Skip to content

Bob Caswell

Media consumer, tech enthusiast, and gamer

  • Home
  • About
  • Toggle search form

Data Privacy & Portability: Who owns what? Who can see what?

Posted on January 10, 2008August 20, 2008 By Bob Caswell No Comments on Data Privacy & Portability: Who owns what? Who can see what?

Facebook LogoThe privacy and portability of your online data may become more of an issue in 2008. News is out today of a Federal case which will investigate whether the use of a false identity could be considered Internet fraud under federal statutes. This was originally triggered by the October 2006 case in which a 13-year-old named Megan Meier committed suicide after receiving “cruel” messages on MySpace (messages allegedly received from the mother of a school rival who was posing as a 16-year-old boy).

Take this news and mix in this BBC piece which discusses how Facebook will have an uncomfortable year due to privacy issues, and we’re back to question of who owns what data online? And who should be able to see what? These are not easily answered questions. After all, there are different types of data (email address vs. phone number, for example) and different types of decision makers (13-year-olds, twenty-somethings, baby boomers, etc.).

But even if more control and ownership were given back to the user, we’d still see conflicting opinions. For control, how granular should it be? While I may want lots of levers to pull for sharing and unsharing tidbits of my information differently with different people, someone else may find that confusing. And for ownership, how will we deal with the viral nature of information spreading? Even if you “own” something, what stops anyone with whom you’ve shared from doing whatever they want with your theoretically “owned” data?

It’s a big mess that many don’t care about (or are perhaps in denial?). But 2008 is shaping up to be the year where online data control and ownership will be in the spotlight.

Internet, Privacy, Tech News, Web 2.0 Tags:data, Facebook, identity, MySpace, security, social-networking

Post navigation

Previous Post: Mozy: Still the Best Option for Online Backup
Next Post: DRM Officially Dead for Music: Amazon Now Offers DRM-Free Tracks from All Four Major Labels

More Related Articles

Amazon Now Sells Groceries Amazon
DoubleClick Defending Google Deal But Privacy Groups Want Investigation Microsoft
Even Bill Maher Has A Love/Hate Relationship with Apple Apple
Comcast Rewards You for Complaining Publicly Internet
iPod Alternatives? Who is Switching and Why? Apple
North Koreans Wish for Internet While Retired People Elsewhere Surf Over Gardening Cyberlaw

Leave a Reply

Your email address will not be published. Required fields are marked *

  • Amazon
  • Apple
  • Computers
  • Cyberlaw
  • Do-It-Yourself Tech
  • Gadgets
  • Gaming
  • Google
  • Internet
  • Just For Fun
  • Media
  • Microsoft
  • Music
  • Netflix
  • Privacy
  • Shopping
  • Sony
  • Tech News
  • Tech Reviews
  • Web 2.0
  • Yahoo

Copyright © 2026 Bob Caswell.

Powered by PressBook Green WordPress theme

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}