/>
X

Join or Sign In

Register for your free ZDNet membership or if you are already a member, sign in using your preferred method below.

Use your email Use Linkedin Use Facebook

Privacy Icons: A graphical approach to online privacy

A quick look over the proposed Privacy Icons to simplify the online privacy policies.

|
zack-whittaker-hs2016-rtsquare-1.jpg
|
493472.jpg
1 of 5 Zack Whittaker/ZDNet

Left: This means that data is only collected and used to carry out the interaction you are engaged in with the website. The website is only using your data in ways that are functionally necessary to carry out the relationship as users intend.

Right: This means that your data is collected and used in ways that go beyond what is necessary for the interaction, like selling on to spammers and junk mailers.

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

493121.jpg
2 of 5 Zack Whittaker/ZDNet

Left: The site that is collecting data about you is not trading or selling it. It will only share your data with other organizations in order to carry out the intended transaction.

Right: This means that a website is collecting data about you and selling or trading it with another organization, government, or person.

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

493122.jpg
3 of 5 Zack Whittaker/ZDNet

Left: Besides the information exposed via on-page advertisement, the site does not share the data it collects about you with advertisers.

Right: This means that a site either shares the data it has about you with marketing or advertising companies or allows those companies to collect info about you while on its site.

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

493123.jpg
4 of 5 Zack Whittaker/ZDNet

Both: Your data is deleted before 1, 3, 6, or 18 months from the date of transmission have elapsed, respectively. Alternatively the data is never deleted.

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

493124.jpg
5 of 5 Zack Whittaker/ZDNet

Left: This means that when an organization gets a phone call, letter, or other legally insufficient request for your data, they don’t comply because the law requires the government to take additional steps before getting your data.

Right: These organizations might provide your data to a government that asks for it without following the legally required process. 

Source: Aza Raskin's blog

--
To read more about Privacy Icons, head on over to the ZDNet iGeneration blog.

Related Galleries

A peek inside NextDC’s S2 data centre
nextdc-pic-01.jpg

Related Galleries

A peek inside NextDC’s S2 data centre

What a brand new data center looks like - from the inside
02.jpg

Related Galleries

What a brand new data center looks like - from the inside

Pictures: Inside Lenovo's new Beijing campus
lenovo-campus-intro.jpg

Related Galleries

Pictures: Inside Lenovo's new Beijing campus

High-performance storage: From flash drives to server hard drives (April 2018 edition)
OWC ThunderBlade SSD

Related Galleries

High-performance storage: From flash drives to server hard drives (April 2018 edition)

Photos: Inside Apple, Facebook, Google, IBM's frozen Nordic datacenters
ndcboom7.jpg

Related Galleries

Photos: Inside Apple, Facebook, Google, IBM's frozen Nordic datacenters

Photos: Inside vast abandoned mine set to be world's biggest data center
lmd07.jpg

Related Galleries

Photos: Inside vast abandoned mine set to be world's biggest data center

The 10 scariest cloud outages (and lessons learned from them)
nasdaq-businessman-losses-corbis.jpg

Related Galleries

The 10 scariest cloud outages (and lessons learned from them)