/>
X

Privacy Icons: A graphical approach to online privacy

A quick look over the proposed Privacy Icons to simplify the online privacy policies.
zack-whittaker-hs2016-rtsquare-1.jpg
By Zack Whittaker on
493472.jpg
1 of 5 Zack Whittaker/ZDNet

Left: This means that data is only collected and used to carry out the interaction you are engaged in with the website. The website is only using your data in ways that are functionally necessary to carry out the relationship as users intend.

Right: This means that your data is collected and used in ways that go beyond what is necessary for the interaction, like selling on to spammers and junk mailers.

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

493121.jpg
2 of 5 Zack Whittaker/ZDNet

Left: The site that is collecting data about you is not trading or selling it. It will only share your data with other organizations in order to carry out the intended transaction.

Right: This means that a website is collecting data about you and selling or trading it with another organization, government, or person.

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

493122.jpg
3 of 5 Zack Whittaker/ZDNet

Left: Besides the information exposed via on-page advertisement, the site does not share the data it collects about you with advertisers.

Right: This means that a site either shares the data it has about you with marketing or advertising companies or allows those companies to collect info about you while on its site.

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

493123.jpg
4 of 5 Zack Whittaker/ZDNet

Both: Your data is deleted before 1, 3, 6, or 18 months from the date of transmission have elapsed, respectively. Alternatively the data is never deleted.

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

493124.jpg
5 of 5 Zack Whittaker/ZDNet

Left: This means that when an organization gets a phone call, letter, or other legally insufficient request for your data, they don’t comply because the law requires the government to take additional steps before getting your data.

Right: These organizations might provide your data to a government that asks for it without following the legally required process. 

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza
img-8825

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza

26 Photos
A weekend with Google's Chrome OS Flex
img-9792-2

Related Galleries

A weekend with Google's Chrome OS Flex

22 Photos
Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup
shutterstock-1024665187.jpg

Related Galleries

Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup

8 Photos
Inside a fake $20 '16TB external M.2 SSD'
Full of promises!

Related Galleries

Inside a fake $20 '16TB external M.2 SSD'

8 Photos
Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup
Asian woman working at a desk in front of a computer and calculator

Related Galleries

Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup

8 Photos
Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup
Person seated at a booth in a cafe looks at their phone and laptop.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup

10 Photos
Drive Electric Day: A dizzying array of EVs in sunny Florida
ca3b4019-26c5-4ce0-a844-5aac39e2c34b.jpg

Related Galleries

Drive Electric Day: A dizzying array of EVs in sunny Florida

16 Photos