Digital Footprints
By Alex Mather
()
About this ebook
Remember those photographs you took doing something you’d rather forget with someone you can’t remember in a location you can’t recall? You discarded the originals, of course. And what about that exchange of e-mails that got out of hand and which you now deeply regret. You deleted them of course, so it’s all in the past.
Or is it?
If you posted the pictures to a social network like Facebook or e-mailed from an address like Gmail or Hotmail, then all your photographs are still in cyberspace, eternally circulating, awaiting recall at an embarrassingly inappropriate moment. And those e-mails? Well, don’t forget that Gmail and Hotmail have the right to read anything and everything you post on their services, keep it forever and use it as they see fit to ‘provide their service’. As things stand at the moment, you have no right to be forgotten and no right to have your foolish indiscretions forgotten either – even if you delete your accounts. If anyone shared your stuff, reposted or quoted it in an email then it remains out there.
In this groundbreaking paper, Alex Mather explores how this all came about and proposes that the law should be changed to allow ‘the right to delete’ our entire digital footprint and to be forgotten. There are, of course, those who disagree with Mather’s position, claiming that the public has a right to know, especially if you are public figure, but they singularly fail to justify why the public has a right to know about the average person for ever.
With half the world using the internet for research and communication, and something like1 in 7 people in the world using Facebook, this debate is only just beginning. But already, lives have been destroyed, reputations ruined, and permanent damage done. Whether you are an experienced cybernaut, a concerned adult, or a young person in perpetual contact with your cloud of cyberfriends, this paper is a ‘must read’.
Related to Digital Footprints
Related ebooks
Cybersecurity: On Threats Surfing the Internet and Social Media Rating: 0 out of 5 stars0 ratingsI Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy Rating: 4 out of 5 stars4/5Introduction to Social Media Investigation: A Hands-on Approach Rating: 5 out of 5 stars5/5How the World Changed Social Media Rating: 5 out of 5 stars5/5Identity Crisis: How Identification is Overused and Misunderstood Rating: 0 out of 5 stars0 ratingsTerms of Service: Social Media and the Price of Constant Connection Rating: 4 out of 5 stars4/5Social Media Security: Leveraging Social Networking While Mitigating Risk Rating: 5 out of 5 stars5/5Privacy’s Blueprint: The Battle to Control the Design of New Technologies Rating: 5 out of 5 stars5/5Living in Social Networks Manual of Responsible Use Rating: 0 out of 5 stars0 ratingsLife in Cyberspace Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsThe dark behind the web: Dark Web, Deep Web, Fake News, Social Control, AI, Computer Viruses and Hacking Rating: 0 out of 5 stars0 ratingsIndustry of Anonymity: Inside the Business of Cybercrime Rating: 2 out of 5 stars2/5Security and Privacy in the Internet of Things: & Dark-web Investigation Rating: 0 out of 5 stars0 ratingsThe Offensive Internet: Speech, Privacy, and Reputation Rating: 0 out of 5 stars0 ratingsHow to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide Rating: 0 out of 5 stars0 ratingsYou: For Sale: Protecting Your Personal Data and Privacy Online Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Security in IoT Social Networks Rating: 0 out of 5 stars0 ratingsPrivacy 3.0: Unlocking Our Data-Driven Future Rating: 0 out of 5 stars0 ratingsAdvances in Cyber Security: Technology, Operations, and Experiences Rating: 0 out of 5 stars0 ratingsPeers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates Rating: 3 out of 5 stars3/5Internet Governance: The NETmundial Roadmap Rating: 0 out of 5 stars0 ratingsTune into the Cloud: The story so far Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Lawyers Rating: 0 out of 5 stars0 ratingsHiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsBlockchain Business Models A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratings
Internet & Web For You
The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5Python QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratingsThe Designer's Web Handbook: What You Need to Know to Create for the Web Rating: 0 out of 5 stars0 ratingsThe Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsThe Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsThe Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How To Start A Podcast Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5Tube Ritual: Jumpstart Your Journey to 5000 YouTube Subscribers Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5
Reviews for Digital Footprints
0 ratings0 reviews
Book preview
Digital Footprints - Alex Mather
Digital Footprints
Social networks and the right to delete
by Alex Mather
First published in Belgium in 2012 by
White & MacLean Publishing
Copyright 2012 Alex Mather
The moral right of the author has been asserted.
The opinions expressed in this paper are those of the author
and should not be considered legal advice nor construed
as being legal opinion.
All rights reserved.
This ebook is licensed for your personal enjoyment only. This ebook may not be
re-sold or given away to other people. If you would like to share this book with
another person, please purchase an additional copy for each recipient. If
you’re reading this book and did not purchase it, or it was not
purchased for your use only, then please return to
Smashwords.com and purchase your own copy.
Thank you for respecting the hard work
of this author.
Published by White & MacLean Publishing at Smashwords
Smashwords edition: ISBN 978-2-930583-26-6
Cover design: Arati Devasher
www.aratidevasher.com
White & MacLean Publishing
La Houlette 3
B-1470 Baisy-Thy
Belgium
www.whiteandmaclean.eu
Table of Contents
Introduction
Section I – Social Networking Technology: usage and capabilities
Social Networks
Web-based Email
Section II – Libel, reputation and privacy
Section III – SNS and harm to reputation in practice
Section IV – How this is different: instant, global and forever
Section V – Recommendations: how to manage your online reputation
Section VI – Balancing act: a public interest in retaining data
Righting the Social Networking Wrongs: establishing a ‘right to delete’
Bibliography
Biography of the author
Endnotes
Digital Footprints
Social networks and the right to delete
Introduction
Good name in man and woman…is the immediate jewel of their souls. But he that filches from me my good name robs me of that which not enriches him, and makes me poor indeed.1
William Shakespeare
Social networking sites are the websites that we use to let others know exactly who we are or to establish a profile to find others with similar interests. Often used to connect with old friends or to find new ones, social networking sites are some of the most popular sites on the internet.
But the internet operates in a multi-jurisdictional environment in which no one jurisdiction is dominant and there is little coordination, thus users of social networking sites (SNS)² generally receive little legal protection. Moreover, the potential impact and dangers of these sites are not yet fully understood or appreciated and it is probable that the most harmful consequences have not yet been witnessed. These issues are of growing concern due to the rampant use of social media, across countries, cultures and continents – more than 800 million people use Facebook alone. All this contributes to the extensive and growing problems relating to fundamental considerations of defamation, privacy and reputation, all of which I explore in this paper. Furthermore, the impact of these issues is not limited to a single area of life or society and the extraordinary impact of social networking technology ‘on the political, professional, and personal lives leaves us gasping in attempts to keep abreast’.³ Individual actions must be taken to avoid the lasting, and potentially deleterious consequences presented by SNS.
Whilst, in some countries, there have been important improvements to media law to reflect changing social landscapes, few have been