Inclusive Design for Privacy - Working Doc (Google Doc)
Key Points for Tool Introduction/Animation
DEEP 2016 Privacy Discussion Summary (Google Doc)
Privacy and Sharing Preferences List (Google Doc)
Examples of Misuse of Personal Data (Google Doc)
PIPEDA and Privacy Preferences Design
Privacy Preferences Information Model (Google Doc)
Mar 28, 2017 Design Crit Notes (Privacy), based on the interactive prototype
Feb 17, 2017 Accessible Prototyping
Jan 31, 2017 Design Crit Notes (Privacy), based on these wireframes
Dec 21, 2016 Privacy Preferences Meeting
Dec 6, 2016 Design Crit Notes (Privacy), based on these wireframes
Nov 29, 2016 Design Crit Notes (Privacy), based on these wireframes
Sept 28, 2016 Privacy and Sharing Preferences Brainstorm
Sept 8 2016 Privacy Discussion Meeting Minutes
August 25, 2016 Brainstorm Session Notes
Research and Resources
Privacy by Design
Your Smartphone is a Civil Rights Issues - TED Talk
The Electronic Frontier Foundation
Me and My Shadow Project - Take Control of Your Data
Me and My Shadow - Tracking, So What?
Me and My Shadow - The 8-Day Data Detox Kit
The Glass Room NYC - Looking into Your Online Life
Office of the Privacy Commisioner of Canada - Web Tracking with Cookies
Understanding Cookies (Microsoft)
The Watchers augmented board game
The Platform for Privacy Preferences Project (W3C)
Designing a Privacy Preference Specification Interface - A Case Study. Cranor, L.F.
User Interfaces for Privacy Agents. Cranor, L.F., Guduru, P. and Arjula, M.
The Privacy Bird !
Anne Cavoukian U of T Alumni Presentation - Joseph's notes and link to Anne's slide deck
International Council on Global Privacy and Security by Design
Online security tips from Y Combinator
The Internet of Things - Examples
Leon's - Project Smart Furniture
Examples of "Best Practices" for Protecting Users' Privacy
Questions (from initial brainstorming session)
We want to address the following three questions:
- What are the possible privacy preferences someone might have?
- How is private information being used currently?
- Who are vulnerable in this context?
As part of answering these questions, we want to discuss:
- what constitutes private information,
- what is being gathered and for what purpose,
- what are the conflicts between privacy requirements and what is actually being done today, and
- are there constraints in fulfilling privacy wishes.