To: PJ Strifas who wrote (34796 ) 11/12/2000 8:06:51 PM From: Scott C. Lemon Respond to of 42771 Hello PJ, > Scott - great points. I'd like to add to it if I may: Actually ... I'd welcome it ... it's a great conversation ... > With Personal Directory, I am able to store my personal > data and share it with an external source - they copy that > information. At this point, they "own" that copy of the > information right? No problem here - I may WANT them to > have a copy. Exactly ... I can choose to share any information with anyone ... > Ok, so Personal Directory becomes a mechanism for me to > easily share information. It's really a facilitator. Well ... one distinction ... Personal Directory, by itself, is just a data repository. It would be a directory application which provides much of the functionality that we are discussing ... > In that same respect, I can *drop* an external source from > receiving UPDATES to my information. Here's where there's > some semblence of control comes in. Exactly. Just as a negotiate a selective replication relationship, I can modify it ... or delete it. > Now granted, once that external source has a copy of my > information they can do what they please with it. But lets > back up a second. Of course for me to share my personal > information I would "demand" specific conditions such as > what happens to that information once *copied*, revocation > of that information etc. First, since it's a copy you can't ever revoke. Maybe legally, or in theory, but once it has been shared, that copy is shared. Your "demands" for how that data is handled are simply requests for procedures ... but there is no real way to get 100% assurance that all copies have been deleted in a unrecoverable fashion. That falls to trust ... > So, before I even share my information I would set (or > expect) specific rules on how that information is used and > maintained. For instance, I may share information to a > specific goal and only that specific goal (ie, my mailing > address to FedEx to deliver whatever to me). If they use > my information for anything but that - I could find > recourse within a) the courts b) an arbitrator c) some > prearranged system. Exactly ... this becomes a legal "penalties" game ... punish them, and their reputation. Of course, you might have to find curious ways to prove that *they* leaked it "beyond a reasonable doubt" ... ;-) > (Of course the problem for me would be to find out if and > when they used my information in any other way). Yep ... ;-) > Another thing about *copied* information is its relevance. > You can copy my driver's license info but if I move, some > of that information becomes irrelevant and unusable > (perhaps). So without the updates, information grows old > and stagnant. Again, there can be some rules set that > companies must "purge" their systems of this type of > information... Exactly ... this is how it is in the atomic world ... it's how it will be in the electronic and photonic worlds ... I can even give them bogus information up front! This is where they might demand a "mutually trusted intermediary" ... ;-) > So if I close the ability for updates to occur between my > Personal Directory and an external source, that > information will become old and stagnant and not that > valuable. Exactly ... > So we can have 2 mechanisms to help us "control" our > personal information. > > 1) rules governing how that information is to be used once > I share it with someone > > 2) the aging of information and it's irrelevance over time > > I think with some intelligent discussions on these 2 > points, we can make great headway into the managing of > personal information in the Digital Age. You've got it! Scott C. Lemon