John Carlos and Tommie Smith made headlines across the world when they raised the black power salute on the podium after winning in the 1968 Olympics. That protest brought them death threats, and they were expelled from the games.
Wish I could have made ORGcon, but I was away again and haven’t been to a ORGcon for quite a few years now. Regardless I’m a supporter (you should be too) of the Open right group since they started many many moons ago.
In 2017 my zip was 31.4 MB (31,425,658 bytes)
In 2018 my zip was 171.3 MB (171,267,617 bytes)
Unlike previously FB included ALL the media in the messages I’ve exchanged with friends. All those gifs and videos friends have shared are now in the dump. I find it interesting they were not included previously. Which always raises the question of ownership. Something we (dataportability group) talked a lot.
Thanks to Ubergill for much improving the email I originally drafted…
I’m looking forward to the replies!
I am making this request for access to personal data pursuant to Article 15 of the General Data Protection Regulation. I am still concerned that your company’s information practices may be putting my personal information at undue risk of exposure or in fact has breached its obligation to safeguard my personal information.
I would like you to be aware at the outset, that I expect a reply to my request within one month as required under Article 12, failing which I will be forwarding my inquiry with a letter of complaint to the Information Commissioner’s Office.
Please advise as to the following:
Please confirm to me whether or not my personal data is being processed. If it is, please provide me with the categories of personal data you have about me in your files and databases.
In particular, please tell me what you know about me in your information systems, whether or not contained in databases, and including e-mail, documents on your networks, or voice or other media that you may store.
Additionally, please advise me in which countries my personal data is stored, or accessible from. In case you make use of cloud services to store or process my data, please include the countries in which the servers are located where my data are or were (in the past 12 months) stored.
Please provide me with a copy of, or access to, my personal data that you have or are processing.
Please provide me with a detailed account of the specific uses that you have made, are making, or will be making of my personal data.
Please provide a list of all third parties with whom you have (or may have) shared my personal data.
If you cannot identify with certainty the specific third parties to whom you have disclosed my personal data, please provide a list of third parties to whom you may have disclosed my personal data.
Please also identify which jurisdictions that you have identified in 1(b) above that these third parties with whom you have or may have shared my personal data, from which these third parties have stored or can access my personal data. Please also provide insight in the legal grounds for transferring my personal data to these jurisdictions. Where you have done so, or are doing so, on the basis of appropriate safeguards, please provide a copy.
Additionally, I would like to know what safeguards have been put in place in relation to these third parties that you have identified in relation to the transfer of my personal data.
Please advise how long you store my personal data, and if retention is based upon the category of personal data, please identify how long each category is retained.
If you are additionally collecting personal data about me from any source other than me, please provide me with all information about their source, as referred to in Article 14of the GDPR.
If you are making automated decisions about me, including profiling, whether or not on the basis of Article 22of the GDPR, please provide me with information concerning the basis for the logic in making such automated decisions, and the significance and consequences of such processing.
I would like to know whether or not my personal data has been disclosed inadvertently by your company in the past, or as a result of a security or privacy breach.
If so, please advise as to the following details of each and any such breach:
a general description of what occurred;
the date and time of the breach (or the best possible estimate);
iii. the date and time the breach was discovered;
the source of the breach (either your own organisation, or a third party to whom you have transferred my personal data);
details of my personal data that was disclosed;
your company’s assessment of the risk of harm to myself, as a result of the breach;
vii. a description of the measures taken or that will be taken to prevent further unauthorised access to my personal data;
viii. contact information so that I can obtain more information and assistance in relation to such a breach, and
information and advice on what I can do to protect myself against any harms, including identity theft and fraud.
If you are not able to state with any certainty whether such an exposure has taken place, through the use of appropriate technologies, please advise what mitigating steps you have taken, such as
Encryption of my personal data;
Data minimisation strategies; or,
iii. Anonymisation or pseudonymisation;
Any other means
I would like to know your information policies and standards that you follow in relation to the safeguarding of my personal data, such as whether you adhere to ISO27001for information security, and more particularly, your practices in relation to the following:
Please inform me whether you have backed up my personal data to tape, disk or other media, and where it is stored and how it is secured, including what steps you have taken to protect my personal data from loss or theft, and whether this includes encryption.
Please also advise whether you have in place any technology which allows you with reasonable certainty to know whether or not my personal data has been disclosed, including but not limited to the following:
Intrusion detection systems;
iii. Access and identity management technologies;
Database audit and/or security tools; or,
Behavioural analysis tools, log analysis tools, or audit tools;
In regards to employees and contractors, please advise as to the following:
What technologies or business procedures do you have to ensure that individuals within your organisation will be monitored to ensure that they do not deliberately or inadvertently disclose personal data outside your company, through e-mail, web-mail or instant messaging, or otherwise.
Have you had had any circumstances in which employees or contractors have been dismissed, and/or been charged under criminal laws for accessing my personal data inappropriately, or if you are unable to determine this, of any customers, in the past twelve months.
Please advise as to what training and awareness measures you have taken in order to ensure that employees and contractors are accessing and processing my personal data in conformity with the General Data Protection Regulation.
It was obvious that iOS had it right as far as transparent, granular app permissions were concerned, and Android Marshmallow admits as much, because it now has a very similar system. Permissions are asked for as and when they’re needed, rather than all at once during installation.
That gives you a better idea of what’s going on and also let’s you, for example, give Facebook access to your camera but not your contacts. If you want to check which apps have what permissions (and edit them), go to Settings: tap Apps then the cog icon, then choose App permissions.
Since android 6.0 marshmallow, i’ve wanted to try out the app permission tweaker. I’m interested to see what happens when I block certain apps from key permissions. Will they explode will they gracefully handle it and still operate without it?
For example could I run facebook app and deny access to the internet, or local storage? OK that might be a little too far but what about facebook without access to the mic and camera? Surely that would work right?
So I tried it with the Amazon kindle app, which I always thought had too many permissions anyway. I mean why does the kindle app need access to my contacts and my telephone?!
Haven turned them off, I thought I’d better see if the app still actually worked?
It did! So I started revoking permissions from apps which I felt didn’t need the permissions. For example Fitbit, which I refused to upgrade in the past due to the permissions.
Why does Fitbit need so many permissions anyway!
Andorid warms me the app may break as its not written for Android 6.0. But it still works as I want it to., so this has to be a case of them over reaching with the data they want to consume?
Say hello to your new permissions Fitbit, and it works fine when syncing data from the Fitbit.
Fitbit better get use to the sandbox I put it in, and they are not the only one!
You know how I’m very interested in the ethical dimension of services and data. Data portability is something I have a long history with and alongside that, there is related idea of having access to delete.
Turns out, there are many people who think deleting a dating app from your phone is the same as deleting your profile – but it isn’t.
Dating apps and online dating sites make it kind of tricky to get rid of you altogether – after all, they attract people (and investors) based on user numbers, so they are not motivated to make it obvious how to delete your account.
Okcupid plays by the rules while eHarmony requires a web action and then a email to confirm. Hinge a mobile dating app, requires you to use a desktop browser before you can delete it the account on your mobile via uninstalling the app.
With Tinder, I disconnected my Facebook account from Tinder meaning the account will be rejected by Facebook if it was started again. Its not elegant but saves me having to install Tinder again. I kind of refuse to install it again.
Makes you wonder how many loops some of the other dating sites and apps will make you jump through…?
We invited some of the most vocal backstagers in the long running debate over DRM, to come and join us at the BBC to discuss face to face what they felt about DRM and the BBC. The hour long discussion around DRM and the BBC included,
You can listen with the built in player below, or you can download and remix the MPeg3 file or the Ogg Vorbis file. Both are licensed under creative commons attribution. So as long as you credit backstage.bbc.co.uk, your good to go. Don't forget to check out some great action shots from the debate…
I went to Rights will make you rich at one dot zero. Without going into details, it was a interesting debate once the presentations (1) (2) were out of the way although I have no idea what on earth the PSP document is. And one of the highlights of the night was a guy called Saw who was trying to make a point about something and decided
to storm out in frustration. I didn't quite get the point he was making but it was something to do with freesoftware and opensource. I'm sure it was well thought-out but he left before we got a chance to talk. The rest of the evening wasn't very note worthy and I was too tired to contribute anything to the conversation after the BBC Innovation Forum.