Difference between revisions of "Wikispooks:Privacy Policy"

From Wikispooks
Jump to navigation Jump to search
(Simplifying and adding "Data Retention" section)
Line 3: Line 3:
 
#'''WikiSpooks undertakes''' not to use any personal private data which it may hold other than for the purposes of operating the WikiSpooks site. Any such data will not be released to third parties other than by order of a court with jurisdiction. Similarly documents and articles posted on the WikiSpooks site will only be taken down by order of a court with jurisdiction.
 
#'''WikiSpooks undertakes''' not to use any personal private data which it may hold other than for the purposes of operating the WikiSpooks site. Any such data will not be released to third parties other than by order of a court with jurisdiction. Similarly documents and articles posted on the WikiSpooks site will only be taken down by order of a court with jurisdiction.
 
#'''Any such court order''' will be posted on the WikiSpooks site unless gagged in which case it will hopefully be posted elsewhere. Threats - legal or otherwise - will generally be ignored unless they are funny or otherwise of general interest, in which case they will be posted.
 
#'''Any such court order''' will be posted on the WikiSpooks site unless gagged in which case it will hopefully be posted elsewhere. Threats - legal or otherwise - will generally be ignored unless they are funny or otherwise of general interest, in which case they will be posted.
#'''The Registered user data''' held in the WikiSpooks database includes dates and times of all document creation, editing and uploading activity.  
+
 
#'''Neither registered user nor anonymous''' upload IP address data is retained.  
+
==Data Retention==
#'''Server logs''' are cleared regularly - currently on a weekly basis.
+
#'''The dates and times of all document creation, editing and uploading are recorded'''.
 +
#'''IP addresses are ''not'' retained'''.
 +
#'''Server access logs''' are cleared regularly - currently on a weekly basis.
  
 
==Notes of Caution==
 
==Notes of Caution==
#'''None of the above should be taken as guaranteeing''' that there is nobody ''else'' doing the logging and collecting. Covert snooping by ISPs, by network system operators, the [[NSA]] and/or others.
+
#'''Your internet use is being monitored and/or logged''', quite likely by ISPs, by network system operators, the [[NSA]] and/or others.
#'''Log retention is endemic'''. Just as the Authorities and Corporations claim they need to watch citizens and employees.
+
#'''Retention of logs (especially 'metadata') is endemic'''. Hard drives are cheap and {{TPTB}} have deep pockets and deep packet sniffers.
 
#'''"Privacy policy" has, in effect, come to  mean''' an assurance of just enough privacy to keep users coming into the spider's web. That is exactly how it is used by government and its agencies whilst assuring the citizenry that it is acting in the public interest. In the same way, employers act in the interest of their employees; corporations act in the interest of their stockholders; religious/educational institutions and professionals act in the interest of their dutiful supporters and fee-payers.
 
#'''"Privacy policy" has, in effect, come to  mean''' an assurance of just enough privacy to keep users coming into the spider's web. That is exactly how it is used by government and its agencies whilst assuring the citizenry that it is acting in the public interest. In the same way, employers act in the interest of their employees; corporations act in the interest of their stockholders; religious/educational institutions and professionals act in the interest of their dutiful supporters and fee-payers.
 
#'''Those who promise the most protection are out to skin you alive''', those who promise the most privacy are selling your most private possessions.  
 
#'''Those who promise the most protection are out to skin you alive''', those who promise the most privacy are selling your most private possessions.  
  
 
==So...==
 
==So...==
#'''You may wish to look at some anonymising software such as [http://www.torproject.org TOR]]''' - This is probably the most widely used anonymizing software, and if [[Edward Snowden]]'s leaked documents are to be believed, makes things difficult for even the [[NSA]] (although it is not a magic bullet, and some people have suggested that it may even be an NSA honeypot).
+
#'''You may wish to look at some anonymising software such as [http://www.torproject.org TOR]''' - This is probably the most widely used anonymizing software, and if [[Edward Snowden]]'s leaked documents are to be believed, makes things difficult for even the [[NSA]] (although it is not a magic bullet, and some people have suggested that it may even be an NSA honeypot).
  
 
{{Main-footer}}
 
{{Main-footer}}
  
 
[[Category:Policies and Rules]]
 
[[Category:Policies and Rules]]

Revision as of 16:12, 25 November 2013

Privacy.png

WikiSpooks Undertakings

  1. WikiSpooks undertakes not to use any personal private data which it may hold other than for the purposes of operating the WikiSpooks site. Any such data will not be released to third parties other than by order of a court with jurisdiction. Similarly documents and articles posted on the WikiSpooks site will only be taken down by order of a court with jurisdiction.
  2. Any such court order will be posted on the WikiSpooks site unless gagged in which case it will hopefully be posted elsewhere. Threats - legal or otherwise - will generally be ignored unless they are funny or otherwise of general interest, in which case they will be posted.

Data Retention

  1. The dates and times of all document creation, editing and uploading are recorded.
  2. IP addresses are not retained.
  3. Server access logs are cleared regularly - currently on a weekly basis.

Notes of Caution

  1. Your internet use is being monitored and/or logged, quite likely by ISPs, by network system operators, the NSA and/or others.
  2. Retention of logs (especially 'metadata') is endemic. Hard drives are cheap and The Powers That Be have deep pockets and deep packet sniffers.
  3. "Privacy policy" has, in effect, come to mean an assurance of just enough privacy to keep users coming into the spider's web. That is exactly how it is used by government and its agencies whilst assuring the citizenry that it is acting in the public interest. In the same way, employers act in the interest of their employees; corporations act in the interest of their stockholders; religious/educational institutions and professionals act in the interest of their dutiful supporters and fee-payers.
  4. Those who promise the most protection are out to skin you alive, those who promise the most privacy are selling your most private possessions.

So...

  1. You may wish to look at some anonymising software such as TOR - This is probably the most widely used anonymizing software, and if Edward Snowden's leaked documents are to be believed, makes things difficult for even the NSA (although it is not a magic bullet, and some people have suggested that it may even be an NSA honeypot).

Template:Main-footer