Building Consentful Tech Zine SPREADS
Building Consentful Tech Zine SPREADS
ERS
N IBLE
G IVE
E LY
FRE
Building
Consentful
Tech IN
FO
RM
ED
IC
ST
SIA
T HU
EN
SP
EC
IFI
C
What does
consent have
3 What does consent have to do with
to do with
4
technology?
Content Warning
technology?
5
Consentful technology is about
having control over our digital
bodies
2017
10
Consent makes technology more
just and equitable You are free to:
Share — copy and redistribute the A lot of us know about consent with regard to our
14 Consent from the ground up material in any medium or format
physical bodies, like in the context of medical decisions
Adapt — remix, transform, and
17 Consent is an ongoing process build upon the material or sexual activities. But when it comes to our digital
19
Consentful technology relies on for any purpose, even lives, there’s a lack of discussion about what consent
commercially.
community and accountability means for our data, our identities, and our online
Under the following terms:
23
Consentful technology moves us Attribution — You must give
interactions.
appropriate credit, provide a link
towards consent culture to the license, and indicate if
This zine is intended for anyone who uses, makes, or
changes were made. You may do
But what about consent beyond our physical bodies? These days, we also have
digital bodies. Digital bodies are made up of pieces of personal data. Like our
physical bodies, our digital bodies exist in relationship with others and can
participate in communities. They can also experience harm. Although the harm
to them might not be physical, our digital bodies are frequently acted upon in
non-consensual ways:
CONSENT IN THE DICTIONARY Apps like Uber track “Revenge Private information
our location even pornography”: such as biometric
Consent /kən’sent/
when we are not posting intimate data being shared
4 BUILDING CONSENTFUL TECH
Noun: Permission for something to happen or using them images without the across government
agreement to do something. subject’s consent databases, which
“Doxing”: distributing
particularly
Verb: Give permission for something to happen a target’s private
impacts people
information, like Unchecked threats
with disabilities,
their social network of sexual assault in
immigrants, and the
account passwords digital spaces like
poor.
Twitter
With our digital bodies, there is also more to YOUR DIGITAL BODY IS
IC
ST
IA
US
TH
For the sake of starting with a common but EN
Freely given. Doing something with someone is Enthusiastic. If someone isn’t excited, or really into
G IVEN a decision that should be made without pressure, it, that’s not consent. If people are giving up their
E LY force, manipulation, or while incapacitated. In data because they have to in order to access necessary
FRE
technology, if an interface is designed to mislead services and not because they want to, that is not
people into doing something they normally wouldn’t consentful.
do, the application is not consentful.
Specific. Saying yes to one thing doesn’t mean
Reversible. Anyone can change their mind about they’ve said yes to others. A consentful app only uses
what they want to do, at any time. In technology, data the user has directly given, not data acquired
you should have the right to limit access or entirely through other means like scraping or buying, and
remove your data at any time. uses it only in ways the user has consented to.
S PEC
they present and the data they are storing, rather definition to address the intangible
than burying these important details in e.g., the fine and networked qualities of digital
print of terms & conditions.
REV
technologies?
ERS
IBLE
* Adapted from http://
plannedparenthood.tumblr.
com/post/148506806862/
understanding-consent-is-as-
easy-as-fries-consent
Consent makes In a lot of cases, you’ll find that those who might experience harm such as
technology more just those who could be harmed, but often there isn’t.
There are many ways to make technology more just and equitable, and consent
and equitable is one important consideration. Non-consentful features and interactions can
be minor nuisances for some people, but can be very harmful to others. When
Facebook introduced photo tagging, anyone could tag you in a photo, whether
or not you were okay with it. For some users, that could lead to embarrassment
Think of a technology you use on a if the photo wasn’t particularly flattering. But for other people, the harm could
be much more serious. For trans users, tagging photos from their pre-transition
day to day basis. Can it have unjust
lives without their consent could lead to them being outed, which can have
or inequitable impacts on anyone? consequences for employment, housing, safety, and more.
Who owns the technology, and who In response to user outcry, Facebook eventually implemented a process by
participates in the making of it? which users can approve tagged photos. However, it required a critical mass
of complaints to make this happen. And, Facebook still stores photos that are
tagged with your face in its database, which informs its facial recognition
algorithms. Whether you consented to being tagged or not, Facebook has a 98%
accurate idea of what your face looks like.1
Who makes it? Consider the technology you were Facebook’s image rec-
1
ognition algorithms can
Who profits?
thinking of earlier. What would it “recognize human faces with
98% accuracy, even if they
look like if it was built to ensure [aren’t] directly facing the
camera...[It can] identify a
that everyone had an equitable person in one picture out of
10 BUILDING CONSENTFUL TECH
experience, and some users were 800 million in less than five
seconds.” ‘Inside Facebook’s
Who is harmed? not negatively impacted more than Biggest Artificial Intelligent
Project Ever,’ Fortune Maga-
others? Who would need to own zine, April 13, 2016.
http://fortune.com/face-
and build the technology for this to book-machine-learning/
happen?
WHAT THIS ZINE BUILDS UPON BUILDING CONSENTFUL
with the goal of restoring relationships and healing neighborhoods.”4 companies and organizations
Consentful technology builds healthy digital communities through consenting • Mentoring newcomers, particularly those
interactions and relationships. who are often excluded or marginalized from
mainstream tech communities
• Growing our knowledge on concepts
like collaborative design processes and
Only with Consent. http://onlywithconsent.org/blog/consent-culture
1 intersectionality
2 Design Justice Network. http://designjusticenetwork.org/
• Consistently reviewing our development
3 Detroit Digital Justice Coalition. http://detroitdjc.org/about/story/
4 Detroit Community Technology Project, Teaching Community Technology Handbook.
processes
Consent from the Can people consent to Specific things in this system and not others? Can
ground up When technology is built without asking these questions from the beginning,
serious harm can happen. It often takes multiple instances of harm for a patch
to be designed. Popular photo and video sharing platforms, for instance, have
How might the technologies we are been used to circulate images of acts of sexual violence, which re-harms people
who have experienced violence and perpetuates violence in our culture. It is
most reliant upon look if they were extremely difficult to delete these images once they have been distributed.
designed with consent at their core? These are obviously not the use cases the developers and owners of these
What if, before writing a single line platforms were intending, but they do illustrate the harm that can happen
when we fail to design with consent in mind from the ground up, and
of code, the following questions
foreground the concerns of users who could be severely and unjustly impacted.
were asked:
We can and must do better.
How are we fully and clearly Informing people Historically speaking, technology providers have done a poor job of
about what they’re consenting to? Is important acknowledging those risks. We see this in data breaches, where intimate details
information about the risks a user might be of digital bodies (passwords, credit card information, medical information,
exposed to buried in the fine print of the terms & private photos etc) are exposed publicly or sold to the highest bidder. We also
conditions? see it in cases where companies make use of your digital body in ways you
14 BUILDING CONSENTFUL TECH
didn’t intend, and whether that’s malicious (using your profile pic to advertise
How are we making sure that the consent is dating services) or seemingly benign (adding a new feature that exposes you
Enthusiastic? Is there an option not to use this to additional risk) it is still an act taken upon part of your digital body without
technology, which means that people use it because your consent.
they prefer to use it? In many places one can only
access social service benefits online. Declining to We can do better. By designing the system so certain things are impossible, we
register with these online services is not an option lower the trust barrier for that system. For example, your personal information
for those who need these benefits most. could be stored encrypted, with the decryption keys residing only on your own
devices. The application sends data and code to your device, and your consent
Consent is an ongoing
process
If we can’t make it safer then we can acknowledge the remaining risks and
educate users about them. Let’s build industry standards for reporting risks at
rest, in transit and during processing. Additional standards for functionality-
based risk would help too. This is a big problem: it requires software
developers, industry groups, advocates and users all working together, and it The process of asking for consent
starts by having this conversation. Let’s talk about how risky it currently is to
use software, and how we can make it safer and more accessible for everyone. does not stop at the first yes.
bar for security, but also helps with scaling: if everyone is sharing some of the experience of the Internet shift if people who had
processing, the servers can do less work. In this model your digital body is no access to your digital body, whether in the form
longer spread throughout servers on the internet; instead the applications come of photos or contact information, were to check
to you and you directly control how they interact with your data. in with you from time to time about it? What
technologies would we need to build to help us
1 https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf manage ongoing and direct consent processes?
2 https://crypto.stanford.edu/craig/craig-thesis.pdf
3 http://scuttlebot.io
AN EQUITABLE ITERATION
Consentful technology
enough. Blocking users who are harassing you does not easily stop them from
harassing others. Reporting an image that is harmful to you does not stop that
image from being posted by others and to other platforms.
• reate and affirm values & practices that resist abuse and oppression and
C
encourage safety, support, and accountability
• Develop sustainable strategies to address community members’ abusive
behavior, creating a process for them to account for their actions and
transform their behavior
• Commit to ongoing development of all members of the community, and
the community itself, to transform the political conditions that reinforce
oppression and violence
• Provide safety & support to community members who are violently
targeted that respects their self-determination1
change the way that the creators of algorithms are held accountable for the
harms that their biases cause? Our digital bodies interact with each other,
intermediated by the servers they inhabit. Currently
all the control is in the environment, and the data
that makes up our digital bodies is passive and
lacks agency. By binding that data into a cell with
its own logic, protected by encryption, we could
restore autonomy to our digital bodies, allowing
interactions to involve us instead of acting upon us.
1 http://www.incite-national.org/page/community-accountability
STRONG COMMUNITIES GIVE RISE TO MORE
Consentful technology
INCITE!
http://www.incite-national.org
24 BUILDING CONSENTFUL TECH
Troll Busters
https://www.troll-busters.com
Acknowledgments
This zine would not exist without funding and moral
support from Allied Media Projects and the Mozilla
Foundation.
V EN
GI
E LY
F RE
IN
FO
IC RM
IA ST ED
H US
E NT
SP
EC
IFI
C