0% found this document useful (0 votes)
74 views

Progress Process Booklet - Thematic

The document discusses privacy and security risks related to personal information online, often referred to as "digital dirt." It notes that over 90% of employers will search prospective candidates online and up to 50% of information found could be incorrect, from minor errors to false criminal records. The document explores ways for individuals to better manage their online profiles and digital footprint to avoid potential issues related to personal information being publicly available online.

Uploaded by

aideelily
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views

Progress Process Booklet - Thematic

The document discusses privacy and security risks related to personal information online, often referred to as "digital dirt." It notes that over 90% of employers will search prospective candidates online and up to 50% of information found could be incorrect, from minor errors to false criminal records. The document explores ways for individuals to better manage their online profiles and digital footprint to avoid potential issues related to personal information being publicly available online.

Uploaded by

aideelily
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Megan Lambie

Thematic Project Cloud Computing

Privacy & Security

Clean up your Digital Dirt


Privacy & Secu Our Lives are
rity Risks Documented le
“Digital Dirt” Buiding a profi

............
. ....... . ......
...... ............ ............

People are beco arch the Somewhere be


ming worried ab ployers will se tween 10 - 50 pe
own privacy an
d the huge amou
out their Over 90% of em pe ct iv e records on any rcent of the see how much
information stor nt of online reputatio
n of pros given person co Experiment to g web
ed about them re inviting for
interview from a minor ag ntains errors uld acquire usin
Government an by the candidat es be fo that suggests on
e error to false
information information I co
d companies lik lable to all.
e Tesco. criminal record
e has bad credit
or a technology avai
. Initial idea
Privacy Celeb
“Digital Dirt” rities
Clean up your Find yourself
online

............ ............
....... .......
.......
............

Ways in which
Celebrities are you could catc
otect your ing you to your “digital di h and filter
Be proactiv e in steps to pr constantly unde
r threat to y websites help rt.”
their private liv
es. There are man .
online data. the interent
find yourself on

Key Reading
ent
nship Managem e - Digital Vaul
t
Vendor Relatio Personas Final Outcom
ll

............ .....
. . . .Ellie
. . . . . .Goldin
. . . . . . . .g
. . .-. Social
. . . . . . . . .Life.

..
............

............
.... ............
..

.......
. . . .Jim
. . . . .Allen
. . . . . . . -. .Leisu
Ellie Golding is . . . . . . .re
. . .&
24 living in a rented . . .Healt
. . . . . . h.
..........
on her first job. flat ..

...................
..........
..

She is keen to Jim Allen is


get the best overdra retired.
she is spending ft at the bank as
more than she He is interes
is making. ted in:
She is interested Savings.
in: Special deals
Mobile phone at super marke
tariff
Special deals for deals.
Discount vouche ts.
clubs. Cheap concer rs.
Package holiday t and Theatr
s, Local social e tickets.
Cheap flights. events.
Medical Advan
ces - remote
appointments blood pressu
She is on social . re
networking sites. Online videos
and
Keeping in touch entertainment.
with relatives
and grandchildren
.

Danah Boyd -
people don’t ca and make complete
secrecy but they re about r personal data cu re and under your
do care about People own thei sa tio ns. I used personas A n ea sy, se
to managing yo
ur own
control. rtain organi to identify how
control facility
it available to ce types of people
would use the
different
service. data.
Cloud Computing

Initial Research - Group Work. Security

Firstly we were to research into Cloud We share much more valuable


Computing as a class, my section of information on the internet than we
research was on privacy and how cloud realise
computing would affect / change our
ideas surrounding privacy. If we liberate our personal information,
the value drops.
Firstly what are the benefits of Cloud
Computing? We need to focus our security on things
beyond personal information.
• Significant cost savings.
• Reduced energy consumption. We have changed the way we share
• Greater business flexibility - pub- private moments.
lic bodies can host their specific
computer systems on the cloud and We take pride in presenting our
source capacity on a rental ‘on de- experiences.
mand’ basis, avoiding the costs and
delays involved in purchasing and We protect different aspects of our lives
running their own datacentres. by having multiple personas.

Is it secure?

• There are concerns over data security


within the cloud. As the cloud has
the ability to hold large amounts of
data, errors and incorrect information
is bound to be present.
• “Customers may not know where
their data is stored or how many
times it’s been replicated” - Analyst
Chenxi Wang.
• “Cloud computing decouples data
from infrastructure and obscures
low-level operational details, such
as where your data is and how it’s
replicated.” - Wang.
Research

Privacy & Security

The Internet can be a dangerous place. People should also be concerned about
1 in 8 web-users have been victim of Government/Private companies looking
some kind of online fraud. at and using cloud computing to save
Nearly £3 billion was lost last year alone. money. Is this data safe? And who has
Very few people realise just how much access to it?
information can be accessed about us, if
you know where to look. Peoples attitudes seem to have changed,
call it openness or exhibitionism. On
I researched privacy and security risks at twitter you can post your thoughts minute
present and saw that people are becoming by minute. On Facebook and Flickr
worried about their own privacy and the personal photographs.
huge amount of information stored about
them by the Government and companies Experts say the erosion of privacy brings
like Tesco. dangers for both individuals and the
wider population.
At present the retailer now tracks the
shopping habits of 16m families across
The internet is a rich ground for
Britain through the Tesco loyalty card and
identity theft. This does not easily mesh
buying preferences, delivering an
with a life that creates it’s own
extraordinary insight into their lives, not
digital shadow.
only for themselves but for companies
such as Coca-Cola, Nestlé and Unilever
which buy the rights to the data.

People are not categorised by where they


live or their educational status anymore
but instead are filtered into sub-groups
eg. whether they have a baby or a pet, and
whether they like to cook a lot or can’t
cook at all.
Tesco is predicting within a decade global
marketing budgets to be spent on ads
directed at individuals based on their
purchasing habits - this includes targeted
TV advertising to individual households.
Research

Another consequence, which stems from


our electronic shadow creation is that
while we join more and more social
media sites, it has made it easier, faster
and more efficient for prospective
employers and candidates to find a match.

But, on the other hand, it only takes a


quick web search to reveal the person’s
natural inclinations, which can knock you
out of the running for your dream job.

Over 90% of employers will search the


online reputation of prospective
candidates before inviting for interview,
this is an increase of 65% since 2001.

“Digital Dirt” causing employers to reject


applicants include...

• Provocative photographs.
• Inappropriate content.
• Discussions about alcohol or drug
use.
• Bad mouthing previous employers.
• No concept of grammar by using text
language.

There are numerous examples in the


news of people sacked or rejected by
employers due to inappropriate material
posted on social networking sites and
such like.

Just the other day news broke of a British


teacher who committed suicide after an
ex-boyfriend posted explicit images on
Facebook and a quick Google shows that
this is not an isolated case.
Research

These are just the more common sites


that document our lives.

But information is also compiled from


the electoral register, property records,
court documents, government databases
etc.

Many of the companies buy and sell this


date without your permission or
knowledge.

The problem (besides the violation of


privacy) is that these records are very
likely to contain errors.

Somewhere between 10 - 50 percent of


the records on any given person contains
errors from a minor age error to false
information that suggests one has bad
credit or a criminal record.
How easy is it to build a profile on
John Smith?

I undertook an experiment to see how As you can see it is very easy to build a
much information I could acquire using profile of John Smith, with this
web technology available to all, to build a information I could carry out various
profile of someone I don’t know. illegal operations. Of course I didn’t!

Facebook - date of birth, interests,


education, e-mail address, family etc.

Flickr - his photos

Electrical register - name, address.


(Since 2002 it has been possible to opt
out from our information being public.)

www.192.com - holds data from


official sources - (old and current
registers. Some parts of this web service
you have to pay for but once you do - you
can get anything you want!)

It would also be possible to use:


(but I am far to honest to.)

E-mail/Amazon/eBay - (most people


use passwords relevant to them - hacked
easily.)

Google latitude - “See where your


friends are right now.” Free GPS
tracking service available on Computer,
most BlackBerry devices, Nokia smart-
phones, iPhone and iPod touch devices.
Phone can locate you and uploads onto
site, also possible to manually upload
your location too.
How to Look After Your Online Presence

An increasing number of employers are Remember, that there is no such thing


doing that search before making a hiring as complete deletion of anything on the
decision. web; everything is archived somewhere,
and savvy computer users may be able
You don’t want to be precluded from a to gain access. Furthermore, you cannot
job opportunity or ambushed in an control what others post about you on
interview because of your digital dirt. their sites, blogs or profiles.

Clean up your profiles on any social You might find some unflattering
networking sites such as LinkedIn, information about yourself on the web.
Myspace, Facebook etc - also YouTube.
The key is to be proactive and take steps
Remove any potentially embarrassing to clean up as much as possible before a
information, comments, photos or videos. prospective employer sees it.

Disconnect links to other sites that might If information is found, attempt to get it
have content inconsistent with your removed, updated or corrected.
professional image, and cut off links to
any friends or acquaintances with
questionable content on their pages.

Be especially selective of the music and


photos you chose to include.

Designating your profile, or parts thereof,


as private does not block access to
everyone. U.S Governmental agencies
still may be able to read it in its entirety
by virtue of the Patriot Act.
Privacy and Security - Celebrities.

Celebrities are often under constant “anyone in the public eye, whether
attack on their private lives. through choice or inadvertently, is
entitled to protection for their private
lives.” - Susan Hall.
Privacy law in the UK is terribly
confusing. It derives from a patchwork of It is the intensely private aspects of a
legal areas, including the Data Protection celebrity’s life - involving drugs, sex or
Act, the Human Rights Act and common sexual orientation, marital discord, issues
law breach of confidence and is heavily with children or other family members,
dependent on the specific facts of each or similar topics - that the public and the
case. media deem newsworthy. (Illegality only
ratchets up the stakes, and increases
“The issue many people have is that interest in the story.)
celebrities are only too happy to pose for
photographs and give interviews when
receiving a fee but when another party In the news: Peaches Geldof, photos of
tries to cash in on their fame, they claim a “heroin-fueled one-night stand” were
that their privacy rights are being leaked on the internet this week.
exploited.” - Media law specialist Susan
Hall

Take Catherine Zeta Jones’ £500,000 case


against Hello! magazine. She claimed
that the magazine violated her and
“Check out more celebs
Michael Douglas’ privacy by printing
getting busted by leaked pics
unauthorised photographs of their
- you’ll see a nude Hills star,
wedding day. She had however, signed a
saucy sex tapes, scary drug
lucrative deal with rival magazine OK!,
use and more!”
leading some people to question whether
she had wavered her right to privacy by
agreeing to publicise the wedding in the
first place.

Another widely publicised case was


Naomi Campbell’s breach of confidence
claim against the Daily Mirror. It saw the
supermodel win £3,500 worth of
damages after the paper printed
photographs of her leaving a drug rehab
clinic in 2001.
Research ‘Find Yourself Online’.

There are plenty of websites, blogs and


articles stipulating that the internet has
made it cheap and easy to run detailed
background checks on anyone. And that
it is important to be aware of your online
presence.

Some tell people to “Destroy the


evidence” and to actively join Flickr,
LinkedIn, user group profile and start
a blog, which will appear in the top 10
results of a search engine thus pushing
down other results.

I came across many sites which trawl


databases to show people what
information comes up when they do a
search on their name. Most of these were
only available for US citizens:

• PeopleData.com
• PeopleLookup.com
• WhitePages.com
• Peoplefinders.com

Although I did find some for the UK:

• Peopletraceonline.co.uk
• 192.com
• Lookuppeople.co.uk
• Theelectroralroll.co.uk

But there is nothing available to enable


the process of deleting and destroying
inappropriate data once it has been found
in a search.
Research Questionnaire.
“I’m sure I have written blogs
What would you remove? and things that I have
forgotten about and not
updated that I would want to
remove, just incase someone
saw them.”

“I just googled myself the other


day and cringe.com! mind piczo!
ha, piczo websites, mind pure
chavy!”

“I have always wanted to know


if I am on any police records.”

“I’ve got lots of photos on the internet


from when I was 15years old, from
joining whatever site was popular at
the time. One was called Faceparty,
but I can’t remember the passwords to
be able to delete them.”

Main points:

• How do I get it back?

• Most of the information people


would want back is things they
posted when they were younger.

• Naïve - Some people just don’t


realise how much information is
available on them, and how it can be
used without their permission.
Development of Ideas.
Select Language - English >

Input usernames and passwords for all accounts held


in your name: SCANNING FOR
SENSITIVE DATA...
I started by thinking how can you protect
your digital shadow? Social Networking sites:
-Faceparty
Accounts which will b constantly
• Could you hide it? Please enter :
scanned for sensitive data, are:

• Could you disguise it? Username: Stephybaby88


Facebook - Added
• Shield it? Bebo - Added
Twitter - Added
Password: *********
• Scatter in different directions? Wordpress Blog - Added
Hotmail - Added

But the compulsion to broadcast our


every move and the era of reality TV has
encouraged this need for the personal to
become public and the idea of retracting
your “Digital Shadow” when you are
not using it wasn’t very popular. People
“need” and “want to” be out there.

So the need then changed to removing the


inappropriate data, your “Digital Dirt”
from the digital shadow. As well as
constant monitoring of any information
which appears on that person.

I took the idea of a current virus sanitiser


and how it scans for the computer virus
then disinfecting it.

Retrieving data which is sensitive


which you can then destroy.
Digital Vault

In order for the service to be constantly


scanning for inappropriate content or to
alert you to the fact you are leaking too
much personal information, the
program needs to know all user names
and passwords for the sites that the user
is involved with to access them.

You may think why give all your security


codes to this service when privacy and
security is the top priority. It would work
in the same way that a “digital vault”
would.

Once all usernames and passwords are


uploaded the program would then be able
to make sure the user wasn’t using the
same password more than once, reducing
the risk of multiple account hacking.
Further Research -
Information Commissioner.

The Data Protection Act gives have breached security risks so that you
individuals the right to know what can actively change passwords or at least
information is held about them. It be aware of the risks. At present you are
provides a framework to ensure that required to go onto ICO.com and look
personal information is handled properly. through the list.

The Act works in two ways. Firstly, it One of the big areas of privacy and
states that anyone who processes personal security concerns at present is data
information must comply with eight handling by third parties. Managing
principles, which make sure that personal and analysing vast amounts of customer
information is: information is a complex activity, many
organisations hand over the data they
• Fairly and lawfully processed have collected to specialists.
• Processed for limited purposes
• Adequate, relevant and not excessive According to research undertaken by
• Accurate and up to date security research firm the Ponemon
• Not kept for longer than is necessary Institute, data breaches involving third
• Processed in line with your rights party providers jumped to 44% of the
• Secure total last year, up from 21% in 2005.
• Not transferred to other countries They also cost more to deal with at
without adequate protection around £140 per compromised record
compared with an average of £123.
The second area covered by the Act Select Language - English >

provides individuals with important Cooporations that you have a relationship with who
have breached security risks:
rights, including the right to find out what
personal information is held on computer St James Primary School - sensitive personal data relating Investigate
and most paper records. to a number of pupils.

Royal Bank of Scotland - sensitive personal data Change Passwords


missing on memory stick.

The Information Commissioner also Birmingham and Solihull Mental Health NHS
Foundation Trust - theft of an unencrypted laptop computer
produces a ‘sin list’ of all the companies which contained personal data relating to some 1,500 of Trusts
Change Passwords
patients and some 450 staff.
who have been involved security
Redstone Mortgages Ltd following the disclosure of
breaches and loss of data. reports containing personal data of over 15,000 mortgage Change Passwords
customers

This gave me an idea. People sign up Billing Pharmacy Ltd - follows the theft of an
unencrypted computer containing sensitive personal data
Change Passwords

to my service and as well as offering a for around 1,000 customers.

service which constantly scans for


inappropriate content you may have left,
it can also send alerts regarding any
company you have relations with who
Key Reading - Danah Boyd

Privacy. Behaviour.

So as I see it, young people don’t care


Danah Boyd is a Social Media
about secrecy but they do care about
Researcher. Her research investigates
control. They don’t want to lose the
everyday practices involving social
respect of friends, family and future
media, with specific attention to youth
employers.
engagement.

Privacy isn’t about secrets, Danah Boyd


says; it’s about control. Every system
that gets to extract information from
your data limits the amount of control
you have. ‘Control’ implies that you can
find the information and have it removed
or ‘cloaked’. Free services walk a fine
balance between extracting enough value
from the users to keep them in business
and taking away so much control that the
users go elsewhere.

Boyd says, “Privacy Is Not Dead. People


of all ages care deeply about privacy. And
they care just as much about privacy
online as they do offline. But what
privacy means may not be what you
think.”

“Privacy is about having control over


how information flows. It’s about being
able to understand the social setting in
order to behave appropriately. To do so,
people must trust their interpretation of
the context, including the people in the
room and the architecture that defines the
setting. When they feel as though control
has been taken away from them or when
they lack the control they need to do the
right thing, they scream privacy foul.”
Vendor Relationship Management.

I then came across Vendor VRM development work is based on the


Relationship Management. Which belief that free customers are more
changed my thinking for my design valuable than captive ones — to
outcome. themselves, to vendors, and to the larger
economy. To be free:
VRM stands for Vendor Relationship
Management. • Relationships must be voluntary.
• Customers must enter relationships
VRM involves flipping the concept of with vendors as independent actors.
Customer Relationship Management • Customers must be the points of
(CRM) on its head by creating a integration for their own data.
standards based framework, out of which • Customers must have control of data
online tools and services can be they generate and gather. They must
developed, to enable consumers to take be able to share data selectively,
back control of their own personal voluntarily, and control the terms of
information. its use.
• Customers must be able to assert
People own their personal data and make their own terms of engagement and
it available to certain organisations. service.
• Customers must be free to express
In a narrow sense, VRM is the reciprocal their demands and intentions outside
— the customer side — of CRM of any one company’s control.
(or Customer Relationship Management).
VRM research work probes the
VRM tools provide customers with the willingness and ability of customers to
means to bear their side of the assert and enjoy independence from
relationship burden. They relieve CRM of vendors and of vendors’ willingness and
the perceived need to “capture,” ability to value and engage with
“acquire,” “lock in,” “manage,” and independent customers.
otherwise employ the language and
thinking of slave-owners when dealing These tools are currently in development.
with customers.
It would ultimately mean that numerous
With VRM operating on the customer’s private or public sector organisations
side, CRM systems will no longer be would no longer need huge amounts of
alone in trying to improve the ways information about individuals in
companies relate to customers. massive databases that they spend time
Customers will be also be involved, as and money on trying to manage, protect
fully empowered participants, rather than and analyse.
as captive followers.
My Service proposal. How would it work?

Customers put their information into their There is then an incentive for the
own personal digital vault which is under companies to give you important and
their complete control, no copies will be valuable information and advertisements,
taken and stored elsewhere. Completely not just junk mail. As at any point you
secure. can cut the company off viewing your
data.
Organisations would no longer need huge
amounts of information about individuals Companies would offer great deals and
in massive databases that they spend time treat you amicably in return for access to
and money on trying to manage, protect your data.
and analyse.

The customer owns their own data •••••


entering relationships with vendors on
their terms, allowing them access to their With people concerned about
personal digital vault. The customer is Government and private companies using
able to set their preferences as to which cloud computing to save money, as well
companies or categories they are as the concerns over data security within
interested in. Depending on their needs or the cloud due to the clouds ability to hold
interests. large amounts of data, errors and
incorrect information is bound to be
Built apon what service they wish more present. There is also the problem with
information can be put in. customers not knowing where their data
is stored or how many times it has been
Your TV channels, internet use, car stats, replicated.
health stats, utilities by using a smart
meter and web, phone and mobile phone With this service these problems are no
use could all be hooked up and constantly longer an issue.
feeding into your data.

Different Services require different


information. Over time more and more
information is added about you and your
life style and because this information is
yours, you have control of who you give
it to.
ll

. . . Ellie
. . . . . . .Golding
. . . . . . . . . . -. . Social
. . . . . . . . Life.
...............................
How is this service going to help
Ellie?

Ellie Golding is 24 living in a rented flat on her Ellie can allow access to her data
first job. depending on which companies
she is interested in allowing them
She is keen to get the best overdraft at the bank as to send her offers on products
she is spending more than she is making. and services, for example mobile
phone tariffs in Ellie’s case.
She is interested in:
Mobile phone tariff deals. If a certain company isn’t sending
Special deals for clubs. any useful advertising she has the
Package holidays, ability to cut them off. Thus not
Cheap flights. giving them access to her personal
data.
She is on social networking sites.
. . . Callum
. . . . . . . . . . Stone
. . . . . . . .-. Family
. . . . . . . . . .Life.
.............................
How is this service going to help
Callum?

Callum is a middle aged family man. Callum is able to hook up his


internet use, telephone/mobile use,
He is interested in reducing utility bills e.g.: gas and electricity use, as well as
Phone. what TV channels he watches and
Electricity. car stats to the service. Which is
Mortgage. then constantly feeding into his
Gas. personal data bank allowing his
chosen companies to view, then
He is interested in: offering him the best deal.
Gadgets.
New car. Callum is extremely privacy
What his car usages are/ current stats. conscious and with this service he
Family holidays. has complete peace of mind that
Possible job opportunities so he is on job sites his personal data is secure and
such as LinkedIn etc. safe with it being in one place as
Online music streaming. the move to cloud computing as
School reports/ university prospectuses, parents threatened security and data
nights. accuracy.
Loyalty cards for example Tescos.
. . . Jim
. . . . . Allen
. . . . . . . .-. .Leisure
. . . . . . . . .&
. . . Health.
...............................
How is this service going to help
Jim?

Jim Allen is retired. Jim is interested in offers on


entertainments. He is able to
He is interested in: choose with the preferences tool
Savings. to receive offers from the Leisure
Special deals at super markets. industry.
Discount vouchers.
Cheap concert and Theatre tickets. His health stats are constantly
Local social events. streamed into his personal digital
Medical Advances - remote blood pressure vault as and when he plugs
appointments. himself into his weekly remotely
Online videos and entertainment. done health checks. He is then
Keeping in touch with relatives and grandchildren. able to make this information
available to trusted companies
which are able to send him
information on medical treatments
and advances in possible valuable
medications.

If he feels any of the information


he is being sent is not useful he
can immediately cut off that
organisation from viewing his
data.
Inspiration
Information thriving.
Growing.
Chop off / Remove.
Information Tree.
Dying.
The “water and sun”
is the information that
“feeds” it.
How can I make it easy to use? From my personas:
Could the user personalise it by Ellie = flowers
choosing a skin? Callum - Skyscrapers
Jim - A graveyard
Basic Information Likes & Interests

What is your salary?

How much have you


saved?

Internet TV Channels Mobile Car Stats. Medical Gas Electricity


Records

Utilities can be hooked up to the service. Constantly feeding information updates relating to use Finance. (Top privilege)
and preferences straight into your secure digital vault.
Final Outcome:
Input Your Basic Information: Input Your Activities & Interests:

Sex: Activities:

D.O.B:

Hometown:
Interests:
Relationship Status:

Interested In: Men Women

Music:
Political Views:

Books:
Religious Views:

Movies:

Deposit
DigitalVault
Safeguard Your Privacy Now!
Deposit DigitalVault
Safeguard Your Privacy Now!

User inputs their basic information into their DigitalVault. User can deposit their Activities and Interests into their DigitalVault.

Choose Service: Login Your Utilities:

Finance Utilities Travel & Holidays Entertainment

Flights

Hotels
Internet TV Channels Phone Car Stats Medical Gas Electricity
Package Holidays

Long-haul
Attach your utilities smart meters to the service.
Deposit
City Breaks Easy and Secure. Constantly feeding information
updates relating to use and preferences straight
Ski into your secure digital vault.

Cruise

DigitalVault
Safeguard Your Privacy Now!
DigitalVault
Safeguard Your Privacy Now!

User then chooses which services they are interested in. This allows only User can also hook up their utility’s smart metres along with medical notes
these companies to access their information. and vehicle stats.
Choose Your Representation:
Thomas
Cook

Thompsons sainsburys

02

orange
Tesco

HSBC

Apple

DigitalVault
Safeguard Your Privacy Now!

User then chooses which skin they would like to display their connections. User can instantly see which companies they have a connection with.
Clicking on the bright spots tells the user that their is a news story connected
to that company.

Thomas Thomas
Cook Cook

Thompsons sainsburys Thompsons sainsburys

02 02

orange orange

Tesco Tesco

HSBC HSBC

The American electronics


giant Apple was investigating
damaging allegations last

Apple night that Chinese workers


making its new iPad were Apple
subjected to such “inhumane”
treatment that some of them
committed suicide.

Brings up the news story. In this instance it is Apple and the suicides of Click on the centre of the flower to view how much information you are
workers. allowing that company to see. The less information you allow the company to
view more wilted the flower will become.
Thomas Thomas
Cook Cook

Thompsons sainsburys Thompsons sainsburys

02 02

orange orange

Tesco Tesco
Cut off any links with this company?
HSBC HSBC

Apple have access to your: Remove privilege

Basic Information
Apple Activities Apple
Interests
Music
Books
Movies
Finance

How much information you are leaking to that company can be edited. To remove a link to a company cut off at the stem.

Thomas
Cook
Companies
Thomas
Cook
that have accessed your information recently: Deny Access
Thompsons sainsburys Thompsons
23:28 02 June 2010 - Johnsons sainsburys

02 02
23:16 02 June 2010 - Dixsons
22:11 02 June 2010 - Floursand
19:12 02 June 2010 - Sony
orange orange 18:45 02 June 2010 - Clarins
Tesco 18:45 02 JuneTesco
2010 - Two Faced ink
15:25 02 June 2010 - Logo
HSBC 14:28 02 June 2010 - Jaspers HSBC
14:16 02 June 2010 - Holland
14:11 02 June 2010 - Phillips
13:12 02 June 2010 - Candy
13:45 02 June 2010 - Hoover
Apple Apple 13:45 02 June 2010 - Asda
11:25 02 June 2010 - CocaCola
10:45 02 June 2010 - Royal Bank of Scotland
09:45 02 June 2010 - Mark and Spencer
07:25 02 June 2010 - Pink

This company no longer has access to your DigitalVault. It is also possible to look at your log book of recent companies accessing
your information. Simply click to deny them access again.
Feedback

Invitations from companies asking to view your data and offer services:

“I like the idea of being in


control and only allowing
companies I trust and want
to be able to view my data.”

“I think it is nice to be able


to see how much
information you are
leaking to individual
The user can also view invitations from companies asking to view your data in exchange for
money off their products or services. companies and being able
to cut off any ties in a
“I like that I am in click.”
control of all my
personal data. I didn’t
know that companies
Development: look at everything about
you in order to target
It could also be possible for market advertising.”
research companies to pay people for
access to their digital vault.

You could also put timers on how long a “I like the idea it would
company could access your digital vault also be good if you could
for. User: “I only want to know about
view where you are in
your products for 6 months.”
other DigitalVaults.”

You might also like