protected by user actions now and in the future.

Context

Pages on the site where the broad definitions may be found:

  • Privacy is the page where the broad definitions may be found.
  • Identity Pathologies is the page where the various vulnerabilities are delineated.

User private data is required for release of web resources. Minimizing the amount of data released or its misuse after release is the object of this effort to list the steps that can be taken today by user as well as the developments that are still evolving.

There are four entities that are in play here.

  1. The user on a user device (aka a user agent).
  2. The resource provider (aka a relying party.)
  3. Identifier and Attribute Providers.
  4. Data Harvester or Broker

Problems

User have a variety of reasons not to let their personal information be broadly available, some of those are:

  • The right to the "let alone" based on a legal theory of Warren and Brandies.
  • The use of personal data to "steal you identity".
  • Embarrassment over one's past behavior or attributes.
  • Loss of potential (or real) earnings.
  • Intimidation by people with evil intent (an active reason to be "let alone").

Solutions

These are the steps that should be considered now

These are some of the steps under development

References