top of page

Data Privacy Research

Remember is built on a platform of Data Privacy, ensuring all memories are safe and secure. The platform is rooted in research on the best data principles for users to feel in control of their data. The platform utilises the Usage Control Model of data privacy, ensuring that you as a user are always in control.

Many people feel as if they have little control over data collected about themby companies . . .

% of US Adults who say . . . 

From "Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information," ed:

Pew Research Center, 2019.


Threat of Hacking

"they steal information and hack your data, because technology is like an ocean. Even if you're a master of it, somebody will I mean like if they have a bad intention they can harm you"

- Focus Group Participant

so when sharing your memories . . .

Our memories are important to us as individuals. But they also help us bond and feel connected with those around us. To share our memories with others digitally, we have to consider many questions.

VR Art Exhibition


Who owns the digital files? 

Who has access?



Can they view?

Can they copy?

Can they make changes?


Is this a Private or Public Memory?

Batting Cage


What kinds of restrictions do they have?

ID Tag Card


How do we make sure that only they have access?

In court


What must they do before or while accessing the digital files?

Usage Control Model (UCON)

Ensuring you are the Owner of your Data

Unlike other Data Privacy Models, Remember UCON is designed so that you are always in control of your data. You can choose who, what, when, where, and how other's access and store your data, including the Remember Platform itself.


A Privacy Policy built by Users


Research participants designed their own privacy policies to protect their memory environments as they shared them with friends and family. These 'Places' and 'People' aligned with the 'Subjects' and 'Objects' of the UCON Privacy Model.

Participants used both Pre-Written and Custom Privacy components (see right) to build their own privacy models. After each group completed their models, they were asked to explain and give justification to why they chose the safety components.

Screenshot 2024-01-29 at 09.19.26.png

Key Findings

bottom of page