The Project’s Development
Recently there have been numerous approaches for simplifying privacy policies by the use of icons. Similar to the Creative Commons project for managing content licenses, some scholars and technologists have suggested privacy policies could be enhanced by being expressed via several layers, including one with simple-to-understand icons.
After a presentation given by Mary Rundle at the United Nations Internet Governance Forum (IGF) in Athens in October 2006, the idea of “icon sets” for privacy was further discussed and promoted within the IGF´s Dynamic Coalition on Rights and Principles.
Please note that the icons are merely asking the recipient of an email to follow the sender’s preference. As opposed to DRM oriented approches, Privicons embraces the concept of “code-based norms” (Zittrain) or a “neighborliness” approach (Gelman). This means that Privicons relies on social norms and signals meant to be acknowledged by a message’s recipient, instead of technical enforcement mechanisms. However, Privicons is an open project, and others may choose to develop technical means for Privicons’ implementation in the future.
The Privicons RFC
We have submitted an Internet Draft of a Privicons RFC to the IETF: “Privacy Preferences for E-mail Messages.”
Privicons Background Paper
In November 2010, we drafted a paper that explains the policy and philosophy of Privicons. (This paper was originally written as a draft for an Internet privacy workshop at MIT.)
Related Projects and Research
The following projects and academic papers are somehow related to the privicons and we are exploring ways to cooperate and ensure that our efforts are complementary:
- International Data Protection and Digital Identity Management Tools by Mary Rundle mrundle[at]cyber.law.harvard.edu
- Iconset „Data-Privacy Icons v0.1“ by Matthias Mehldau firstname.lastname@example.org
- PRIME and its follow-up PrimeLife EU public private partnership research project.
- (Modularized) Human Readable Privacy Policies by Max Senges, Internet Rights and Principles Coalition
- Privacy Icons by Mozilla
- Know Privacy by UC Berkeley School of Information
- The Power of Code-Backed Norms by Jonathan Zittrain.
- Kelley, P. G., Bresee, J., Cranor, L. F., and Reeder, R. W. 2009. A “nutrition label” for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security (Mountain View, California, July 15 – 17, 2009). SOUPS ’09. ACM, New York, NY, 1-12. DOI= http://doi.acm.org/10.1145/1572532.1572538
- Gelman, Lauren Amy, Privacy, Free Speech, and ‘Blurry-Edged’ Social Networks (November 1, 2009). Boston College Law Review, Vol. 50, No. 5, 2009.
Harvard law professor Larry Lessig speaks about the possibility of a ‘creative commons’ approach to privacy at republica:09.