{"id":1435,"date":"2010-06-09T09:30:43","date_gmt":"2010-06-09T16:30:43","guid":{"rendered":"http:\/\/www.talesfromthe.net\/jon\/?p=1435"},"modified":"2010-06-09T09:30:43","modified_gmt":"2010-06-09T16:30:43","slug":"discussion-what-rights-should-users-social-network-users-have-draft","status":"publish","type":"post","link":"https:\/\/2024.thenexus.today\/index.php\/2010\/06\/09\/discussion-what-rights-should-users-social-network-users-have-draft\/","title":{"rendered":"What rights should social network users have?  (DRAFT!)"},"content":{"rendered":"<p style=\"text-align: center;\"><span style=\"color: #ff0000;\">Draft!\u00c2\u00a0 Work in Progress!\u00c2\u00a0 Feedback welcome!<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ff0000;\">Final version intended for the <a href=\"http:\/\/cfp.acm.org\/wordpress\/\">Computers, Freedom, and Privacy<\/a> blog.<\/span><\/p>\n<p><!--more--><\/p>\n<p>In <a href=\"http:\/\/cfp.acm.org\/wordpress\/?p=341\" target=\"_blank\" rel=\"noopener\">It&#8217;s time for a Social Network Users&#8217; Bill of Rights<\/a>, we described the value of a bill of rights and sketched out the plan: a <a href=\"http:\/\/www.cfp2010.org\/wiki\/index.php?title=Panel:_Social_network_users'_bills_of_rights\">panel<\/a> on Tuesday with authors of the most recent bills of rights; discussions at the conference and online through the week; final debate and voting at the forum on Friday.  We also linked to several existing versions of bills of rights and related documents, which provide a great starting place for the discussion.<\/p>\n<p>Let&#8217;s kick things off by asking a basic question: what do we want the bill of rights to cover?<\/p>\n<p>Several themes come up repeatedly in the documents so far. <b>Informed decision making<\/b> and <b>transparency <\/b> covers topics like notice before changes, the ability to see who can access data (including apps), clear user interfaces and simple settings, notification of law enforcement or private party access.   Users should have <b>ownership<\/b> and <b>control <\/b>of their profile data and photos and activity and geolocation information and so on, sites should take only a limited license to use it, and sites shouldn&#8217;t share information without asking users for permission.  Users should have <b>the right to leave <\/b>by deleting their accounts and <strong>data portability<\/strong> so that they can take their information with them.<\/p>\n<p>Of course, these aren&#8217;t the only kinds of rights.\u00c2\u00a0 Rebecca Mackinnon&#8217;s excellent <a href=\"http:\/\/rconversation.blogs.com\/rconversation\/2010\/05\/more-problems-in-facebookistan.html\" target=\"_blank\" rel=\"noopener\">More problems in Facebookistan<\/a> highlights the importance of <b>due process<\/b> (for example decision by a person before suspending an account and right to appeal). <b>free expression<\/b> is an important value as well. \u00c2\u00a0  free-association.net&#8217;s <a href=\"http:\/\/free-association.net\/\">constitutional convention<\/a> also had discussions of <b>pseudonymity<\/b> and <b>multiple identities<\/b>, a topic recently discussed by Michael Zimmer and on <i>CrookedTimber<\/i> (<a href=\"http:\/\/michaelzimmer.org\/2010\/05\/14\/facebooks-zuckerberg-having-two-identities-for-yourself-is-an-example-of-a-lack-of-integrity\/\" target=\"_blank\" rel=\"noopener\">1<\/a>, <a href=\"http:\/\/crookedtimber.org\/2010\/05\/14\/an-internet-where-everyone-knows-youre-a-dog\/\">2<\/a>, <a href=\"http:\/\/crookedtimber.org\/2010\/05\/14\/actually-having-one-identity-for-yourself-is-a-breaching-experiment\/\">3<\/a>), <b>accessibility<\/b>, and the <b>right to use privacy-enhancing technologies. <\/b> <a href=\"http:\/\/www.sfgate.com\/cgi-bin\/article.cgi?f=\/c\/a\/2010\/05\/21\/EDMT1DHE16.DTL\" target=\"_blank\" rel=\"noopener\">We, the users<\/a> suggests that social network users have the right to be <strong>treated as a community, not a data set<\/strong>.<\/p>\n<p>The list goes on &#8230; and I&#8217;m sure there are some that aren&#8217;t covered by any of the existing documents.<\/p>\n<p>So let&#8217;s start the discussion.\u00c2\u00a0 Please share your thoughts, for example:<\/p>\n<ul>\n<li>which of these rights do you think are important?<\/li>\n<li>what other rights &#8212; or different wordings of these &#8212; would you like to see?<\/li>\n<li>what else should people read to get new perspectives?<\/li>\n<\/ul>\n<p>Drop your comments here, tweet them on the #BillOfRights hashtag, put them on Facebook &#8212; or do your own blog post to go into more detail.\u00c2\u00a0 One way or another, please join in the conversation!<\/p>\n<p>jon<\/p>\n<p><em>In addition to the Social Network Users\u00e2\u20ac\u2122 Bill of Rights, this  year\u00e2\u20ac\u2122s Computers, Freedom, and Privacy conference also features discussions of Robots and Civil Liberties, Augmented Minds, Cybersecurity, the History of Cypherpunks, and more!\u00c2\u00a0 See the <a href=\"http:\/\/cacm.acm.org\/blogs\/blog-cacm\/91829-computers-freedom-and-privacy-in-a-networked-society-june-15-18-in-san-jose-and-cyberspace\/fulltext\">introduction<\/a>,   <a href=\"http:\/\/www.acm.org\/press-room\/news-releases\/2010\/cfp-2010\/\">media   release<\/a> and\u00c2\u00a0 <a href=\"http:\/\/www.cfp2010.org\/wiki\/index.php\/Program\">full conference   program<\/a> here \u00e2\u20ac\u00a6 and if you haven\u00e2\u20ac\u2122t registered yet, <a href=\"http:\/\/cfp.acm.org\/?p=334\">what are you waiting for?<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Draft!\u00c2\u00a0 Work in Progress!\u00c2\u00a0 Feedback welcome! Final version intended for the Computers, Freedom, and Privacy blog.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1435","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/1435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/comments?post=1435"}],"version-history":[{"count":0,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/1435\/revisions"}],"wp:attachment":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/media?parent=1435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/categories?post=1435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/tags?post=1435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}