Data Privacy Research
Remember is built on a platform of Data Privacy, ensuring all memories are safe and secure. The platform is rooted in research on the best data principles for users to feel in control of their data. The platform utilises the Usage Control Model of data privacy, ensuring that you as a user are always in control.
Many people feel as if they have little control over data collected about themby companies . . .
% of US Adults who say . . .
From "Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information," ed:
Pew Research Center, 2019.
Threat of Hacking
"they steal information and hack your data, because technology is like an ocean. Even if you're a master of it, somebody will I mean like if they have a bad intention they can harm you"
- Focus Group Participant
so when sharing your memories . . .
Our memories are important to us as individuals. But they also help us bond and feel connected with those around us. To share our memories with others digitally, we have to consider many questions.
Subjects
Who owns the digital files?
Who has access?
Rules
Can they view?
Can they copy?
Can they make changes?
Objects
Is this a Private or Public Memory?
Conditions
What kinds of restrictions do they have?
Rights
How do we make sure that only they have access?
Obligations
What must they do before or while accessing the digital files?
Remember
Usage Control Model (UCON)
Ensuring you are the Owner of your Data
Unlike other Data Privacy Models, Remember UCON is designed so that you are always in control of your data. You can choose who, what, when, where, and how other's access and store your data, including the Remember Platform itself.
A Privacy Policy built by Users
Research participants designed their own privacy policies to protect their memory environments as they shared them with friends and family. These 'Places' and 'People' aligned with the 'Subjects' and 'Objects' of the UCON Privacy Model.
​
Participants used both Pre-Written and Custom Privacy components (see right) to build their own privacy models. After each group completed their models, they were asked to explain and give justification to why they chose the safety components.