Wikispooks:Privacy Policy

From Wikispooks
Revision as of 15:57, 25 November 2013 by Robin (talk | contribs)
Jump to navigation Jump to search
Privacy.png

WikiSpooks Undertakings

  1. WikiSpooks undertakes not to use any personal private data which it may hold other than for the purposes of operating the WikiSpooks site. Any such data will not be released to third parties other than by order of a court with jurisdiction. Similarly documents and articles posted on the WikiSpooks site will only be taken down by order of a court with jurisdiction.
  2. Any such court order will be posted on the WikiSpooks site unless gagged in which case it will hopefully be posted elsewhere. Threats - legal or otherwise - will generally be ignored unless they are funny or otherwise of general interest, in which case they will be posted.
  3. The Registered user data held in the WikiSpooks database includes dates and times of all document creation, editing and uploading activity.
  4. Neither registered user nor anonymous upload IP address data is retained.
  5. Server logs are cleared regularly - currently on a weekly basis.

Notes of Caution

  1. None of the above should be taken as guaranteeing that there is nobody else doing the logging and collecting. Covert snooping by ISPs, by network system operators, the NSA and/or others.
  2. Log retention is endemic. Just as the Authorities and Corporations claim they need to watch citizens and employees.
  3. "Privacy policy" has, in effect, come to mean an assurance of just enough privacy to keep users coming into the spider's web. That is exactly how it is used by government and its agencies whilst assuring the citizenry that it is acting in the public interest. In the same way, employers act in the interest of their employees; corporations act in the interest of their stockholders; religious/educational institutions and professionals act in the interest of their dutiful supporters and fee-payers.
  4. Those who promise the most protection are out to skin you alive, those who promise the most privacy are selling your most private possessions.

So...

  1. You may wish to look at some anonymising software such as TOR] - This is probably the most widely used anonymizing software, and if Edward Snowden's leaked documents are to be believed, makes things difficult for even the NSA (although it is not a magic bullet, and some people have suggested that it may even be an NSA honeypot).

Template:Main-footer