You are on page 1of 1

ClearText

A Taxonomy
of Social Networking Data

L
ately, I’ve been reading about user security and It’s also clear that users should
have different rights with respect
privacy—control, really—on social ­networking to each data type. We should be
allowed to export, change, and
sites. The issues are hard and the solutions delete disclosed data, even if the
social networking sites don’t want
­harder, but I’m seeing a lot of confusion in even us to. It’s less clear what rights
we have for entrusted data—and
forming the questions. Social networking sites deal with far less clear for incidental data.
If you post pictures from a party
several different types of user data, • Behavioral data is data the site with me in them, can I demand
and it’s essential to separate them. collects about your habits by re- you remove those pictures—or at
Below is my taxonomy of so- cording what you do and who least blur out my face? (Go look
cial networking data, which I first you do it with. It might include up the conviction of three Google
presented at the Internet Gover- games you play, topics you write executives in Italian court over a
nance Forum meeting last No- about, news articles you access YouTube video.) And what about
vember, and again—revised—at (and what that says about your behavioral data? It’s frequently a
Bruce an OECD workshop on the role political leanings), and so on. critical part of a social network-
Schneier of Internet intermediaries in June: • Derived data is data about you ing site’s business model. We
BT that is derived from all the other often don’t mind if a site uses it
• Service data is the data you give data. For example, if 80 percent to target advertisements, but are
to a social networking site in or- of your friends self-identify as less sanguine when it sells data to
der to use it. Such data might in- gay, you’re likely gay yourself. third parties.
clude your legal name, your age,
and your credit-card number. There are other ways to look at
• Disclosed data is what you post
on your own pages: blog entries,
photographs, messages, com-
user data. Some of it you give to
a social networking site in confi-
dence, expecting the site to safe-
A s we continue our conversa-
tions about what sorts of fun-
damental rights people have with
ments, and so on. guard the data. Some of it you respect to their data, and more
• Entrusted data is what you post publish openly and others use it countries contemplate regulation
on other people’s pages. It’s basi- to find you. And some of it you of social networking sites and user
cally the same stuff as disclosed share only within an enumerated data, it will be important to keep
data, but the difference is that circle of other users. At the receiv- this taxonomy in mind. The sorts
you don’t have control over the ing end, social networking sites of things that would be suitable for
data once you post it—another can monetize all of it: generally by one type of data might be com-
user does. selling targeted advertising. pletely unworkable and inappro-
• Incidental data is what other Different social networking sites priate for another.
people post about you: a para- give users different rights for each
graph about you that someone data type. Some are always private, Bruce Schneier is chief security tech-
else writes, a picture of you that some can be made private, and nology officer at BT. Read his blog at
someone else takes and posts. some are always public. Some can www.schneier.com.
Again, it’s basically the same be edited or deleted—I know one
stuff as disclosed data, but the site that allows entrusted data to be
difference is that you don’t have edited or deleted within a 24-hour Selected CS articles and columns
control over it, and you didn’t period—and some cannot. Some are also available for free at
create it in the first place. can be viewed and some cannot. http://ComputingNow.computer.org.

88 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES ■ 1540-7993/10/$26.00 © 2010 IEEE ■ JULY/AUGUST 2010

You might also like