iva

What is Ivanka Trump's secret to her 'transformed' body?

An undated image of Ivanka Trump. — Instagram/@ivankatrump

Ivanka Trump, the eldest daughter of former United States president Donald Trump, is often seen flaunting her flawless looks and she recently recently opened up about her fitness journey.

The 43-year-old...




iva

Cloudflare to EU: Anti-Piracy Measures Shouldn’t Harm Privacy and Security

Cloudflare is urging the EU Commission to exclude the company from its upcoming Piracy Watch List, despite requests from several rightsholder groups for its inclusion. The American company says it's committed to addressing piracy concerns but not at the expense of user privacy and security. Instead, the European Commission should ensure that its Piracy Watch List does not become a tool for advocating policy changes.

From: TF, for the latest news on copyright battles, piracy and more.




iva

K-P wants revival of tourism hit hard by Covid

CM Mahmood Khan orders early opening of provincial tourism authority




iva

Analog Equivalent Rights (2/21): The analog, anonymous letter and The Pirate Bay

Privacy: Our parents were taking liberties for granted in their analog world, liberties that are not passed down to our children in the transition to digital — such as the simple right to send an anonymous letter.

Sometimes when speaking, I ask the audience how many would be okay with sites like The Pirate Bay, even if it means that artists are losing money from their operation. (Do note that this assertion is disputed: I’m asking the question on the basis of what-if the assertion is true.) Some people raise their hands, the proportion varying with audience and venue.

The copyright industry asserts that the offline laws don’t apply on the Internet when they want to sue and prosecute people sharing knowledge and culture. They’re right, but not in the way they think. They’re right that copyright law does apply online as well. But privacy laws don’t, and they should.

In the offline world, an analog letter was given a certain level of protection. This was not intended to cover just the physical letter as such, but correspondence in general; it was just that the letter was the only form of such correspondence when these liberties were drafted.

First, the letter was anonymous. It was your prerogative entirely whether you identified yourself as sender of the letter on the outside of the envelope, on the inside of the letter (so not even the postal service knew who sent it, only the recipient), or not at all.

Further, the letter was untracked in transit. The only governments tracking people’s correspondence were those we looked down on with enormous contempt.

Third, the letter was secret. The envelope would never we broken in transit.

Fourth, the carrier was never responsible for the contents, of nothing else for the simple reason they were not allowed to examine the content in the first place. But even if they could, like with a envelopeless postcard, they were never liable for executing their courier duties — this principle, the courier immunity or messenger immunity, is a principle that dates as far back as the Roman Empire.

These principles, the liberties of correspondence, should apply to offline correspondence (the letter) just as it should to online correspondence. But it doesn’t. You don’t have the right to send anything you like to anybody you like online, because it might be a copyright infringement — even though our parents had exactly this right in their offline world.

So the copyright industry is right – sending a copied drawing in a letter is a copyright infringement, and sending a copied piece of music over the net is the same kind of copyright infringement. But offline, there are checks and balances to these laws – even though it’s a copyright infringement, nobody is allowed to open the letter in transit just to see if it violates the law, because the secrecy of private correspondence is considered more important than discovering copyright infringements. This is key. This set of checks and balances has not been carried over into the digital environment.

The only time a letter is opened and prevented is when somebody is under individual and prior suspicion of a serious crime. The words “individual” and “prior” are important here — opening letters just to see if they contain a non-serious crime in progress, like copyright infringement, is simply not permitted in the slightest.

There is no reason for the offline liberties of our parents to not be carried over into the same online liberties for our children, regardless of whether that means somebody doesn’t know how to run a business anymore.

After highlighting these points, I repeat the question whether the audience would be okay with sites like The Pirate Bay, even if it means an artist is losing income. And after making these points, basically everybody raises their hand to say they would be fine with it; they would be fine with our children having the same liberty as our parents, and the checks and balances of the offline world to also apply online.

Next in the series, we’re going to look at a related topic – public anonymous announcements and the important role the city square soapbox filled in shaping liberty.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (3/21): Posting an Anonymous Public Message

Privacy: The liberties of our parents are not being inherited by our children – they are being lost wholesale in the transition to digital. Today, we’ll look at the importance of posting anonymous public messages.

When I was in my teens, before the Internet (yes, really), there was something called BBSes – Bulletin Board Systems. They were digital equivalents of an analog Bulletin Board, which in turn was a glorified sheet of wood intended for posting messages to the public. In a sense, they were an anonymous equivalent of today’s webforum software, but you connected from your home computer directly to the BBS over a phone line, without connecting to the Internet first.

The analog Bulletin Boards are still in existence, of course, but mostly used for concert promotions and the occasional fringe political or religious announcement.

In the early 1990s, weird laws were coming into effect worldwide as a result of lobbying from the copyright industry: the owners of bulletin board systems could be held liable for what other people posted on them. The only way to avoid liability was to take down the post within seven days. Such liability had no analog equivalent at all; it was an outright ridiculous idea that the owner of a piece of land should be held responsible for a poster put up on a tree on that land, or even that the owner of a public piece of cardboard could be sued for the posters other people had glued up on that board.

Let’s take that again: it is extremely weird from a legal standpoint that an electronic hosting provider is in any way, shape, or form liable for the contents hosted on their platform. It has no analog equivalent whatsoever.

Sure, people could put up illegal analog posters on an analog bulletin board. That would be an illegal act. When that happened, it was the problem of law enforcement, and never of the bulletin board owner. The thought is ridiculous and has no place in the digital landscape either.

The proper digital equivalent isn’t to require logging to hand over upload IPs to law enforcement, either. An analog bulletin board owner is under no obligation whatsoever to somehow identify the people using the bulletin board, or even monitor whether it’s being used at all.

The Analog Equivalent Privacy Right for an electronic post hosting provider is for an uploader to be responsible for everything they upload for the public to see, with no liability at all for the hosting provider under any circumstance, including no requirement to log upload data to help law enforcement find an uploader. Such monitoring is not a requirement in the analog world of our parents, nor is there an analog liability for anything posted, and there is no reason to have it otherwise in the digital world of our children just because somebody doesn’t know how to run a business otherwise.

As a side note, the United States would not exist had today’s hosting liability laws in place when it formed. A lot of writing was being circulated at the time arguing for breaking with the British Crown and forming an Independent Republic; from a criminal standpoint, this was inciting and abetting high treason. This writing was commonly nailed to trees and public posts, for the public to read and make up their own minds. Imagine for a moment if the landowners where such trees happened to stand had been charged with high treason for “hosting content” — the thought is as ridiculous in the analog would, as it really is in the digital too. We just need to pull the illusion aside, that the current laws on digital hosting make any kind of sense. These laws really are as ridiculous in the digital world of our children, as they would have been in the analog world of our parents.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (4/21): Our children have lost the Privacy of Location

Privacy: In the analog world of our parents, as an ordinary citizen and not under surveillance because of being a suspect of a crime, it was taken for granted that you could walk around a city without authorities tracking you at the footstep level. Our children don’t have this right anymore in their digital world.

Not even the dystopias of the 1950s — Nineteen Eighty-Four, Brave New World, Colossus, and so on, managed to dream up the horrors of this element: the fact that every citizen is now carrying a governmental tracking device. They’re not just carrying one, they even bought it themselves. Not even Brave New World could have imagined this horror.

It started out innocently, of course. It always does. With the new “portable phones” — which, at this point, meant something like “not chained to the floor” — authorities discovered that people would still call the Emergency Services number (112, 911, et cetera) from their mobile phones, but not always be capable of giving their location themselves, something that the phone network was now capable of doing. So authorities mandated that the phone networks be technically capable of always giving a subscriber’s location, just in case they would call Emergency Services. In the United States, this was known as the E911 regulation (“Enhanced 9-1-1”).

This was in 2005. Things went bad very quickly from there. Imagine that just 12 years ago, we still had the right to roam around freely without authorities being capable of tracking our every footstep – this was no more than just over a decade ago!

Before this point, governments supplied you with services so that you would be able to know your location, as had been the tradition since the naval lighthouse, but not so that they would be able to know your location. There’s a crucial difference here. And as always, the first breach was one of providing citizen services — in this case, emergency medical services — that only the most prescient dystopians would oppose.

What’s happened since?

Entire cities are using wi-fi passive tracking to track people at the individual, realtime, and sub-footstep level in the entire city center.

Train stations and airports, which used to be safe havens of anonymity in the analog world of our parents, have signs saying they employ realtime passive wi-fi and bluetooth tracking of everybody even coming close, and are connecting their tracking to personal identifying data. Correction: they have signs about it in the best case but do it regardless.

People’s location are tracked in at least three different… not ways, but categories of ways:

Active: You carry a sensor of your location (GPS sensor, Glonass receiver, cell tower triangulator, or even visual identifier through the camera). You use the sensors to find your location, at one point in time or continuously. The government takes itself the right to read the contents of your active sensors.

Passive: You take no action, but are still transmitting your location to the government continuously through a third party. In this category, we find cell tower triangulation as well as passive wi-fi and bluetooth tracking that require no action on behalf of a user’s phone other than being on.

Hybrid: The government finds your location in occasional pings through active dragnets and ongoing technical fishing expeditions. This would not only include cellphone-related techniques, but also face recognition connected to urban CCTV networks.

Privacy of location is one of the Seven Privacies, and we can calmly say that without active countermeasures, it’s been completely lost in the transition from analog to digital. Our parents had privacy of location, especially in busy places like airports and train stations. Our children don’t have privacy of location, not in general, and particularly not in places like airports and train stations that were the safest havens of our analog parents.

How do we reinstate Privacy of Location today? It was taken for granted just 12 years ago.




iva

Analog Equivalent Rights (5/21): Where did Freedom of Assembly go?

Privacy: Our analog parents had the right to meet whomever they liked, wherever they liked, and discuss whatever they liked, without the government knowing. Our digital children have lost this, just because they use more modern items.

For a lot of our digital children’s activities, there’s no such thing as privacy anymore, as they naturally take place on the net. For people born 1980 and later, it doesn’t make sense to talk of “offline” or “online” activities. What older people see as “people spending time with their phone or computer”, younger see as socializing using their phone or computer.

This is an important distinction that the older generation tends to not understand.

Perhaps this is best illustrated with an anecdote from the previous generation again: The parents of our parents complained that our parents were talking with the phone, and not to another person using the phone. What our parents saw as socializing (using an old analog landline phone), their parents in turn saw as obsession with a device. There’s nothing new under the sun.

(Note: when I say “digital children” here, I am not referring to children as in young people below majority age; I am referring to the next generation of fully capable adult professionals.)

This digital socializing, however, can be limited, it can be… permissioned. As in, requiring somebody’s permission to socialize in the way you and your friends want, or even to socialize at all. The network effects are strong and create centralizing pressure toward a few platforms where everybody hang out, and as these are private services, they get to set any terms and conditions they like for people assembling and socializing – for the billions of people assembling and socializing there.

Just as one example to illustrate this: Facebook is using American values for socializing, not universal values. Being super-against anything even slightly naked while being comparatively accepting of hate speech is not something inherently global; it is strictly American. If Facebook had been developed in France or Germany instead of the US, any and all nudity would be welcomed as art and free-body culture (Freikörperkultur) and a completely legitimate way of socializing, but the slightest genocide questioning would lead to an insta-kickban and reporting to authorities for criminal prosecution.

Therefore, just using the dominant Facebook as an example, any non-American way of socializing is effectively banned worldwide, and it’s likely that people developing and working with Facebook aren’t even aware of this. But the Freedom of Assembly hasn’t just been limited in the online sphere, but also in the classic analog offline world where our analog parents used to hang out (and still do).

Since people’s locations are tracked, as we saw in the previous post, it is possible to match locations between individuals and figure out who was talking to whom, as well as when and where this happened, even if they were only talking face to face. As I’m looking out my window from the office writing this piece, it just so happens that I’m looking at the old Stasi headquarters across from Alexanderplatz in former East Berlin. It was a little bit like Hotel California; people who checked in there tended to never leave. Stasi also tracked who was talking to whom, but required a ton of people to perform this task manually, just in order to walk behind other people and photograph whom they were talking to — and therefore, there was an economic limit to how many people could be tracked like this at any one time before the national economy couldn’t sustain more surveillance. Today, that limit is completely gone, and everybody is tracked all the time.

Do you really have Freedom of Assembly, when the fact that you’ve associated with a person — indeed, maybe just spent time in their physical proximity — can be held against you?

I’m going to illustrate this with an example. In a major leak recently, it doesn’t matter which one, a distant colleague of mine happened to celebrate a big event with a huge party in near physical proximity to where the documents were being copied at the same time, completely unaware and by sheer coincidence. Months later, this colleague was part of journalistically vetting those leaked documents and verifying their veracity, while at this time still unaware of the source and that they had held a big party very close to the origin of the documents.

The government was very aware of the physical proximity of the leak combined with this person’s journalistic access to the documents, though, and issued not one but two arrest-on-sight warrants for this distant colleague based on that coincidence. They are now living in exile outside of Sweden, and don’t expect to be able to return home anytime soon.

Privacy, including Privacy of Location, remains your own responsibility.




iva

Analog Equivalent Rights (6/21): Everything you do, say, or think today will be used against you in the future

Privacy: “Everything you say or do can and will be used against you, at any point in the far future when the context and agreeableness of what you said or did has changed dramatically.” With the analog surveillance of our parents, everything was caught in the context of its time. The digital surveillance of our children saves everything for later use against them.

It’s a reality for our digital children so horrible, that not even Nineteen Eighty-Four managed to think of it. In the analog surveillance world, where people are put under surveillance only after they’ve been identified as suspects of a crime, everything we said and did was transient. If Winston’s telescreen missed him doing something bad, then it had missed the moment and Winston was safe.

The analog surveillance was transient for two reasons: one, it was assumed that all surveillance was people watching other people, and two, that nobody would have the capacity of instantly finding keywords in the past twenty years of somebody’s conversations. In the analog world of our parents, that would mean somebody would need to actually listen to twenty years’ worth of tape recordings, which would in turn take sixty years (as we only work 8 out of 24 hours). In the digital world of our children, surveillance agencies type a few words to get automatic transcripts of the saved-forever surveillance-of-everybody up on screen in realtime as they type the keywords – not just from one person’s conversation, but from everybody’s. (This isn’t even exaggerating; this was reality in or about 2010 with the GCHQ-NSA XKEYSCORE program.)

In the world of our analog parents, surveillance was only a thing at the specific time it was active, which was when you were under individual and concrete suspicion of a specific, already-committed, and serious crime.

In the world of our digital children, surveillance can be retroactively activated for any reason or no reason, with the net effect that everybody is under surveillance for everything they have ever done or said.

We should tell people as it has become instead; “anything you say or do can be used against you, for any reason or no reason, at any point in the future”.

The current generation has utterly failed to preserve the presumption of innocence, as it applies to surveillance, in the shift from our analog parents to our digital children.

This subtle addition – that everything is recorded for later use against you – amplifies the horrors of the previous aspects of surveillance by orders of magnitude.

Consider somebody asking you where you were on the evening of March 13, 1992. You would, at best, have a vague idea of what you did that year. (“Let’s see… I remember my military service started on March 3 of that year… and the first week was a tough boot camp in freezing winter forest… so I was probably… back at barracks after the first week, having the first military theory class of something? Or maybe that date was a Saturday or Sunday, in which case I’d be on weekend leave?” That’s about the maximum precision your memory can produce for twenty-five years past.)

However, when confronted with hard data on what you did, the people confronting you will have an utter and complete upper hand, because you simply can’t refute it. “You were in this room and said these words, according to our data transcript. These other people were also in the same room. We have to assume what you said was communicated with the intention for them to hear. What do you have to say for yourself?”

It doesn’t have to be 25 years ago. A few months back would be sufficient for most memories to be not very detailed anymore.

To illustrate further: consider that the NSA is known to store copies even of all encrypted correspondence today, on the assumption that even if it’s not breakable today, it will probably be so in the future. Consider what you’re communicating encrypted today — in text, voice, or video — can be used against you in twenty years. You probably don’t even know half of it, because the window of acceptable behavior will have shifted in ways we cannot predict, as it always does. In the 1950s, it was completely socially acceptable to drop disparaging remarks about some minorities in society, which would socially ostracize you today. Other minorities are still okay to disparage, but might not be in the future.

When you’re listening to somebody talking from fifty years ago, they were talking in the context of their time, maybe even with the best of intentions by today’s standards. Yet, we could judge them harshly for their words interpreted by today’s context — today’s completely different context.

Our digital children will face exactly this scenario, because everything they do and say can and will be used against them, at any point in the future. It should not be this way. They should have every right to enjoy Analog Equivalent Privacy Rights.




iva

Analog Equivalent Rights (7/21): Analog Libraries Were Private Searches for Information

When our analog parents searched for information, that activity took place in libraries, and that was one of the most safeguarded privacies of all. When our digital children search for information, their innermost thoughts are instead harvested wholesale for marketing. How did this happen?

If you’re looking at one particular profession of the analog world that was absolutely obsessed with the privacy of its patrons, it was the librarians. Libraries were where people could search for their darkest secrets, were it literature, science, shopping, or something else. The secrecy of libraries were downright legendary.

As bomb recipes started appearing on the proto-Internet in the 1980s — on so-called BBSes — and some politicians tried to play on moral panics, many of common sense were quick to point out, that these “text files with bomb recipes” were no different than what you would find in the chemistry section of a mediocre-or-better library — and libraries were sacred. There was no moral panic to play on as soon as you pointed out that this was already available in every public library, for the public to access anonymously

So private were libraries, in fact, that librarians were in collective outrage when the FBI started asking libraries for records of who had borrowed what book – and that’s how the infamous warrant canaries were invented. Yup, by a librarian, protecting the patrons of the library. Librarians have always been the profession defending privacy rights the hardest – in the analog as well as the digital.

In the analog world of our parents, their Freedom of Information was sacramount: their innermost thirst for learning, knowledge, and understanding. In the digital world of our children, their corresponding innermost thoughts are instead harvested wholesale and sold off to market trinkets into their faces.

It’s not just what our digital children successfully studied that’s up for grabs. In the terms of our analog parents, it’s what they ever went to the library for. It’s what they ever considered going to the library for. In the world of our digital children, everything they searched for is recorded — and everything they thought of searching for but didn’t.

Think about that for a moment: something that was so sacred for our analog parents that entire classes of professions would go on strike to preserve it, is now casually used for wholesale marketing in the world of our digital children.

Combine this with the previous article about everything you do, say, and think being recorded for later use against you, and we’re going to need a major change in thinking on this very soon.

There is no reason our children should have less Freedom of Information just because they happen to live in a digital environment, as compared to the analog environment of our parents. There is no reason our digital children shouldn’t enjoy Analog Equivalent Privacy Rights.

Of course, it can be argued that the Internet search engines are private services who are free to offer whatever services they like on whatever terms they like. But there were private libraries in the analog world of our parents, too. We’ll be returning to this “it’s private so you don’t have a say” concept a little later in this series.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (8/21): Using Third-Party Services Should Not Void Expectation of Privacy

Privacy: Ross Ulbricht handed in his appeal to the U.S. Supreme Court last week, highlighting an important Analog Equivalent Privacy Right in the process: Just because you’re using equipment that makes a third party aware of your circumstances, does that really nullify any expectation of privacy?

In most constitutions, there’s a protection of privacy of some kind. In the European Charter of Human Rights, this is specified as having the right to private and family life, home, and correspondence. In the U.S. Constitution, it’s framed slightly differently, but with the same outcome: it’s a ban for the government to invade privacy without good cause (“unreasonable search and seizure”).

U.S. Courts have long held, that if you have voluntarily given up some part of your digitally-stored privacy to a third party, then you can no longer expect to have privacy in that area. When looking at analog equivalence for privacy rights, this doctrine is atrocious, and in order to understand just how atrocious, we need to go back to the dawn of the manual telephone switchboards.

At the beginning of the telephone age, switchboards were fully manual. When you requested a telephone call, a manual switchboard operator would manually connect the wire from your telephone to the wire of the receiver’s telephone, and crank a mechanism that would make that telephone ring. The operators could hear every call if they wanted and knew who had been talking to whom and when.

Did you give up your privacy to a third party when using this manual telephone service? Yes, arguably, you did. Under the digital doctrine applied now, phonecalls would have no privacy at all, under any circumstance. But as we know, phonecalls are private. In fact, the phonecall operators were oathsworn to never utter the smallest part of what they learned on the job about people’s private dealings — so seriously was privacy considered, even by the companies running the switchboards.

Interestingly enough, this “third-party surrender of privacy” doctrine seems to have appeared the moment the last switchboard operator left their job for today’s automated phone-circuit switches. This was as late as 1983, just at the dawn of digital consumer-level technology such as the Commodore 64.

This false equivalence alone should be sufficient to scuttle the doctrine of “voluntarily” surrendering privacy to a third party in the digital world, and therefore giving up expectation of privacy: the equivalence in the analog world was the direct opposite.

But there’s more to the analog equivalent of third-party-service privacy. Somewhere in this concept is the notion that you’re voluntarily choosing to give up your privacy, as an active informed act — in particular, an act that stands out of the ordinary, since the Constitutions of the world are very clear that the ordinary default case is that you have an expectation of privacy.

In other words, since people’s everyday lives are covered by expectations of privacy, there must be something outside of the ordinary that a government can claim gives it the right to take away somebody’s privacy. And this “outside the ordinary” has been that the people in question were carrying a cellphone, and so “voluntarily” gave up their right to privacy, as the cellphone gives away their location to the network operator by contacting cellphone towers.

But carrying a cellphone is expected behavior today. It is completely within the boundaries of “ordinary”. In terms of expectations, this doesn’t differ much from wearing jeans or a jacket. This leads us to the question; in the thought experiment that yesterday’s jeans manufacturers had been able to pinpoint your location, had it been reasonable for the government to argue that you give up any expectation of privacy when you’re wearing jeans?

No. No, of course it hadn’t.

It’s not like you’re carrying a wilderness tracking device for the express purpose of rescue services to find you during a dangerous hike. In such a circumstance, it could be argued that you’re voluntarily carrying a locator device. But not when carrying something that everybody is expected to carry — indeed, something that everybody must carry in order to even function in today’s society.

When the only alternative to having your Constitutionally-guaranteed privacy is exile from modern society, a government should have a really thin case. Especially when the analog equivalent — analog phone switchboards — was never fair game in any case.

People deserve Analog Equivalent Privacy Rights.

Until a government recognizes this and voluntarily surrenders a power it has taken itself, which isn’t something people should hold their breath over, privacy remains your own responsibility.




iva

Analog Equivalent Rights (9/21): When the government knows what news you read, in what order, and for how long

Privacy: Our analog parents had the ability to read news anonymously, however they wanted, wherever they wanted, and whenever they wanted. For our digital children, a government agent might as well be looking over their shoulder: the government knows what news sources they read, what articles, for how long, and in what order.

For our analog parents, reading the news was an affair the government had no part of, or indeed had any business being part of. Our analog parents bought a morning newspaper with a few coins on the street corner, brought it somewhere quiet where they had a few minutes to spare, and started reading without anybody interfering.

When our digital children read the news, the government doesn’t just know what news source they choose to read, but also what specific articles they read from that news source, in what order, and for how long. So do several commercial actors. There are at least three grave issues with this.

The first is that since the government has this data, it will attempt to use this data. More specifically, it will attempt to use the data against the individual concerned, possibly in some sort of pre-crime scheme. We know this that since all data collected by a government will eventually be used against the people concerned, with mathematical certainty.

In an attention economy, data about what we pay attention to, how much, and for how long, are absolutely crucial predictive behaviors. And in the hands of a government which makes the crucial mistake of using it to predict pre-crime, the results can be disastrous for the individual and plain wrong for the government.

Of course, the instant the government uses this data in any way imaginable, positive or negative, it will become Heisenberg Metrics — the act of using the data will shape the data itself. For example, if somebody in government decides that reading about frugality probably is an indicator of poverty, and so makes people more eligible for government handouts, then such a policy will immediately shape people’s behavior to read more about frugality. Heisenberg Metrics is when a metric can’t be measured without making it invalid in the process.

(The phenomenon is named after the Heisenberg Uncertainty Principle, which is traditionally confused with the Observer Effect, which states you can’t measure some things without changing them in the process. The Heisenberg Uncertainty Principle is actually something else entirely; it states that you can’t measure precise momentum and position of a subatomic particle at the same time, and does not apply at all to Heisenberg Metrics.)

The second issue is that not only government, but also other commercial actors, will seek to act on these metrics, Heisenberg Metrics as they may be. Maybe somebody thinks that reading fanzines about motorcycle acrobatics should have an effect on your health and traffic insurance premiums?

The third issue is subtle and devious, but far more grave: the government doesn’t just know what articles you read and in what order, but as a corollary to that, knows what the last article you read was, and what you did right after reading it. In other words, it knows very precisely what piece of information leads you to stop reading and instead take a specific action. This is far more dangerous information than being aware of your general information feed patterns and preferences.

Being able to predict somebody’s actions with a high degree of certainty is a far more dangerous ability than being vaguely aware of somebody’s entertainment preferences.

Our analog parents had the privacy right of choosing their information source anonymously with nobody permitted (or able) to say what articles they read, in what order, or for what reason. It’s not unreasonable that our digital children should have the same privacy right, the analog equivalent privacy right.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (10/21): Analog journalism was protected; digital journalism isn’t

Privacy: In the analog world of our parents, leaks to the press were heavily protected in both ends – both for the leaker and for the reporter receiving the leak. In the digital world of our children, this has been unceremoniously thrown out the window while discussing something unrelated entirely. Why aren’t our digital children afforded the same checks and balances?

Another area where privacy rights have not been carried over from the analog to the digital concerns journalism, an umbrella of different activities we consider to be an important set of checks-and-balances on power in society. When somebody handed over physical documents to a reporter, that was an analog action that was protected by federal and state laws, and sometimes even by constitutions. When somebody is handing over digital access to the same information to the same type of reporter, reflecting the way we work today and the way our children will work in the future, that is instead prosecutable at both ends.

Let us illustrate this with an example from the real world.

In the 2006 election in Sweden, there was an outcry of disastrous information hygiene on behalf of the ruling party at the time (yes, the same ruling party that later administered the worst governmental leak ever). A username and password circulated that gave full access to the innermost file servers of the Social Democratic party administration from anywhere. The username belonged to a Stig-Olof Friberg, who was using his nickname “sigge” as username, and the same “sigge” as password, and who accessed the innermost files over the Social Democratic office’s unencrypted, open, wireless network.

Calling this “bad opsec” doesn’t begin to describe it. Make a careful note to remember that these were, and still are, the institutions and people we rely on to make policy for good safeguarding of sensitive citizen data.

However, in the shadow of this, there was also the more important detail that some political reporters were well aware of the login credentials, such as one of Sweden’s most (in)famous political reporters Niklas Svensson, who had been using the credentials as a journalistic tool to gain insight into the ruling party’s workings.

This is where it gets interesting, because in the analog world, that reporter would have received leaks in the form of copied documents, physically handed over to him, and leaking to the press in this analog manner was (and still is) an extremely protected activity under law and indeed some constitutions — in Sweden, as this concerns, you can even go to prison for casually speculating over coffee at work who might have been behind a leak to the press. It is taken extremely seriously.

However, in this case, the reporter wasn’t leaked the documents, but was leaked a key for access to the digital documents — the ridiculously insecure credentials “sigge/sigge” — and was convicted in criminal court for electronic trespassing as a result, despite doing journalistic work with a clear analog protected equivalent.

It’s interesting to look at history to see how much critically important events would never have been uncovered, if this prosecution of digital journalism had been applied to analog journalism.

For one example, let’s take the COINTELPRO leak, when activists copied files from an FBI office to uncover a covert and highly illegal operation by law enforcement to discredit political organizations based solely on their political opinion. (This is not what law enforcement should be doing, speaking in general terms.) This leak happened when activists put up a note on the FBI office door on March 8, 1971 saying “Please do not lock this door tonight”, came back in the middle of the night when nobody was there, found the door unlocked as requested, and took (stole) about 1,000 classified files that revealed the illegal practices.

These were then mailed to various press outlets. The theft resulted in the exposure of some of the FBI’s most self-incriminating documents, including several documents detailing the FBI’s use of postal workers, switchboard operators, etc., in order to spy on black college students and various non-violent black activist groups, according to Wikipedia. And here’s the kicker in the context: while the people stealing the documents could and would have been indicted for doing so, it was unthinkable to charge the reporters receiving them with anything.

This is no longer the case.

Our digital children have lost the right to leak information to reporters in the way the world works today, an activity that was taken for granted — indeed, seen as crucially important to the balance of power — in the world of our digital parents. Our digital children who work as reporters can no longer safely receive leaks showing abuse of power. It is entirely reasonable that our digital children should have at least the same set of civil liberties in their digital world, as our parents had in their analog world.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (11/21): Our parents used anonymous cash

Privacy: The anonymous cash of our analog parents is fast disappearing, and in its wake comes trackable and permissioned debit cards to our children. While convenient, it’s a wolf in sheep’s clothing.

In the last article, we looked at how our analog parents could anonymously buy a newspaper on the street corner with some coins, and read their news of choice without anybody knowing about it. This observation extends to far more than just newspapers, of course.

This ability of our parents – the ability to conduct decentralized, secure transactions anonymously – has been all but lost in a landscape that keeps pushing card payments for convenience. The convenience of not paying upfront, with credit cards; the convenience of always paying an exact amount, with debit cards; the convenience of not needing to carry and find exact amounts with every purchase. Some could even argue that having every transaction listed on a bank statement is a convenience of accounting.

But with accounting comes tracking. With tracking comes predictability and unwanted accountability.

It’s been said that a VISA executive can predict a divorce one year ahead of the parties involved, based on changes in purchase patterns. Infamously, a Target store was targeting a high school-aged woman with maternity advertising, which at first made her father furious: but as things turned out, the young woman was indeed pregnant. Target knew, and her own father didn’t.

This is because when we’re no longer using anonymous cash, every single purchase is tracked and recorded with the express intent on using it against us — whether for influencing us to make a choice to deplete our resources (“buy more”) or for punishing us for buying something we shouldn’t have, in a wide variety of conceivable ways.

China is taking the concept one step further, as has been written here before, and in what must have been the inspiration for a Black Mirror episode, is weighting its citizens’ Obedience Scores based on whether they buy useful or lavish items — useful in the views of the regime, of course.

It’s not just the fact that transactions of our digital children are logged for later use against them, in ways our analog parents could never conceive of.

It’s also that the transactions of our digital children are permissioned. When our digital children buy a bottle of water with a debit card, a transaction clears somewhere in the background. But that also means that somebody can decide to have the transaction not clear; somebody has the right to arbitrarily decide what people get to buy and not buy, if this trend continues for our digital children. That is a horrifying thought.

Our parents were using decentralized, censorship resistant, anonymous transactions in using plain cash. There is no reason our digital children should have anything less. It’s a matter of liberty and self-determination.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (12/21): Our parents bought things untracked, their footsteps in store weren’t recorded

Privacy: In the last article, we focused on how people are tracked today when using credit cards instead of cash. But few pay attention to the fact that we’re tracked when using cash today, too.

Few people pay attention to the little sign on the revolving door on Schiphol Airport in Amsterdam, Netherlands. It says that wi-fi and bluetooth tracking of every single individual is taking place in the airport.

What sets Schiphol Airport apart isn’t that they track individual people’s movements to the sub-footstep level in a commercial area. (It’s for commercial purposes, not security purposes.) No, what sets Schiphol apart is that they bother to tell people about it. (The Netherlands tend to take privacy seriously, as does Germany, and for the same reason.)

Locator beacons are practically a standard in bigger commercial areas now. They ping your phone using wi-fi and bluetooth, and using signal strength triangulation, a grid of locator beacons is able to show how every single individual is moving in realtime at the sub-footstep level. This is used to “optimize marketing” — in other words, find ways to trick people’s brains to spend resources they otherwise wouldn’t have. Our own loss of privacy is being turned against us, as it always is.

Where do people stop for a while, what catches their attention, what doesn’t catch their attention, what’s a roadblock for more sales?

These are legitimate questions. However, taking away people’s privacy in order to answer those questions is not a legitimate method to answer them.

This kind of mass individual tracking has even been deployed at city levels, which happened in complete silence until the Privacy Oversight Board of a remote government sounded the alarms. The city of Västerås got the green light to continue tracking once some formal criteria were met.

Yes, this kind of people tracking is documented to have been already rolled out citywide in at least one small city in a remote part of the world (Västerås, Sweden). With the government’s Privacy Oversight Board having shrugged and said “fine, whatever”, don’t expect this to stay in the small town of Västerås. Correction, wrong tense: don’t expect it to have stayed in just Västerås, where it was greenlit three years ago.

Our analog parents had the ability to walk around untracked in the city and street of their choice, without it being used or held against them. It’s not unreasonable that our digital children should have the same ability.

There’s one other way to buy things with cash which avoids this kind of tracking, and that’s paying cash-on-delivery when ordering something online or over the phone to your door — in which case your purchase is also logged and recorded, just in another type of system.

This isn’t only used against the ordinary citizen for marketing purposes, of course. It’s used against the ordinary citizen for every conceivable purpose. But we’ll be returning to that in a later article in the series.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (13/21): Our digital children are tracked not just in everything they buy, but in what they DON’T buy

Privacy: We’ve seen how our digital children’s privacy is violated in everything they buy with cash or credit, in a way our analog parents would have balked at. But even worse: our digital children’s privacy is also violated by tracking what they don’t buy — either actively decline or just plain walk away from.

Amazon just opened its first “Amazon Go” store, where you just pick things into a bag and leave, without ever going through a checkout process. As part of the introduction of this concept, Amazon points out that you can pick something off the shelves, at which point it’ll register in your purchase — and change your mind and put it back, at which point you’ll be registered and logged as having not purchased the item.

Sure, you’re not paying for something you changed your mind about, which is the point of the video presentation. But it’s not just about the deduction from your total amount to pay: Amazon also knows you considered buying it and eventually didn’t, and will be using that data.

Our digital children are tracked this way on a daily basis, if not an hourly basis. Our analog parents never were.

When we’re shopping for anything online, there are even simple plugins for the most common merchant solutions with the business terms “funnel analysis” — where in the so-called “purchase funnel” our digital children choose to leave the process of purchasing something — or “cart abandonment analysis”.

We can’t even simply walk away from something anymore without it being recorded, logged, and cataloged for later use against us.

But so-called “cart abandonment” is only one part of the bigger issue of tracking what we’re interested in in the age of our digital children, but didn’t buy. There is no shortage of people today who would swear they were just discussing a very specific type of product with their phone present (say, “black leather skirts”) and all of a sudden, advertising for that very specific type of product would pop up all over Facebook and/or Amazon ads. Is this really due to some company listening for keywords through the phone? Maybe, maybe not. All we know since Snowden is that if it’s technically possible to invade privacy, it is already happening.

(We have to assume here these people still need to learn how to install a simple adblocker. But still.)

At the worst ad-dense places, like (but not limited to) airports, there are eyeball trackers to find out which ads you look at. They don’t yet change to match your interests, as per Minority Report, but that’s already present on your phone and on your desktop, and so wouldn’t be foreign to see in public soon, either.

In the world of our analog parents, we weren’t registered and tracked when we bought something.

In the world of our digital children, we’re registered and tracked even when we don’t buy something.




iva

Analog Equivalent Rights (14/21): Our analog parents’ dating preferences weren’t tracked, recorded, and cataloged

Privacy: Our analog parents’ dating preferences were considered a most private of matters. For our digital children, their dating preferences is a wholesale harvesting opportunity for marketing purposes. How did this terrifying shift come to be?

I believe the first big harvester of dating preferences was the innocent-looking site hotornot.com 18 years ago, a site that more seemed like the after-hours side work of a frustrated highschooler than a clever marketing ploy. It simply allowed people to rate their subjective perceived attractiveness of a photograph, and to upload photographs for such rating. (The two founders of this alleged highschool side project netted $10 million each for it when the site was sold.)

Then the scene exploded, with both user-funded and advertising-funded dating sites, all of which cataloged people’s dating preferences to the smallest detail.

Large-scale pornography sites, like PornHub, also started cataloging people’s porn preferences, and contiously make interesting infographics about geographical differences in preferences. (The link is safe for work, it’s data and maps in the form of a news story on Inverse, not on Pornhub directly.) It’s particularly interesting, as Pornhub is able to break down preferences quite specifically by age, location, gender, income brackets, and so on.

Do you know anyone who told Pornhub any of that data? No, I don’t either. And still, they are able to pinpoint who likes what with quite some precision, precision that comes from somewhere.

And then, of course, we have the social networks (which may or may not be responsible for that tracking, by the way).

It’s been reported that Facebook can tell if you’re gay or not with as little as three likes. Three. And they don’t have to be related to dating preferences or lifestyle preferences — they can be any random selections that just map up well with bigger patterns.

This is bad enough in itself, on the basis that it’s private data. At a very minimum, our digital childrens’ preferences should be their own, just like their favorite ice cream.

But a dating preferences are not just a preference like choosing your flavor of ice cream, is it? It should be, but it isn’t at this moment in time. It could also be something you’re born with. Something that people even get killed for if they’re born with the wrong preference.

It is still illegal to be born homosexual in 73 out of 192 countries, and out of these 73, eleven prescribe the death penalty for being born this way. A mere 23 out of 192 countries have full marriage equality.

Further, although the policy direction is quite one-way toward more tolerance, acceptance, and inclusion at this point in time, that doesn’t mean the policy trend can’t reverse for a number of reasons, most of them very bad. People who felt comfortable in expressing themselves can again become persecuted.

Genocide is almost always based on public data collected with benevolent intent.

This is why privacy is the last line of defense, not the first. And this last line of defense, which held fast for our analog parents, has been breached for our digital children. That matter isn’t taken nearly seriously enough.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (15/21): Our digital children’s conversations are muted on a per-topic basis

Privacy: At worst, our analog parents could be prevented from meeting each other. Our digital children are prevented from talking about particular subjects, once the conversation is already happening. This is a horrifying development.

When our digital children are posting a link to The Pirate Bay somewhere on Facebook, a small window sometimes pops up saying “you have posted a link with potentially harmful content. Please refrain from posting such links.”

Yes, even in private conversations. Especially in private conversations.

This may seem like a small thing, but it is downright egregious. Our digital children are not prevented from having a conversation, per se, but are monitored for bad topics that the regime doesn’t like being discussed, and are prevented from discussing those topics. This is far worse than preventing certain people from just meeting.

The analog equivalent would be if our parents were holding an analog phone conversation, and a menacing third voice popped into the conversation with a slow voice speaking just softly enough to be perceived as threatening: “You have mentioned a prohibited subject. Please refrain from discussing prohibited subjects in the future.”

Our parents would have been horrified if this happened — and rightly so!

But in the digital world of our children, the same phenomenon is instead cheered on by the same people who would abhor it if it happened in their world, to themselves.

In this case, of course, it is any and all links to The Pirate Bay that are considered forbidden topics, under the assumption — assumption! — that they lead to manufacturing of copies that would be found in breach of the copyright monopoly in a court of law.

When I first saw the Facebook window above telling me to not discuss forbidden subjects, I was trying to distribute political material I had created myself, and used The Pirate Bay to distribute. It happens to be a very efficient way to distribute large files, which is exactly why it is being used by a lot of people for that purpose (gee, who would have thought?), including people like myself who wanted to distribute large collections of political material.

There are private communications channels, but far too few use them, and the politicians at large (yes, this includes our analog parents) are still cheering on this development, because “terrorism” and other bogeymen.

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (16/21): Retroactive surveillance of all our children

Privacy: In the analog world of our parents, it was absolutely unthinkable that the government would demand to know every footstep you took, every phonecall you made, and every message you wrote, just as a routine matter. For our digital children, government officials keep insisting on this as though it were perfectly reasonable, because terrorism, and also, our digital children may be listening to music together or watching TV together, which is illegal in the way they like to do it, because of mail-order legislation from Hollywood. To make things even worse, the surveillance is retroactive — it is logged, recorded, and kept until somebody wants all of it.

About ten years ago, a colleague of mine moved from Europe to China. He noted that among many differences, the postal service was much more tightly controlled — as in, every letter sent was written by hand onto a line in a log book, kept by the postmaster at each post office. Letter from, to whom, and the date.

At the time, three things struck me: one, how natural this was to the Chinese population, not really knowing anything else; two, how horrified and denouncing our analog parents would have been at this concept; three, and despite that, that this is exactly what our lawmaker analog parents are doing to all our digital children right now.

Or trying to do, anyway; the courts are fighting back hard.

Yes, I’m talking about Telecommunications Data Retention.

There is a saying, which mirrors the Chinese feeling of normality about this quite well: “The bullshit this generation puts up with as a temporary nuisance from deranged politicians will seem perfectly ordinary to the next generation.”

Every piece of surveillance so far in this series is amplified by several orders of magnitude by the notion that it you’re not only being watched, but that everything you do is recorded for later use against you.

This is a concept so bad, not even Nineteen-Eighty Four got it: If Winston’s telescreen missed him doing something that the regime didn’t want him to do, Winston would have been safe, because there was no recording happening; only surveillance in the moment.

If Winston Smith had had today’s surveillance regime, with recording and data retention, the regime could and would have gone back and re-examined every earlier piece of action for what they might have missed.

This horror is reality now, and it applies to every piece in this series. Our digital children aren’t just without privacy in the moment, they’re retroactively without privacy in the past, too.

(Well, this horror is a reality that comes and goes, as legislators and courts are in a tug of war. In the European Union, Data Retention was mandated in 2005 by the European Parliament, was un-mandated in 2014 by the European Court of Justice, and prohibited in 2016 by the same Court. Other jurisdictions are playing out similar games; a UK court just dealt a blow to the Data Retention there, for example.)

Privacy remains your own responsibility.




iva

Analog Equivalent Rights (17/21): The Previous Inviolability of Diaries

Privacy: For our analog parents, a diary or a personal letter could rarely be touched by authorities, not even by law enforcement searching for evidence of a crime. Objects such as these had protection over and above the constitutional privacy safeguards. For our digital children, however, the equivalent diaries and letters aren’t even considered worthy of basic constitutional privacy.

In most jurisdictions, there is a constitutional right to privacy. Law enforcement in such countries can’t just walk in and read somebody’s mail, wiretap their phonecalls, or track their IP addresses. They need a prior court order to do so, which in turn is based on a concrete suspicion of a serious crime: the general case is that you have a right to privacy, and violations of this rule are the exception, not the norm.

However, there’s usually a layer of protection over and above this: even if and when law enforcement gets permission from a judge to violate somebody’s privacy in the form of a search warrant of their home, there are certain things that may not be touched unless specific and additional permissions are granted by the same type of judge. This class of items includes the most private of the personal: private letters, diaries, and so on.

Of course, this is only true in the analog world of our parents. Even though the letter of the law is the same, this protection doesn’t apply at all to the digital world of our children, to their diaries and letters.

Because the modern diary is kept on a computer. If not on a desktop computer, then certainly on a mobile handheld one — what we’d call a “phone” for historical reasons, but what’s really a handheld computer.

And a computer is a work tool in the analog world of our parents. There are loads of precedent cases that establish any form of electronic device as a work tool, dating back well into the analog world, and law enforcement is falling back on all of them with vigor, even now that our digital devices are holding our diaries, personal letters, and other items far more private than an analog diary was ever capable of.

That’s right: whereas your parents’ diaries were extremely protected under the law of the land, your children’s diaries — no less private to them, than those of your parents were to your parents — are as protected from search and seizure as an ordinary steel wrench in a random workshop.

So the question is how we got from point A to point B here? Why are the Police, who know that they can’t touch an analog diary during a house search, instantly grabbing mobile phones which serve the same purpose for our children?

“Because they can”, is the short answer. “Also because nobody put their foot down” for advanced points on the civics course. It’s because some people saw short term political points in being “tough on crime” and completely erasing hard-won rights in the process.

Encrypt everything.




iva

Analog Equivalent Rights (18/21): Our analog parents had private conversations, both in public and at home

Privacy: Our parents, at least in the Western world, had a right to hold private conversations face-to-face, whether out in public or in the sanctity of their home. This is all but gone for our digital children.

Not long ago, it was the thing of horror books and movies that there would actually be widespread surveillance of what you said inside your own home. Our analog parents literally had this as scary stories worthy of Halloween, mixing the horror with the utter disbelief.

“There was of course no way of knowing whether you were being surveilled at any given moment. How often, or on what system, the Thought Police plugged in on any individual device was guesswork. It was even conceivable that they listened to everybody all the time. But at any rate they could listen to you whenever they wanted to. You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard.” — from Nineteen Eighty-Four

In the West, we prided ourselves on not being the East — the Communist East, specifically — who regarded their own citizens as suspects: suspects who needed to be cleansed of bad thoughts and bad conversations, to the degree that ordinary homes were wiretapped for ordinary conversations.

There were microphones under every café table and in every residence. And even if there weren’t in the literal sense, just there and then, they could still be anywhere, so you had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard.

“Please speak loudly and clearly into the flower pot.” — a common not-joke about the Communist societies during the Cold War

Disregard phonecalls and other remote conversations for now, since we already know them to be wiretapped across most common platforms. Let’s look at conversations in a private home.

We now have Google Echo and Amazon Alexa. And while they might have intended to keep your conversations to themselves, out of the reach of authorities, Amazon has already handed over living room recordings to authorities. In this case, permission became a moot point because the suspect gave permission. In the next case, permission might not be there, and it might happen anyway.

Mobile phones are already listening, all the time. We know because when we say “Ok Google” to an Android phone, it wakes up and listens more intensely. This, at a very minimum, means it’s always listening for the words “Ok Google”. IPhones have a similar mechanism listening for “Hey Siri”. While nominally possible to turn off, it’s one of those things you can never be sure of. And we carry these governmental surveillance microphones with us everywhere we go.

If the Snowden documents showed us anything in the general sense, it was that if a certain form of surveillance is technically possible, it is already happening.

And even if Google and Apple aren’t already listening, the German police got the green light to break into phones and plant Bundestrojaner, the flower-pot equivalent of hidden microphones, anyway. You would think that Germany of all countries has in recent memory what a bad idea this is. It could — maybe even should — be assumed that the police forces of other countries have and are already using similar tools.

For our analog parents, the concept of a private conversations was as self-evident as oxygen in the air. Our digital children may never know what one feels like.

And so we live today — from what started as a habit that has already become instinct — in the assumption that every sound we make is overheard by authorities.




iva

Analog Equivalent Rights (19/21): Telescreens in our Living Rooms

Privacy: The dystopic stories of the 1950s said the government would install cameras in our homes, with the government listening in and watching us at all times. Those stories were all wrong, for we installed the cameras ourselves.

In the analog world of our parents, it was taken for completely granted that the government would not be watching us in our own homes. It’s so important an idea, it’s written into the very constitutions of states pretty much all around the world.

And yet, for our digital children, this rule, this bedrock, this principle is simply… ignored. Just because they their technology is digital, and not the analog technology of our parents.

There are many examples of how this has taken place, despite being utterly verboten. Perhaps the most high-profile one is the OPTIC NERVE program of the British surveillance agency GCHQ, which wiretapped video chats without the people concerned knowing about it.

Yes, this means the government was indeed looking into people’s living rooms remotely. Yes, this means they sometimes saw people in the nude. Quite a lot of “sometimes”, even.

According to summaries in The Guardian, over ten percent of the viewed conversations may have been sexually explicit, and 7.1% contained undesirable nudity.

Taste that term. Speak it out loud, to hear for yourself just how oppressive it really is. “Undesirable nudity”. The way you are described by the government, in a file about you, when looking into your private home without your permission.

When the government writes you down as having “undesirable nudity” in your own home.

There are many other examples, such as the state schools that activate school-issued webcams, or even the US government outright admitting it’ll all your home devices against you.

It’s too hard not to think of the 1984 quote here:

The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it, moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized. — From Nineteen Eighty-Four

And of course, this has already happened. The so-called “Smart TVs” from LG, Vizio, Samsung, Sony, and surely others have been found to do just this — spy on its owners. It’s arguable that the data collected only was collected by the TV manufacturer. It’s equally arguable by the police officers knocking on that manufacturer’s door that they don’t have the right to keep such data to themselves, but that the government wants in on the action, too.

There’s absolutely no reason our digital children shouldn’t enjoy the Analog Equivalent Rights of having their own home to their very selves, a right our analog parents took for granted.




iva

Analog Equivalent Rights (20/21): Your analog boss couldn’t read your mail, ever

Europe: Slack has updated its Terms of Service to let your manager read your private conversations in private channels. Our analog parents would have been shocked and horrified at the very idea that their bosses would open packages and read personal messages that were addressed to them. For our digital children, it’s another shrugworthy part of everyday life.

The analog plain old telephone system, sometimes abbreviated POTS, is a good template for how things should be even in the digital world. This is something that lawmakers got mostly right in the old analog world.

When somebody is on a phonecall — an old-fashioned, analog phonecall — we know that the conversation is private by default. It doesn’t matter who owns the phone. It is the person using the phone, right this very minute, that has all the rights to its communication capabilities, right this very minute.

The user has all the usage rights. The owner has no right to intercept or interfere with the communications usage, just based on the property right alone.

Put another way: just because you own a piece of communications equipment, that doesn’t give you any kind of automatic right to listen to private conversations that happen to come across this equipment.

Regrettably, this only applies to the telephone network. Moreover, only the analog part of the telephone network. If anything is even remotely digital, the owner can basically intercept anything they like, for any reason they like.

This particularly extends to the workplace. It can be argued that you have no expectation of privacy for what you do on your employer’s equipment; this is precisely forgetting that such privacy was paramount for the POTS, less than two decades ago, regardless of who owned the equipment.

Some employers even install wildcard digital certificates on their workplace computers with the specific purpose of negating any end-to-end security between the employee’s computer and the outside world, effectively performing a so-called “man-in-the-middle attack”. In a whitewashed term, this practice is called HTTPS Interception instead of “man-in-the-middle attack” when it’s performed by your employer instead of another adversary.

Since we’re looking at difference between analog and digital, and how privacy rights have vanished in the transition to digital, it’s worth looking at the code of law for the oldest of analog correspondences: the analog letter, and whether your boss could open and read it just because it was addressed to you at your workplace.

Analog law differs somewhat between different countries on this issue, but in general, even if your manager or workplace were allowed to open your mail (which is the case in the United States but not in Britain), they are typically never allowed to read it (even in the United States).

In contrast, with electronic mail, your managers don’t just read your entire e-mail, but typically has hired an entire department to read it for them. In Europe, this went as far as the European Court of Human Rights, which ruled that it’s totally fine for an employer to read the most private of correspondence, as long as the employer informs of this fact (thereby negating the default expectation of privacy).

Of course, this principle about somewhat-old-fashioned e-mail applies to any and all electronic communications now, such as Slack.

So for our digital children, the concept of “mail is private and yours, no matter if you receive it at the workplace” appears to have been irrevocably lost. This was a concept our analog parents took so for granted, they didn’t see any need to fight for it.

Today, privacy remains your own responsibility.




iva

Analog Equivalent Rights (21/21): Conclusion, privacy has been all but eliminated from the digital environment

Privacy: In a series of posts on this blog, we have shown how practically everything our parents took for granted with regards to privacy has been completely eliminated for our children, just because they use digital tools instead of analog, and the people interpreting the laws are saying that privacy only applies to the old, analog environment of our parents.

Once you agree with the observation that privacy seems to simply not apply for our children, merely for living in a digitally-powered environment instead of our parents’ analog-powered one, surprise turns to shock turns to anger, and it’s easy to want to assign blame to someone for essentially erasing five generations’ fight for civil liberties while people were looking the other way.

So whose fault is it, then?

It’s more than one actor at work here, but part of the blame must be assigned to the illusion that that nothing has changed, just because our digital children can use old-fashioned and obsolete technology to obtain the rights they should always have by law and constitution, regardless of which method they use to talk to friends and exercise their privacy rights.

We’ve all heard these excuses.

“You still have privacy of correspondence, just use the old analog letter”. As if the Internet generation would. You might as well tell our analog parents that they would need to send a wired telegram to enjoy some basic rights.

“You can still use a library freely.” Well, only an analog one, not a digital one like The Pirate Bay, which differs from an analog library only in efficiency, and not in anything else.

“You can still discuss anything you like.” Yes, but only in the analog streets and squares, not in the digital streets and squares.

“You can still date someone without the government knowing your dating preferences.” Only if I prefer to date like our parents did, in the unsafe analog world, as opposed to the safe digital environment where predators vanish at the click of a “block” button, an option our analog parents didn’t have in shady bars.

The laws aren’t different for the analog and the digital. The law doesn’t make a difference between analog and digital. But no law is above the people who interpret it in the courts, and the way people interpret those laws means the privacy rights always apply to the analog world, but never to the digital world.

It’s not rocket science to demand the same laws to apply offline and online. This includes copyright law, as well as the fact that privacy of correspondence takes precedence over copyright law (in other words, you’re not allowed to open and examine private correspondence for infringements in the analog world, not without prior and individual warrants — our law books are full of these checks and balances; they should apply in the digital too, but don’t today).

Going back to blame, that’s one actor right there: the copyright industry. They have successfully argued that their monopoly laws should apply online just as it does offline, and in doing so, has completely ignored all the checks and balances that apply to the copyright monopoly laws in the analog world. And since copying movies and music has now moved into the same communications channels as we use for private correspondence, the copyright monopoly as such has become fundamentally incompatible with private correspondence at the conceptual level.

The copyright industry has been aware of this conflict and has been continuously pushing for eroded and eliminated privacy to prop up their crumbling and obsolete monopolies, such as pushing for the hated (and now court-axed) Data Retention Directive in Europe. They would use this federal law (or European equivalent thereof) to literally get more powers than the Police themselves in pursuing individual people who were simply sharing music and movies, sharing in the way everybody does.

There are two other major factors at work. The second factor is marketing. The reason we’re tracked at the sub-footstep level in airports and other busy commercial centers is simply to sell us more crap we don’t need. This comes at the expense of privacy that our analog parents took for granted. Don’t even get started on Facebook and Google.

Last but not least are the surveillance hawks — the politicians who want to look “Tough on Crime”, or “Tough on Terrorism”, or whatever the word of choice is this week. These were the ones who pushed the Data Retention Directive into law. The copyright industry were the ones who basically wrote it for them.

These three factors have working together, and they’ve been very busy.

It’s going to be a long uphill battle to win back the liberties that were slowly won by our ancestors over about six generations, and which have been all but abolished in a decade.

It’s not rocket science that our children should have at least the same set of civil liberties in their digital environment, as our parents had in their analog environment. And yet, this is not happening.

Our children are right to demand Analog Equivalent Privacy Rights — the civil liberties our parents not just enjoyed, but took for granted.

I fear the failure to pass on the civil liberties from our parents to our children is going to be seen as the greatest failure of this particular current generation, regardless of all the good we also accomplish. Surveillance societies can be erected in just ten years, but can take centuries to roll back.

Privacy remains your own responsibility today. We all need to take it back merely by exercising our privacy rights, with whatever tools are at our disposal.

Image from the movie “Nineteen-Eighty Four”; used under fair use for political commentary.




iva

Why Political Organizations Always Drift Off Left: O’Sullivan’s Law, Experienced

Activism: As the Pirate Party slowly veered to the left in politics, I got to experience Sullivan’s Law, which states that organizations that don’t outright declare themselves otherwise will inevitably drift off to the political left. The law doesn’t explain this phenomenon, but I think I can.

The Pirate Party was unique in its composition of activists. Whereas most political organizations can plot the political attitudes of their activists to a bell curve on the political left-to-right scale, that is, the organization can identify a clear peak and center mass where they lie politically, the Pirate Party instead had a complete empty trough in the middle, with waves crashing into the left and right wall on the left-to-right spectrum plot.

We had the most fervent anarchocapitalists and the most fervent anarchocommunists. At the same time. Cooperating. That was probably something of a political first. It also allowed me to see differences between these two groups that weren’t clear from the outset, and which might explain why organizations drift left over time.

O’Sullivans Law states that any organization that is not expressly right-leaning in politics will change over time to become left-leaning. There are some hypotheses as to why, including the observation that right-wing people will tolerate and even welcome left-wing people in an otherwise unpolitical organization, but that left-wing people will generally not tolerate right-wing people. While this observation can be made, I believe it is not enough for an entire organization to shift politically.

The explanation is far simpler, and it’s been hiding in plain sight for everyone.

Left-wing people are collectivists. They believe that the greater good shall have precedence over the wishes and desires over the individual, and organize to achieve this. Conversely, they do not feel at home when somebody tells them to promote a cause in whatever way they themselves think is best in their individual situation.

Right-wing people are individualists. They believe that the greatest good, even for the worst-off people, is best achieved by giving individuals as free reign as possible so that innovation and creativity can take place. Conversely, they do not feel at home when somebody is trying to dictate to them what to do and not to do.

This is almost painfully clear when working with both groups at the same time in a political organization. Ah yes, that’s the magic word, right there. Organization. A Non-profit organization, specifically. Do you know how these are run?

Basically without exception, they are run as a general assembly, where people are elected to positions and decisions are taken with a majority vote.

…decisions are taken with a majority vote.

It became painfully clear to me, that the form of a neutral association — the form we have, or had, accepted as neutral — is actually nothing of the sort. It turns out, that an organization that takes collective decisions promotes people who like collective decision-making, and turns away people who prefer individual initiatives.

The association with its board, its general assembly, and its majority votes isn’t neutral. It is pushing its membership left, through its very nature, by selecting for those who enjoy collective decision-making and procedural trickery, and marginalizing those who prefer individual initiatives.

This is why, if I were to found a new political organization today, I would never use the traditional Non-profit Association format, for it is not neutral and it will ruin whatever original vision you had.

For this same reason, I have come to be sceptical of center-right political parties who are run by this majority vote. They’ll never be as powerful as they can be, had they instead organized by individual initiatives — because they are competing against left-wing political parties who feel right at home in this form of organization, which they usually mandated to be the norm for everyone.




iva

Data Privacy



Datenschutzerklärung

 1. Information über die Erhebung personenbezogener Daten und Kontaktdaten des Verantwortlichen
 2. Datenerfassung beim Besuch unserer Website
 3. Kontaktaufnahme
 4. Cookies
 5. Datenverarbeitung zur Bestellabwicklung
 6. Datenverarbeitung bei Eröffnung eines Kundenkontos und zur Vertragsabwicklung
 7. Kommentarfunktion
 8. Nutzung Ihrer Daten zur Direktwerbung
 9.  Kontaktaufnahme zur Bewertungserinnerung
 10. Verwendung von Sozialen Medien: Social Plugins
 11. Verwendung von Sozialen Medien: Video
 12. Online-Marketing
 13. Webanalysedienste
 14. Retargeting / Remarketing / Empfehlungswerbung
 15. Tools und Sonstiges
 16.  Rechte des Betroffenen
 17. Dauer der Speicherung personenbezogener Daten

1. Information über die Erhebung personenbezogener Daten und Kontaktdaten des Verantwortlichen

1.1. Vielen Dank für Ihren Besuch unserer Webseite. Nachfolgend möchten wir Sie über den Umgang mit Ihren personenbezogenen Daten bei der Nutzung unserer Website informieren. Personenbezogene Daten sind grundsätzlich alle Daten, mit denen Sie persönlich identifiziert werden können.

1.2. Verantwortlicher für die Verarbeitung von Daten auf unserer Website im Sinne der Datenschutz-Grundverordnung (DSGVO) ist:

kunstform GmbH
Rotebühlstr. 63 
Stuttgart Deutschland
Tel.:0711/21954890
Fax:0711/21954899
E-Mail: contact@kunstform.org

1.3. Um die Sicherheit Ihrer Daten bei der Übertragung zu schützen, verwenden wir dem aktuellen Stand der Technik entsprechende Verschlüsselungsverfahren (z. B. SSL oder TSL) über HTTPS.

2. Datenerfassung beim Besuch unserer Website

Bei jedem Aufruf unserer Webseite erfasst unser System automatisiert Daten und Informationen, die Ihr Browser an unseren Server übermittelt (sog. "Server-Logfiles"). Folgende, für uns technisch erforderliche Daten werden dabei erhoben:

  • Unsere besuchte Website
  • Datum und Uhrzeit zum Zeitpunkt des Zugriffes
  • Menge der gesendeten Daten in Byte
  • Quelle/Verweis, von welchem Sie auf die Seite gelangten
  • Verwendetes Betriebssystem
  • Verwendeter Browser
  • Verwendete IP-Adresse (ggf.: in anonymisierter Form)
Rechtsgrundlage für die Verarbeitung ist Art. 6 Abs. 1 lit. f DSGVO aufgrund unseres berechtigten Interesses an der Verbesserung der Stabilität und Erhaltung der Funktionsfähigkeit unserer Website. Eine Weitergabe oder anderweitige Verwendung der Daten findet nicht statt. Die vorübergehende Speicherung der IP-Adresse durch das System ist notwendig, um eine Auslieferung der Website an den Rechner des Nutzers zu ermöglichen. Hierfür muss die IP-Adresse des Nutzers für die Dauer der Sitzung gespeichert bleiben.
Wir behalten uns vor, die Server-Logfiles nachträglich zu überprüfen, sollten konkrete Anhaltspunkte auf eine rechtswidrige Nutzung hinweisen. Die Daten werden gelöscht, sobald sie für die Erreichung des Zweckes ihrer Erhebung nicht mehr erforderlich sind. Im Falle der Erfassung der Daten zur Bereitstellung der Website ist dies der Fall, wenn die jeweilige Sitzung beendet ist. 
Im Falle der Speicherung der Daten in Logfiles ist dies nach spätestens sieben Tagen der Fall. Eine darüberhinausgehende Speicherung ist möglich. In diesem Fall werden die IP-Adressen der Nutzer gelöscht oder verfremdet, sodass eine Zuordnung des aufrufenden Clients nicht mehr möglich ist. Die Erfassung der Daten zur Bereitstellung der Website und die Speicherung der Daten in Logfiles ist für den Betrieb der Internetseite zwingend erforderlich. Es besteht folglich seitens des Nutzers keine Widerspruchsmöglichkeit. 

3. Kontaktaufnahme

Wenn Sie mit uns per Kontaktformular Kontakt aufnehmen, werden die in der Eingabemaske eingegeben Daten an uns übermittelt und gespeichert. Die erhobenen Daten sind der jeweiligen Eingabemaske zu entnehmen. Bei der Kontaktaufnahme per E-Mail werden ausschließlich die dort von Ihnen eingegebenen Daten an uns übertragen.
Die Daten werden ausschließlich für die Verarbeitung der Konversation und Ihres Anliegens verwendet. Rechtsgrundlage für die Verarbeitung der Daten ist bei Vorliegen einer Einwilligung des Nutzers Art. 6 Abs. 1 lit. a) DSGVO. Rechtsgrundlage für die Verarbeitung der Daten, die im Zuge einer Übersendung einer E-Mail übermittelt werden, ist Art. 6 Abs. 1 lit. f) DSGVO. Zielt der E-Mail-Kontakt auf den Abschluss eines Vertrages ab, so ist zusätzliche Rechtsgrundlage für die Verarbeitung Art. 6 Abs. 1 lit. b) DSGVO. Die Daten werden gelöscht, sobald sie für die Erreichung des Zweckes ihrer Erhebung nicht mehr erforderlich sind und sofern keine gesetzlichen Aufbewahrungspflichten entgegenstehen. Für die personenbezogenen Daten aus der Eingabemaske des Kontaktformulars und diejenigen, die per E-Mail übersandt wurden, ist dies dann der Fall, wenn die jeweilige Konversation mit dem Nutzer beendet ist. Beendet ist die Konversation dann, wenn sich aus den Umständen entnehmen lässt, dass der betroffene Sachverhalt abschließend geklärt ist. Der Nutzer hat jederzeit die Möglichkeit, seine Einwilligung zur Verarbeitung der personenbezogenen Daten zu widerrufen. Nimmt der Nutzer per E-Mail Kontakt mit uns auf, so kann er der Speicherung seiner personenbezogenen Daten jederzeit widersprechen. In einem solchen Fall kann die Konversation nicht fortgeführt werden.

4. Cookies

Unsere Webseite verwendet Cookies. 

Cookies sind Textdateien, die auf dem Endgerät des Nutzers gespeichert werden. Ruft ein Nutzer eine Website auf, so kann ein Cookie auf dem Betriebssystem des Nutzers gespeichert werden. Einige Funktionen unserer Internetseite können ohne den Einsatz von Cookies nicht angeboten werden. Dafür ist es erforderlich, dass der Browser auch nach einem Seitenwechsel wiedererkannt wird. Die durch technisch notwendige Cookies erhobenen Nutzerdaten werden nicht zur Erstellung von Nutzerprofilen verwendet. In den o.g. Zwecken liegt auch unser berechtigtes Interesse in der Verarbeitung der personenbezogenen Daten nach Art. 6 Abs. 1 lit. f) DSGVO.

Darüber hinaus verwendet unsere Website unter Umständen Cookies, die eine Analyse des Surfverhaltens der Nutzer ermöglichen (sog. Third Party Cookies). Nähere Informationen zu Umfang, Zweck, Rechtsgrundlage und Widerspruchsmöglichkeiten erhalten Sie in den jeweiligen Abschnitten des jeweiligen Kapitels dieser Datenschutzerklärung.

Sie als Nutzer haben die volle Kontrolle über die Verwendung von Cookies. Durch eine Änderung der Einstellungen in Ihrem Internetbrowser können Sie die Übertragung von Cookies deaktivieren, einschränken oder löschen. Wenn Sie Cookies für unsere Website deaktivieren, können möglicherweise nicht mehr alle Funktionen der Website vollumfänglich genutzt werden. Die Übermittlung von Flash-Cookies können Sie über eine Änderung der Einstellung des Flash Players unterbinden.

Hilfe zu den Einstellungen finden Sie im jeweiligen Hilfemenü Ihres Browsers  oder unter den folgenden Links:
Internet Explorer: http://windows.microsoft.com/de-DE/windows-vista/Block-or-allow-cookies
Firefox: https://support.mozilla.org/de/kb/cookies-erlauben-und-ablehnen
Chrome: http://support.google.com/chrome/bin/answer.py?hl=de&hlrm=en&answer=95647
Safari: https://support.apple.com/de-de/guide/safari/sfri11471/mac
Opera: https://help.opera.com/en/latest/web-preferences/#cookies

Einige der hier verwendeten Cookies werden nach Schließen Ihres Browsers wieder gelöscht (sog. Sitzungs-Cookies). Andere Cookies bleiben auf Ihrem Endgerät und ermöglichen uns oder unseren Partnerunternehmen (Third Party Cookies), Ihren Browser beim nächsten Besuch wiederzuerkennen (persistente Cookies). Werden Cookies gesetzt, erheben und verarbeiten diese im individuellen Umfang bestimmte Nutzerinformationen wie Browser- und Standortdaten sowie IP-Adresswerte. Persistente Cookies werden automatisiert nach einer vorgegebenen Dauer gelöscht, die sich je nach Cookie unterscheiden kann.


5. Datenverarbeitung zur Bestellabwicklung

5.1. Wenn Sie in unserem Webshop bestellen möchten, ist es für den Vertragsabschluss erforderlich, dass Sie Ihre persönlichen Daten angeben, die wir für die Abwicklung Ihrer Bestellung benötigen. Die von Ihnen angegebenen Daten verarbeiten wir zur Abwicklung Ihrer Bestellung. 

Teilweise arbeiten wir mit externen Dienstleistern zusammen, um Ihre Bestellung abzuwickeln. Hierfür müssen wir die dazu erforderlichen personenbezogen Daten weitergeben.

Sofern wir Transportunternehmen mit der Lieferung Ihrer Ware beauftragen, geben wir Ihre für die Lieferung der Ware erforderlichen Daten an das jeweilige Transportunternehmen weiter. Für die Abwicklung der Zahlungen geben wir Ihre Daten im Rahmen der Erforderlichkeit an das beauftragte Kreditinstitut weiter. Falls wir Zahlungsdienstleister einsetzen, werden Sie darüber ebenfalls nachfolgend informiert. 
Rechtsgrundlage für die Weitergabe Ihrer Daten ist Art. 6 Abs. 1 lit. b DSGVO.

5.2. Weitergabe Ihrer personenbezogenen Daten an Versanddienstleister

- DHL

Erfolgt die Zustellung der Ware an Sie durch den Transportdienstleister DHL (Deutsche Post AG, Charles-de-Gaulle-Straße 20, 53113 Bonn), geben wir zum Zwecke der Zustellung und im Rahmen der Erforderlichkeit gemäß Art. 6 Abs. 1 lit. b DSGVO nur den Namen des Empfängers und die Lieferadresse an DHL weiter. Nur wenn Sie im Bestellprozess Ihre ausdrückliche Einwilligung erteilt haben, geben wir Ihre E-Mail-Adresse gemäß Art. 6 Abs. 1 lit. a DSGVO vor der Zustellung der Ware zum Zwecke der Abstimmung eines Liefertermins bzw. zur Lieferankündigung an DHL weiter. Ihre Einwilligung kann jederzeit mit Wirkung für die Zukunft gegenüber dem oben bezeichneten Verantwortlichen oder gegenüber dem Transportdienstleister DHL widerrufen werden.

5.3. Verwendung von Zahlungsdienstleistern

5.4. bancontact

Bei der Zahlung via "bancontact"  über den Paypal Checkout erfolgt die Zahlungsabwicklung über den Zahlungsdienstleister den Zahlungsdienstleister PayPal (Europe) S.à r.l. et Cie, S.C.A., 22-24 Boulevard Royal, L-2449 Luxembourg (folgend: "Paypal").

Nähere Informationen zum Paypal-Checkout erfahren Sie im entsprechenden, nachfolgenden Passus.

5.5. blik

Bei der Zahlung via "blik"  über den Paypal Checkout erfolgt die Zahlungsabwicklung über den Zahlungsdienstleister den Zahlungsdienstleister PayPal (Europe) S.à r.l. et Cie, S.C.A., 22-24 Boulevard Royal, L-2449 Luxembourg (folgend: "Paypal").

Nähere Informationen zum Paypal-Checkout erfahren Sie im entsprechenden, nachfolgenden Passus.

5.6. ConCardis

Bei der Kreditkartenzahlung via ConCardis erfolgt die Zahlungsabwicklung über die ConCardis GmbH, Helfmann-Park 7, 65760 Eschborn. Wir geben Ihre personenbezogenen Daten nebst den Informationen über Ihre Bestellung gemäß Art. 6 Abs. 1 lit. b DSGVO zum Zwecke der Zahlungsabwicklung und im Rahmen der Erforderlichkeit an ConCardis weiter. Einzelheiten zu den Datenschutzbestimmungen von ConCardis finden Sie hier: https://www.concardis.com/datenschutzerklaerung

5.7. mybank

Bei der Zahlung via "mybank"  über den Paypal Checkout erfolgt die Zahlungsabwicklung über den Zahlungsdienstleister den Zahlungsdienstleister PayPal (Europe) S.à r.l. et Cie, S.C.A., 22-24 Boulevard Royal, L-2449 Luxembourg (folgend: "Paypal").

Nähere Informationen zum Paypal-Checkout erfahren Sie im entsprechenden, nachfolgenden Passus.

- Paypal

Bei Auswahl der Zahlungsart PayPal, Kreditkarte via PayPal, Lastschrift via PayPal oder – falls angeboten - "Kauf auf Rechnung" oder "Ratenzahlung" via PayPal erfolgt die Zahlungsabwicklung über die PayPal (Europe) S.a.r.l. et Cie, S.C.A., 22-24 Boulevard Royal, L-2449 Luxembourg (nachfolgend "PayPal" genannt).
Wir geben Ihre personenbezogenen Daten gemäß Art. 6 Abs. 1 lit. b DSGVO im Rahmen der Erforderlichkeit an PayPal weiter. PayPal behält sich für die Zahlungsmethoden Kreditkarte via PayPal, Lastschrift via PayPal oder – falls angeboten - "Kauf auf Rechnung" oder "Ratenzahlung" via PayPal die Durchführung einer Bonitätsauskunft vor.
Hierfür werden Ihre Zahlungsdaten gegebenenfalls gemäß Art. 6 Abs. 1 lit. f DSGVO aufgrund berechtigten Interesses von PayPal an der Feststellung Ihrer Zahlungsfähigkeit an Auskunfteien weitergegeben. Das Ergebnis der Bonitätsprüfung in Bezug auf die statistische Zahlungsausfallwahrscheinlichkeit verwendet PayPal zum Zwecke der Entscheidung über die Bereitstellung der jeweiligen Zahlungsmethode.
Die Bonitätsauskunft kann Wahrscheinlichkeitswerte enthalten (sog. Score-Werte). Soweit Score-Werte in das Ergebnis der Bonitätsauskunft einfließen, haben diese ihre Grundlage in einem wissenschaftlich anerkannten mathematisch-statistischen Verfahren. In die Berechnung der Score-Werte fließen unter anderem, aber nicht ausschließlich, Anschriftendaten ein.
Welche weiteren Daten von PayPal erhoben werden, ergibt sich aus der jeweiligen Datenschutzerklärung von PayPal. Diese findet sich unter: https://www.paypal.com/de/webapps/mpp/ua/privacy-full
Sie können dieser Verarbeitung Ihrer Daten jederzeit durch eine Nachricht an PayPal widersprechen. PayPal bleibt jedoch ggf. weiterhin berechtigt, Ihre personenbezogenen Daten zu verarbeiten, wenn dies zur vertragsgemäßen Zahlungsabwicklung erforderlich ist.

5.8. Paypal Checkout

 Wir nutzen auf dieser Webseite den PayPal Checkout (PayPal (Europe) S.a.r.l. et Cie, S.C.A., 22-24 Boulevard Royal, L-2449 Luxemburg (nachfolgend "PayPal" genannt).

PayPal Checkout ist eine Online-Zahlungslösung von PayPal, die sowohl die PayPal-Zahlungsarten aus auch lokale Zahlmethoden von Drittanbietern bedient.

Wenn Sie (falls jeweils angeboten) die Zahlungsarten PayPal, Kreditkarte via PayPal, Lastschrift via PayPal oder "Später Bezahlen" via PayPal auswählen, geben wir Ihre notwendigen Zahlungsdaten zum Zwecke der Zahlungsabwicklung an PayPal weiter. Dabei ist die Weitergabe gemäß Art. 6 Abs. 1 lit. b DSGVO zulässig.

Bei den Zahlungsarten Kreditkarte via PayPal, Lastschrift via PayPal oder "Später bezahlen" via PayPal behält PayPal sich jeweils die Durchführung einer Bonitätsauskunft vor. Zu diesem Zweck gibt PayPal Ihre notwendigen Zahlungsdaten gegebenenfalls an Auskunfteien weiter. Die Verarbeitung geschieht auf Rechtsgrundlage des Art. 6 Abs. 1 lit. f DSGVO. PayPal hat ein berechtigtes Interesse an der Feststellung Ihrer Zahlungsfähigkeit. Sie können dieser Verarbeitung Ihrer Daten jederzeit durch eine Nachricht an PayPal widersprechen, wobei eine weitere Verarbeitung Ihrer personenbezogenen Daten durch PayPal weiterhin berechtigt sein kann, sofern diese notwendig ist für die vertragsgemäße Zahlungsabwicklung.
'
Wenn Sie die Zahlungsart PayPal-Rechnungskauf auswählen, übermitteln wir Ihre Zahlungsdaten gemäß Art. 6 Abs. 1 lit. b DSGVO zur zunächst an PayPal. PayPal leitet Ihre Daten dann zur Durchführung der Zahlung an die Ratepay GmbH, Ritterstr. 12-14, 10969 Berlin weiter. RatePay führt sodann im eigenen Namen eine Identitäts- und Bonitätsprüfung durch. Rechtsgrundlage dafür ist Art. 6 Abs. 1 lit. f DSGVO, das berechtigte Interesse an der Feststellung der Zahlungsfähigkeit.  Dafür gibt RatePay Ihre Zahlungsdaten gemäß Art. 6 Abs. 1 lit. f DSGVO an Auskunfteien weiter.

Ratepay kann auf folgende Auskunfteien zugreifen : https://www.ratepay.com/legal-payment-creditagencies/
  Wenn Sie die Zahlungsart eines lokalen Drittanbieters wählen, geben wir Ihre Zahlungsdaten zunächst gemäß Art. 6 Abs. 1 lit. b DSGVO an PayPal weiter. PayPal Ihre Zahlungsdaten dann zur Durchführung der Zahlung (6 Abs. 1 lit. b DSGVO) an den von Ihnen ausgewählten Anbieter weiter:

- iDeal (Currence Holding BV, Beethovenstraat 300 Amsterdam, Niederlande)
- giropay (Paydirekt GmbH, Stephanstr. 14-16, 60313 Frankfurt am Main
- Sofort (SOFORT GmbH, Theresienhöhe 12, 80339 München, Deutschland)
- bancontact (Bancontact Payconiq Company, Rue d'Arlon 82, 1040 Brüssel, Belgien)
- eps (PSA Payment Services Austria GmbH, Handelskai 92, Gate 2,1200 Wien, Österreich)
- blik (Polski Standard Płatności sp. z o.o., ul. Czerniakowska 87A, 00-718 Warschau,Polen)
- Przelewy24 (PayPro SA, Kanclerska 15A, 60-326 Poznań, Polen)
- MyBank (PRETA S.A.S, 40 Rue de Courcelles, F-75008 Paris, Frankreich)

 Weitere Informationen finden Sie in der Datenschutzerklärung von PayPal:
https://www.paypal.com/de/webapps/mpp/ua/privacy-full

- Stripe
Bei Auswahl einer Zahlungsart des Zahlungsdienstleisters Stripe  erfolgt die Zahlungsabwicklung über die Stripe Payments Europe Ltd, Block 4, Harcourt Centre, Harcourt Road, Dublin 2, Irland (nachfolgend "stripe" genannt).
Wir geben Ihre personenbezogenen Daten nebst den Informationen über Ihre Bestellung (Name, Anschrift, Kontonummer, Bankleitzahl, evtl. Kreditkartennummer, Rechnungsbetrag, Währung und Transaktionsnummer) gemäß Art. 6 Abs. 1 lit. b DSGVO ausschließlich zum Zwecke der Zahlungsabwicklung und nur im Rahmen des Erforderlichen an stripe weiter.

- Shopify Payments
Wir verwenden den Zahlungsdienstleister "Shopify Payments", 3rd Floor, Europa House, Harcourt Building, Harcourt Street, Dublin 2. Wenn Sie sich für eine über den Zahlungsdienstleister Shopify Payments angebotene Zahlungsart entscheiden, erfolgt die Zahlungsabwicklung über den technischen Dienstleister Stripe Payments Europe Ltd., 1 Grand Canal Street Lower, Grand Canal Dock, Dublin, Irland, an die wir Ihre im Rahmen des Bestellvorgangs mitgeteilten Informationen nebst den Informationen über Ihre Bestellung (Name, Anschrift, Kontonummer, Bankleitzahl, evtl. Kreditkartennummer, Rechnungsbetrag, Währung und Transaktionsnummer) gemäß Art. 6 Abs. 1 lit. b DSGVO weitergeben. Die Weitergabe Ihrer Daten erfolgt ausschließlich zum Zwecke der Zahlungsabwicklung mit der Stripe Payments Europe Ltd. und nur insoweit, als sie hierfür erforderlich ist. Nähere Informationen zum Datenschutz von Shopify Payments finden Sie unter der nachstehenden Internetadresse: https://www.shopify.com/legal/privacy
Datenschutzrechtliche Informationen zur Stripe Payments Europe Ltd. finden Sie hier: https://stripe.com/de/privacy

6. Datenverarbeitung bei Eröffnung eines Kundenkontos und zur Vertragsabwicklung

Wenn Sie bei uns ein Kundenkonto eröffnen, werden hierbei gemäß Art. 6 Abs. 1 lit. b DGSVO personenbezogene Daten erhoben und verarbeitet. Der Umfang der Daten ist aus dem Eingabeformular ersichtlich. Die von Ihnen eingegebenen Daten werden von uns zur Vertragsabwicklung gespeichert und verwendet. 
Sie können Ihr Kundenkonto jederzeit löschen. Dies kann durch eine Nachricht an die Adresse des Verantwortlichen oder, wenn angeboten, direkt im Kundenkonto erfolgen. In dem Fall werden wir auch Ihre Daten mit Rücksicht auf steuer- und handelsrechtliche Aufbewahrungsfristen sperren und nach Ablauf dieser Fristen löschen. Dem kann nur Ihre Einwilligung zur dauerhaften Speicherung oder eine gesetzlich erlaubte weitere Datenverwendung von unserer Seite entgegenstehen.

7. Kommentarfunktion

Wenn Sie die Kommentarfunktion unserer Webseite nutzen, werden neben Ihrem Kommentarinhalt auch Angaben zum Zeitpunkt der Erstellung des Kommentars sowie der von Ihnen gewählte Kommentatorenname gespeichert und auf der Website veröffentlicht. Außerdem wird Ihre IP-Adresse protokolliert und gespeichert. 
Rechtsgrundlagen für die Speicherung Ihrer Daten sind die Art. 6 Abs. 1 lit.b und f DSGVO. Die Speicherung der IP-Adresse erfolgt aus Sicherheitsgründen und für den Fall, dass die betroffene Person durch einen abgegebenen Kommentar die Rechte Dritter verletzt oder rechtswidrige Inhalte veröffentlicht. Ihre E-Mailadresse wird benötigt, um mit Ihnen in Kontakt zu treten, falls ein Dritter Ihren veröffentlichten Inhalt als rechtswidrig beanstanden sollte. Wir behalten uns vor, Kommentare zu löschen, wenn sie von Dritten als rechtswidrig beanstandet werden.

8. Nutzung Ihrer Daten zur Direktwerbung

8.1. Newsletter

Auf unserer Internetseite besteht die Möglichkeit einen kostenfreien Newsletter zu abonnieren. Dabei werden bei der Anmeldung zum Newsletter die Daten aus der Eingabemaske an uns übermittelt. Pflichtangabe ist lediglich Ihre Emailadresse. Falls Sie weitere freiwillige Eingaben tätigen, werden diese nur für die persönliche Ansprache verwendet.

Rechtsgrundlage für die Verarbeitung Ihrer Daten nach Anmeldung zum Newsletter ist bei Vorliegen einer Einwilligung des Nutzers Art. 6 Abs. 1 lit. a DSGVO. Diese holen wir ein, indem Sie nach der Anmeldung zum Newsletter eine Bestätigungs-Email erhalten, in der sich ein Bestätigungslink befindet. Wenn Sie diesen Link anklicken, erteilen Sie zugleich die Einwilligung in den Newsletter-Erhalt.
Bei der Absendung der Anmeldung zum Newsletter speichern wir Ihre IP-Adresse sowie das Datum und die Uhrzeit der Anmeldung. Diese Speicherung dient dazu, einen möglichen Missbrauch Ihrer E-Mail- Adresse nachvollziehen zu können. 

Wir nutzen die von uns bei der Anmeldung zum Newsletter erhobenen Daten ausschließlich zum Zwecke des Newsletter-Versands. 

Das Abonnement des Newsletters kann durch Sie jederzeit gekündigt werden. Zu diesem Zweck findet sich in jedem Newsletter ein entsprechender Link. Hierdurch wird ebenfalls ein Widerruf der Einwilligung der Speicherung der während des Anmeldevorgangs erhobenen personenbezogenen Daten ermöglicht. 

8.2. Werbung per Briefpost

Wenn Sie aufgrund einer Bestellung bei uns Ihre Ihren Vor- und Nachnamen, Ihre Postanschrift und ggf. weitere personenbezogene Daten hinterlassen haben, behalten wir uns vor zur Wahrung unseres berechtigten Interesses an personalisierter Direktwerbung gemäß Art. 6 Abs. 1 lit. f DSGVO diese Daten zu speichern und Ihnen unsere Angebote per Briefpost zuzusenden.

Sie können der Speicherung und Nutzung Ihrer Daten zu diesem Zweck jederzeit durch eine entsprechende Nachricht an den Verantwortlichen widersprechen.

9.  Kontaktaufnahme zur Bewertungserinnerung

Bewertungserinnerung durch Trustpilot

Aufgrund Ihrer ausdrücklichen Einwilligung gemäß Art. 6 Abs. 1 lit. a DSGVO übermitteln wir Ihre E-Mailadresse an die Bewertungsplattform Trustpilot (Trustpilot A/S, Pilestræde 58, 1112 Kopenhagen K, Dänemark (www.trustpilot.com)). Sie erhalten von Trustpilot  eine Bewertungserinnerung per E-Mail. Sie können Ihre Einwilligung jederzeit durch eine Nachricht an den für die Verarbeitung Ihrer Daten Verantwortlichen oder an Trustpilot  widerrufen.

10. Verwendung von Sozialen Medien: Social Plugins

10.1. Facebook-Plugins mit Shariff-Lösung

Auf unserer Website verwenden wir Social Plugins ("Plugins") des sozialen Netzwerkes Facebook  (Meta Platforms Ireland Limited, 4 Grand Canal Square, Dublin 2, Irland) (nachfolgend "Facebook" genannt).

Um den Schutz Ihrer Daten beim Besuch unserer Website zu erhöhen, sind die Schaltflächen der Plugins mit der sog- Shariff-Lösung nur unter Verwendung eines HTML-Links in die Seite eingebunden. Dadurch wird gewährleistet, dass beim Aufruf unserer Website mit einer Facebook-Schaltfläche erst eine Verbindung mit den Servern von Facebook hergestellt, wenn Sie die Schaltfläche anklicken und mit dem sich dann in einem neuem Browserfenster öffnenden Plugin interagieren. Eventuell müssen Sie sich auch gesondert einloggen. Eine Übertragung Ihrer Daten an einen Server von Facebook in den USA ist dabei nicht ausgeschlossen.

Meta Platforms, Inc. mit Sitz in USA ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet. 
Weitere Informationen sind den Datenschutzhinweisen von Facebook zu entnehmen: http://www.facebook.com/policy.phphttps://www.facebook.com/legal/EU_data_transfer_addendum

10.2. Google+ -Plugins als Shariff-Lösung

Auf unserer Website werden sogenannte Social Plugins ("Plugins") des sozialen Netzwerkes Google+ verwendet, das von der Google Ireland Limited, Gordon House, 4 Barrow St, Dublin, D04 E5W5, Irland ("Google") betrieben wird.

Um den Schutz Ihrer Daten beim Besuch unserer Website zu erhöhen, sind die Schaltflächen der Plugins mit der sog- Shariff-Lösung nur unter Verwendung eines HTML-Links in die Seite eingebunden. Dadurch wird gewährleistet, dass beim Aufruf unserer Website mit einer Google+-Schaltfläche erst eine Verbindung mit den Servern von Google+ hergestellt, wenn Sie die Schaltfläche anklicken und mit dem sich dann in einem neuem Browserfenster öffnenden Plugin interagieren. Eventuell müssen Sie sich auch gesondert einloggen. Bei der Interaktion mit Google+ kann es zu einer Datenübertragung auf Server von Google in USA.
Google LLC mit Sitz in USA ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet. Datenschutzhinweise von Google+: http://www.google.com/intl/de/+/policy/+1button.html
Wenn Sie nicht möchten, dass Google die über unseren Webauftritt gesammelten Daten unmittelbar Ihrem Profil zuordnet, müssen Sie sich vor dem Aktivieren des Plugins bei Google+ ausloggen.

10.3. Pinterest-Plugin als Shariff-Lösung

Wir verwenden auf unserer Webseite Social Plugins ("Plugins") des Online-Dienstes Pinterest (Pinterest Inc., 808 Brannan Street, San Francisco, CA, 94103, USA) (nachfolgend "Pinterest" genannt).

Um den Schutz Ihrer Daten beim Besuch unserer Website zu erhöhen, sind die Schaltflächen der Plugins mit der sog. Shariff-Lösung nur unter Verwendung eines HTML-Links in die Seite eingebunden. Dadurch wird gewährleistet, dass beim Aufruf unserer Website mit einer Pinterest-Schaltfläche erst eine Verbindung mit den Servern von Pinterest hergestellt, wenn Sie die Schaltfläche anklicken und mit dem sich dann in einem neuem Browserfenster öffnenden Plugin interagieren. Eventuell müssen Sie sich auch gesondert einloggen.

Die Datenübertragung in die USA wird auf die Standardvertragsklauseln der EU-Kommission gestützt.Details finden Sie hier:https://policy.pinterest.com/de/privacy-policy#section-residents-of-the-eeaDatenschutzhinweise von Pinterest:https://about.pinterest.com/de/privacy-policy

10.4. X (Ehemals Twitter)-Plugin als Shariff-Lösung

Wir verwenden auf unserer Webseite Social Plugins ("Plugins") des Online-Dienstes X (X Corp.., 1355 Market St, Suite 900, San Francisco, CA 94103, US) (nachfolgend "X " genannt).

Um den Schutz Ihrer Daten beim Besuch unserer Website zu erhöhen, sind die Schaltflächen der Plugins mit der sog. Shariff-Lösung nur unter Verwendung eines HTML-Links in die Seite eingebunden. Dadurch wird gewährleistet, dass beim Aufruf unserer Website mit einer X-Schaltfläche erst eine Verbindung mit den Servern von X hergestellt, wenn Sie die Schaltfläche anklicken und mit dem sich dann in einem neuem Browserfenster öffnenden Plugin interagieren. Eventuell müssen Sie sich auch gesondert einloggen.

Die Datenübertragung in die USA wird auf die Standardvertragsklauseln der EU-Kommission gestützt. Details finden Sie hier:https://twitter.com/de/privacy

Datenschutzhinweise von Twitter: https://twitter.com/privacy

11. Verwendung von Sozialen Medien: Video

Verwendung von Youtube-Videos

Auf dieser Website nutzen wir die Youtube-Einbettungsfunktion zur Anzeige und Wiedergabe von Videos des Anbieters "Youtube", der zu Google Ireland Limited, Gordon House, 4 Barrow St, Dublin, D04 E5W5, Irland ("Google")gehört. Hierbei verwenden wir den erweiterten Datenschutzmodus, der laut Anbieterangaben eine Speicherung von Nutzerinformationen erst bei Wiedergabe des/der Videos in Gang setzt. Wenn Sie die Wiedergabe eingebetteter Youtube-Videos starten, setzt der Anbieter "Youtube" Cookies ein, um Informationen über Ihr Nutzerverhalten zu sammeln. "Youtube" zufolge dienen diese unter anderem dazu, Videostatistiken zu erfassen, die Nutzerfreundlichkeit zu verbessern und missbräuchliche Handlungsweisen zu unterbinden. Wenn Sie dabei bei Google eingeloggt sind, werden Ihre Daten direkt Ihrem Konto zugeordnet.

Wenn Sie die Zuordnung mit Ihrem Profil bei YouTube nicht wünschen, müssen Sie sich vor Aktivierung des Buttons ausloggen. Google speichert Ihre Daten (selbst für nicht eingeloggte Nutzer) als Nutzungsprofile und wertet diese aus.

Eine solche Auswertung erfolgt insbesondere gemäß Art. 6 Abs. 1 lit.a DSGVO auf Basis Ihrer ausdrücklichen Einwilligung.

Ihnen steht ein Widerspruchsrecht zu gegen die Bildung dieser Nutzerprofile, wobei Sie sich zur Ausübung dessen an YouTube wenden müssen. Unabhängig von einer Wiedergabe der eingebetteten Videos wird bei jedem Aufruf dieser Website eine Verbindung zum Google-Netzwerk "DoubleClick" aufgenommen, was ohne unseren Einfluss weitere Datenverarbeitungsvorgänge auslösen kann.

Es kann auch zu einer Übermittlung von Daten an die Server der Google LLC. in den USA kommen. Weitere Informationen zum Datenschutz bei "YouTube" finden Sie in der Datenschutzerklärung des Anbieters unter: https://policies.google.com/privacy?hl=de Einstellungen zu personalisierter Werbung sind möglich unter: https://adssettings.google.com/authenticated.

Google LLC mit Sitz in USA ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet. Details finden Sie hier: https://privacy.google.com/businesses/gdprcontrollerterms/ 


12. Online-Marketing

Einsatz von Google Ads Conversion-Tracking

Diese Website nutzt das Online-Werbeprogramm "Google Ads" und im Rahmen von Google Ads das Conversion-Tracking der Google Ireland Limited, Gordon House, 4 Barrow St, Dublin, D04 E5W5, Irland ("Google").

Hierbei wird mit Hilfe von Werbemitteln (sogenannten Google Adwords) auf externen Webseiten für unsere Angebote geworben. Unser berechtigtes Interesse liegt in der Anzeige von Werbung, die für Sie interessant ist und in der Erreichung einer fairen Berechnung von Werbe-Kosten. Rechtsgrundlage ist Art. 6 Abs. 1 lit.a DSGVO, nämlich Ihre ausdrückliche Einwilligung.

Google Ads nutzt Cookies für Conversion-Tracking, die gesetzt werden, wenn Sie eine von Google geschaltete AdWords-Anzeige anklicken.

Diese Cookies verlieren in der Regel nach 30 Tagen ihre Gültigkeit und dienen nicht der persönlichen Identifizierung. Jeder Google Ads-Kunde erhält ein anderes Cookie, daher können Cookies auch nicht über die Websites von Ads-Kunden nachverfolgt werden.

Die so erhaltenen Informationen dienen dazu, Conversion-Statistiken für Ads-Kunden über die Gesamtanzahl der Nutzer, die auf ihre Anzeige geklickt haben und zu einer mit einem Conversion-Tracking-Tag versehenen Seite weitergeleitet wurden, zu erstellen.

Sie können damit nicht persönlich identifiziert werden. 

Wenn Sie das Tracking verhindern möchten, können Sie das Cookie des Google Conversion-Trackings über ihren Internet-Browser unter Nutzereinstellungen deaktivieren.

Google LLC mit Sitz in USA ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet.Unter der nachstehenden Internetadresse erhalten Sie weitere Informationen über die Datenschutzbestimmungen von  Google:http://www.google.de/policies/privacy/Sie können die Conversion-Cookies dauerhaft durch eine entsprechende Einstellung Ihres Browsers deaktivieren oder das unter folgendem Link verfügbare Browser-Plug-in herunterladen und installieren:http://www.google.com/settings/ads/plugin?hl=de
In dem Fall können bestimmte Funktionen dieser Website möglicherweise nicht oder nur eingeschränkt genutzt werden.

13. Webanalysedienste

13.1. Google Analytics 4 

Wir nutzen auf unserer Website Google Analytics 4, einen Webanalysedienst der Google Ireland Limited (Gordon House, 4 Barrow St, Dublin, D04 E5W5, Irland) (nachfolgend "GA4" genannt). 

Google Analytics verwendet "Cookies". Das sind kleine Textdateien, die auf Ihrem Endgerät gespeichert werden und die eine Analyse der Benutzung der Website durch Sie ermöglichen. Die so erzeugten Informationen über Ihre Benutzung dieser Website (einschließlich der gekürzten IP-Adresse) werden an einen Server von Google übertragen und dort gespeichert und weiterverarbeitet, wobei eine Übertragung in die USA möglich ist. Die IP Adressen werden standardmäßig anonymisiert. Bei IPv4-Adressen wird das letzte Oktett und bei IPv6-Adressen die letzten 80 Bits im Speicher auf null gesetzt und somit "anonymisiert". Ein Personenbezug ist ausgeschlossen. Eine Übertragung an Server von Google LLC mit Sitz in den USA ist nicht ausgeschlossen.  

Während Ihres Website-Besuchs erfasst GA4 Ihr Nutzerverhalten in Form von "Ereignissen", wie etwa: Seitenaufrufe, Erstmaliger Besuch der Website, Start der Sitzung, Ihr "Klickpfad", Interaktion mit der Website, Scrolls, Klicks auf externe Links, interne Suchanfragen, Interaktion mit Videos, Dateidownloads, gesehene / angeklickte Anzeigen, Spracheinstellung. Außerdem erfasst GA4 Ihren ungefähren Standort (Region), Ihre IP-Adresse (in anonymisierter Form), technische Informationen zu Ihrem Browser und den von Ihnen genutzten Endgeräten (z.B. Spracheinstellung, Bildschirmauflösung), Ihren Internetanbieter, die Referrer-URL (über welche Website/ über welches Werbemittel Sie auf diese Website gekommen sind).  

In unserem Auftrag nutzt Google diese Informationen, um Ihre Webseitennutzung auszuwerten, Reports über die Websiteaktivitäten zu erstellen und weitere mit der Websitenutzung und der Internetnutzung verbundene Dienstleistungen uns gegenüber zu erbringen. Es findet keine Zusammenführung Ihrer in diesem Rahmen erhobenen IP anonymisierten Adresse mit anderen Daten von Google statt. 

Die in diesem Rahmen erhobenen Daten werden für vierzehn Monate gespeichert. 

Die Rechtsgrundlage für die hier beschriebene Datenverarbeitung sowie das Setzen von Cookies ist Ihre
ausdrückliche Einwilligung gem. Art. 6 Abs. 1 lit. a DSGVO. Diese Einwilligung kann jederzeit mit Wirkung für die Zukunft widerrufen werden, etwa durch Deaktivierung dieses Google Dienstes über das Cookie-Consent-Tool, in dem Sie bereits Ihre Einwilligung erteilt haben. 

Ohne Ihre Einwilligung unterbleibt der Einsatz von Google Analytics 4 während Ihres Seitenbesuchs. Sie können Ihre erteilte Einwilligung mit Wirkung für die Zukunft jederzeit widerrufen. Um Ihr Widerrufsrecht auszuüben, deaktivieren Sie bitte diesen Dienst über das auf der Website bereitgestellte "Cookie-Consent-Tool". 

Google LLC mit Sitz in USA ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet.
Ebenso haben wir mit Google einen Auftragsverarbeitungsvertrag geschlossen. 
Weitere Informationen zum Datenschutz durch Google Analytics 4 sind auf den folgenden Webseiten zu finden:  
https://policies.google.com/technologies/partner-sites
und 
https://policies.google.com/privacy?hl=de&gl=de

Demografische Merkmale 
Die Funktion "demografische Merkmale" von GA4 kann Statistiken  darüber erstellen, mit denen Aussagen Alter, Geschlecht und Interessen von Seitenbesuchern getroffen werden können. Hierfür werden Werbung und Informationen von Drittanbietern analysiert und Zielgruppen für bestimmte Marketingaktivitäten identifiziert werden. Hierbei erfolgt jedoch keine persönliche Zuordnung von Daten. Die Daten werden nach vierzehn Monaten gelöscht. 

UserIDs 

Sofern wir die erweiternde Funktion  "UserIDs" nutzen, können Ihre Aktivitäten (auch Conversions) geräteübergreifend analysiert werden. In diesem Fall erfolgt die Analyse nicht pseudonym. 
Dies ist möglich, sofern Sie Ihre Einwilligung zur Nutzung von Google Analytics 4 gem. Art. 6 Abs. 1 lit. a DSGVO erteilt, Sie ein Konto auf dieser Website eingerichtet haben und sich auf verschiedenen Geräten mit diesem Konto anmelden.  

Google Signale 

Sofern wir die Erweiterung "Google Signale" verwenden, können wir geräteübergreifende Berichte  über Ihr Nutzungsverhalten anfertigen lassen. Wir bekommen allerdings nur Statistiken und keine personenbezogenen Daten.  Diese Analyse ist nur möglich, wenn Sie in Ihrem Google-Konto personalisierte Anzeigen aktiviert und Ihre Endgeräte mit einem Google-Konto verknüpft haben. Ebenso muss Ihre Einwilligung  zur Nutzung von Google Analytics gem. Art. 6 Abs. 1 lit. a DSGVO vorliegen.   Die geräteübergreifende Analyse kann durch Deaktivierung der Funktion "personalisierte Werbung" in Ihrem Google-Konto unterbunden werden. Weitere Informationen zu Google Signale sind hier zu finden: https://support.google.com/analytics/answer/7532985?hl=de

13.2. Hotiar (hotjar Ltd.)

Wir verwenden auf dieser Website den Webanalysedienst Hotjar der Hotjar Ltd (Hotjar Ltd, Level 2, St Julians Business Centre, 3, Elia Zammit Street, St Julians STJ 1000, Malta, Europe Tel.: +1 (855) 464-6788).
Anhand dieses Tools lassen sich Bewegungen auf unseren Webseiten nachvollziehen (sog. Heatmaps). Es ist z.B. erkennbar, wie weit Sie scrollen und welche Schaltflächen Sie wie oft anklicken. So erlangen wir notwendige Informationen, um unsere Websites schneller und kundenfreundlicher gestalten zu können. Unser berechtigtes Interesse liegt in der interessengerechten Ausgestaltung unserer Website und in Marketingzwecken. Rechtsgrundlage ist Art. 6 Abs. 1 lit. f DSGVO. Bereiche der Website, in denen personenbezogene Daten von Ihnen oder Dritten angezeigt werden, werden von Hotjar automatisch ausgeblendet und nicht analysiert. Sie können anhand eines "Do Not Track-Headers” den Einsatz des Tools Hotjar unterbinden. Es handelt sich hierbei um eine Einstellung die alle üblichen Browser in aktuellen Versionen unterstützen. Sollten Sie unsere Website mit unterschiedlichen Browsern nutzen, müssen Sie den "Do Not Track-Header” für jeden dieser Browser/Rechner separat einrichten. Eine detaillierte Anleitungen mit Informationen zu Ihrem Browser finden Sie hier: https://www.hotjar.com/opt-outWeitere Informationen über Hotjar Ltd. und über das Tool Hotjar finden Sie hier: https://www.hotjar.com
Die Datenübertragung wird auf die Standardvertragsklauseln der EU-Kommission gestützt. Details finden Sie hier:https://help.hotjar.com/hc/de/articles/4424713971607-EU-Standardvertragsklauseln-SCCs-Rahmen
Die Datenschutzerklärung der Hotjar Ltd. finden Sie hier:https://www.hotjar.com/privacy

14. Retargeting / Remarketing / Empfehlungswerbung

14.1. Meta Custom Audience über das Pixel-Verfahren

Auf dieser Website verwenden wir den "Meta-Pixel” der Meta Platforms Ireland Limited, 4 Grand Canal Square, Dublin 2, Irland ("Meta”).Liegt eine ausdrücklichen Einwilligung vor, kann hierdurch das Verhalten von Nutzern nachverfolgt werden, nachdem diese eine Facebook-Werbeanzeige gesehen oder angeklickt haben. Dieses Verfahren dient dazu, die Wirksamkeit der Facebook-Werbeanzeigen für statistische und Marktforschungszwecke auszuwerten und kann dazu beitragen, zukünftige Werbemaßnahmen zu optimieren. Die erhobenen Daten sind für uns anonym, wir können also keine Rückschlüsse auf die Identität der Nutzer ziehen. Daten werden jedoch von Facebook gespeichert und verarbeitet, sodass eine Verbindung zum jeweiligen Nutzerprofil möglich ist und Facebook die Daten für eigene Werbezwecke, entsprechend der Facebook- Datenverwendungsrichtlinie (https://www.facebook.com/about/privacy/) verwenden kann.

 Sie können Meta und dessen Partnern das Schalten von Werbeanzeigen auf und außerhalb von Facebook ermöglichen. Zu diesen Zwecken kann ein Cookie auf Ihrem Endgerät gespeichert werden. Diese Verarbeitungsvorgänge erfolgen ausschließlich bei Erteilung der ausdrücklichen Einwilligung gemäß Art. 6 Abs. 1 lit. a DSGVO. Eine Einwilligung in den Einsatz des Meta-Pixels darf nur von Nutzern, die älter als 13 Jahre alt sind, erklärt werden. Falls Sie jünger sind, bitten wir Sie, Ihre Erziehungsberechtigten um Erlaubnis zu fragen. Sie können die Verwendung von Cookies auf Ihrem Computer durch entsprechende Browsereinstellung deaktivieren. Dies kann aber dazu führen, dass einige Funktionen auf unseren Internetseiten nicht mehr vollständig genutzt werden können. Sie können der Verwendung von Cookies durch Drittanbieter wie z.B. Meta auch auf folgender Website der Digital Advertising Alliance deaktivieren: http://www.aboutads.info/choices/

Meta Platforms Inc.  ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet.
 Details finden Sie hier:https://www.facebook.com/legal/EU_data_transfer_addendum.

14.2. Google AdWords Remarketing

Unsere Website nutzt die Funktionen von Google Ads (früher "Google AdWords) Remarketing, hiermit werben wir für diese Website in den Google-Suchergebnissen, sowie auf Dritt-Websites. Anbieter ist die Google Ireland Limited, Gordon House, 4 Barrow St, Dublin, D04 E5W5, Irland (nachfolgend "Google" genannt). Zu diesem Zweck setzt Google ein Cookie im Browser Ihres Endgeräts, welches automatisch mittels einer pseudonymen Cookie-ID und auf Grundlage der von Ihnen besuchten Seiten eine interessensbasierte Werbung ermöglicht und in der Regel nach 30 Tagen die Gültigkeit verliert. Die Verarbeitung erfolgt auf Basis unseres berechtigten Interesses an der optimalen Vermarktung unserer Website und der Ausschöpfung des finanziellen Potentials unserer Webseite. Rechtsgrundlage ist Art. 6 Abs. 1 lit. a DSGVO nämlich Ihre ausdrückliche Einwilligung.

Eine darüberhinausgehende Datenverarbeitung findet nur statt, sofern Sie gegenüber Google zugestimmt haben, dass Ihr Internet-- und App-Browserverlauf von Google mit ihrem Google-Konto verknüpft wird und Informationen aus ihrem Google-Konto zum Personalisieren von Anzeigen verwendet werden, die sie im Web betrachten. Sind sie in diesem Fall während des Seitenbesuchs unserer Webseite bei Google eingeloggt, verwendet Google Ihre Daten zusammen mit Google Analytics-Daten, um Zielgruppenlisten für geräteübergreifendes Remarketing zu erstellen und zu definieren. Dazu werden Ihre personenbezogenen Daten von Google vorübergehend mit Google Analytics-Daten verknüpft, um Zielgruppen zu bilden.

Sie können die Setzung von Cookies für Anzeigenvorgaben dauerhaft deaktivieren, indem Sie das unter folgendem Link verfügbare Browser-Plug-in herunterladen und installieren: https://www.google.com/settings/ads/onweb/

Alternativ können Sie sich bei der Digital Advertising Alliance unter der Internetadresse www.aboutads.info über das Setzen von Cookies informieren und Einstellungen hierzu vornehmen. Schließlich können Sie Ihren Browser so einstellen, dass Sie über das Setzen von Cookies informiert werden und einzeln über deren Annahme entscheiden oder die Annahme von Cookies für bestimmte Fälle oder generell ausschließen. Bei der Nichtannahme von Cookies kann die Funktionalität unserer Website eingeschränkt sein.

Google LLC mit Sitz in USA ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet.Unter der nachstehenden Internetadresse erhalten Sie weitere Informationen über die Datenschutzbestimmungen von  Google:http://www.google.de/policies/privacy/

15. Tools und Sonstiges

15.1. Google reCAPTCHA

Wir verwenden die reCAPTCHA Funktion von Google Ireland Limited, Gordon House, 4 Barrow St, Dublin, D04 E5W5, Irland ("Google") gemäß Art. 6 Abs. 1 lit. f DSGVO aufgrund unseres berechtigten Interesses an der Vermeidung von Missbrauch und Spam.
reCAPTCHA ist eine Funktion, die sicher stellen soll, dass eine Eingabe von einer natürlichen Person gemacht wird.  
Der Dienst versendet Ihre IP-Adresse und ggf. weitere von Google für den Dienst reCAPTCHA benötigten Daten an Google.

Bei der Nutzung des Google reCAPTCHA kann es auch zu einer Übermittlung Ihrer personenbezogenen Daten an die Server der Google LLC. in den USA kommen.

Google LLC mit Sitz in USA ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet.Unter der nachstehenden Internetadresse erhalten Sie weitere Informationen über die Datenschutzbestimmungen von  Google:http://www.google.de/policies/privacy/

15.2. Google Tag Manager
Wir nutzen auf unserer Webseite den Google Tag Manager (Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Irland).
Mit Hilfe des Google Tag Managers können wir Tracking- oder Statistik-Tools und andere Technologien auf unserer Website über Tags einbinden. Tags sind keine Code-Abschnitte, die bestimmte Aktivitäten auf der Webseite aufzeichnen. Die Tags stammen meist von anderen Google-Programmen, können aber auch von anderen Unternehmen eingebunden werden. Die Tags können etwa Browserdaten sammeln, Buttons einbinden oder auch Cookies setzen.
Der Google Tag Manager selbst erstellt jedoch keine Nutzerprofile, speichert keine Cookies oder nimmt eigenständige Analysen vor, sondern dient nur der Verwaltung und Ausspielung der über ihn eingebundenen Tools.
Ihre IP-Adresse wird über den Google Tag Manager erfasst und kann auch an das Mutterunternehmen von Google in die Vereinigten Staaten übertragen werden kann.

Rechtsgrundlage für die Nutzung des Google Tag Managers ist Art. 6 Abs. 1 lit. a DSGVO, nämlich Ihre Einwilligung.
Google LLC mit Sitz in USA ist für das us-europäische Datenschutzübereinkommen "EU-U.S. Data Privacy Framework" zertifiziert, welches die Einhaltung des in der EU geltenden Datenschutzniveaus gewährleistet.Unter der nachstehenden Internetadresse erhalten Sie weitere Informationen über die Datenschutzbestimmungen von  Google:http://www.google.de/policies/privacy/
 

16.  Rechte des Betroffenen

16.1. Das geltende Datenschutzrecht gewährt Ihnen gegenüber dem Verantwortlichen hinsichtlich der Verarbeitung Ihrer personenbezogenen Daten umfassende Betroffenenrechte (Auskunfts- und Interventionsrechte), über die wir Sie nachstehend informieren:

- Auskunftsrecht gemäß Art. 15 DSGVO:
Sie können von dem Verantwortlichen eine Bestätigung darüber verlangen, ob personenbezogene Daten, die Sie betreffen, von dem Verantwortlichen verarbeitet werden.  Darüber hinaus haben Sie ein Recht auf Auskunft über Zweck, die Kategorien personenbezogener Daten, die Empfänger, die geplante Dauer der Speicherung und über das Bestehen von weiteren Rechten wie Berichtigung der Daten oder das Bestehen eines Beschwerderechts bei einer Aufsichtsbehörde, die Herkunft Ihrer Daten, wenn diese nicht durch uns erhoben wurden, das Bestehen einer automatisierten Entscheidungsfindung einschließlich Profiling und ggf. aussagekräftige Informationen über die involvierte Logik und die Sie betreffende Tragweite und die angestrebten Auswirkungen einer solchen Verarbeitung, sowie Ihr Recht auf Unterrichtung, welche Garantien gemäß Art. 46 DSGVO bei Weiterleitung Ihrer Daten in Drittländer bestehen;

- Recht auf Berichtigung gemäß Art. 16 DSGVO:
Sie haben ein Recht auf unverzügliche Berichtigung der Sie betreffenden unrichtigen Daten und/oder die Vervollständigung Ihrer bei uns gespeicherten unvollständigen Daten; die Berichtigung oder Vervollständigung hat unverzüglich zu erfolgen.

- Recht auf Einschränkung der Verarbeitung gemäß Art. 18 DSGVO:
Sie haben das Recht, die Einschränkung der Verarbeitung Ihrer personenbezogenen Daten zu verlangen, solange die von Ihnen bestrittene Richtigkeit Ihrer Daten überprüft wird, wenn Sie eine Löschung Ihrer Daten wegen unzulässiger Datenverarbeitung ablehnen und stattdessen die Einschränkung der Verarbeitung Ihrer Daten verlangen, wenn Sie Ihre Daten zur Geltendmachung, Ausübung oder Verteidigung von Rechtsansprüchen benötigen, nachdem wir diese Daten nach Zweckerreichung nicht mehr benötigen oder wenn Sie Widerspruch aus Gründen Ihrer besonderen Situation eingelegt haben, solange noch nicht feststeht, ob unsere berechtigten Gründe überwiegen;
Wurde die Verarbeitung der Sie betreffenden personenbezogenen Daten eingeschränkt, dürfen diese Daten – von ihrer Speicherung abgesehen – nur mit Ihrer Einwilligung oder zur Geltendmachung, Ausübung oder Verteidigung von Rechtsansprüchen oder zum Schutz der Rechte einer anderen natürlichen oder juristischen Person oder aus Gründen eines wichtigen öffentlichen Interesses der Union oder eines Mitgliedstaats verarbeitet werden. Wurde die Einschränkung der Verarbeitung eingeschränkt, werden Sie von dem Verantwortlichen unterrichtet bevor die Einschränkung aufgehoben wird.

- Recht auf Löschung gemäß Art. 17 DSGVO:
Sie haben das Recht, die unverzügliche Löschung Ihrer personenbezogenen Daten wenn die Voraussetzungen des Art. 17 Abs. 1 DSGVO erfüllt sind. Dieses Recht auf Löschung besteht allerdings insbesondere - nicht abschließend - dann nicht, wenn die Verarbeitung zur Ausübung des Rechts auf freie Meinungsäußerung und Information, zur Erfüllung einer rechtlichen Verpflichtung, aus Gründen des öffentlichen Interesses oder zur Geltendmachung, Ausübung oder Verteidigung von Rechtsansprüchen erforderlich ist

- Recht auf Unterrichtung gemäß Art. 19 DSGVO:
Sofern Sie Ihr Recht auf Berichtigung, Löschung oder Einschränkung der Verarbeitung ausgeübt haben, ist der Verantwortliche verpflichtet, allen Empfängern, denen Ihre personenbezogenen Daten offengelegt wurden, diese Berichtigung oder Löschung der Daten oder Einschränkung der Verarbeitung mitzuteilen, wenn dies nicht unmöglich oder mit einem unverhältnismäßigen Aufwand verbunden ist. Ihnen steht auch das Recht zu, über diese Empfänger informiert zu werden.

- Recht auf Datenübertragbarkeit gemäß Art. 20 DSGVO:
Sie haben das Recht, Ihre uns mitgeteilten personenbezogenen Daten in einem strukturierten, gängigen und maschinenlesebaren Format zu erhalten oder die Übermittlung an einen anderen Verantwortlichen zu verlangen, soweit dies technisch möglich ist;

- Recht auf Widerruf gemäß Art. 7 Abs. 3 DSGVO:
Sie haben das Recht, jederzeit gegen die Verarbeitung der Sie betreffenden personenbezogenen Daten, die aufgrund von Art. 6 Abs. 1 lit. e) oder f) DSGVO erfolgt, Widerspruch einzulegen; dies gilt auch für ein auf diese Bestimmungen gestütztes Profiling.
Sie haben ferner das Recht, Ihre datenschutzrechtliche Einwilligungserklärung jederzeit mit Wirkung für die Zukunft zu widerrufen. Durch den Widerruf der Einwilligung wird die Rechtmäßigkeit der aufgrund der Einwilligung bis zum Widerruf erfolgten Verarbeitung nicht berührt.

- Recht auf Beschwerde gemäß Art. 77 DSGVO:
Unbeschadet eines anderweitigen verwaltungsrechtlichen oder gerichtlichen Rechtsbehelfs haben Sie das Recht auf Beschwerde bei einer Aufsichtsbehörde, insbesondere in dem Mitgliedstaat ihres Aufenthaltsorts, ihres Arbeitsplatzes oder des Orts des mutmaßlichen Verstoßes, zu, wenn Sie der Ansicht sind, dass die Verarbeitung der Sie betreffenden personenbezogenen Daten gegen die DSGVO verstößt.

16.2. Widerspruchsrecht

Sie haben das Recht, der Verarbeitung Ihrer Daten jederzeit mit Wirkung für die Zukunft zu widersprechen, wenn wir aufgrund unseres überwiegenden berechtigten Interesses nach einer Interessenabwägung Ihre Daten verarbeiten.
Sofern Sie von diesem Widerspruchsrecht Gebrauch machen, werden wir die Verarbeitung Ihre Daten beenden, wenn nicht nachweisbar überwiegende zwingende schutzwürdige Gründe der Beendigung entgegenstehen oder wenn die weitere Verarbeitung der Ausübung oder Verteidigung von Rechtsansprüchen dient.

17. Dauer der Speicherung personenbezogener Daten

Die Dauer der Speicherung von personenbezogenen Daten hängt jeweils von gesetzlichen Aufbewahrungsfristen ab. Nach deren Ablauf löschen wir die Daten routinemäßig, wenn sie nicht mehr zur Vertragserfüllung oder -anbahnung erforderlich sind und/oder für uns kein berechtigtes Interesse an der Weiterspeicherung fortbesteht.




iva

Highway to Hill 2018 - BMX Festival



From the 12-13 of May 2018, the Highway to Hill BMX Festival will take place at the Mellowpark in Berlin again. Ride BMX and enjoy the good times!

Check the highlight video from last year!



All the best, your kunstform BMX Shop Team!

What:
Highway to Hill 2018 - BMX Festival

When:
12-13 May 2018

Where:
Mellowpark Berlin
An der Wuhlheide 250-256
12459 Berlin


More infos on Facebook.




iva

BMX Event: Stuttgart Kessel Festival 2019 - BMX Miniramp Session



The Kessel Festival is Stuttgart's Music, Sport and Culture Festival and takes place on 01.06 - 02.06.2019. International top stars of the music scene on the main stage, young musicians on the up-and-coming stage, sports and fun sports areas to join in and watch, sustainability to touch in the integrated day after tomorrow market and an interactive children and family program make the Kessel Festival something special for visitors of all ages.

Together with the STUTTPARK skate hall, there will be a mini ramp with skateboard session on 01.06.2019 and a BMX session on 02.06.2019 . If you want to participate actively as a rider in the BMX session, please register in advance via Email contact@kunstform.org . A contest with the groups AM and Profi is planned. You can expect lavish prizes, which are provided by kunstform.


Depending on how many riders are coming, the following schedule is fixed:

Groups:
amateurs
professional

Schedule:
10:00 - 12:00: Amateurs - Pratice & Qualification (Cut to 8 riders)
12:00 - 14:00: Professional Pratice & Qualification (Cut to 8 riders)
14:00 - 15:00: Open Session
15:00 - 16:00: Amateurs Finale (Battle-Format)
16:00 - 17:00: Profi Finale (Battle-Format)
18:00: Awards ceremony Amateure & Profi
18:00 - 20:00: Open Session

What: Kessel Festival 2019 - BMX Miniramp Session

When: 02.06.2019 from 10:00 o'clock

Where: On the grounds of the Cannstatter Wasen in Stuttgart

For more information about the event, visit www.kesselfestival.de .

Please register in advance via Email contact@kunstform.org!

We are happy that you're coming,
Your kunstform BMX Shop Team




iva

Video: Miniramp Highlights @ Kessel Festival Stuttgart 2019





At the beginning of June, the Kessel Festival, Stuttgart's music, sports and culture festival took place. As part of this event, a miniramp contest went down, under very hot temperatures. Whether our guys and the locals have survived the heat, you'll find out in the video.

Enjoy, your kunstform BMX Shop Team!


Video: Justin Rudd

Related links:




iva

Chinese Traditional Festival and Monkie Kid sets revealed at CIIE

LEGO has revealed three Chinese Traditional Festival (CTF) sets and two Monkie Kid models at the 2024 China International Import Expo, which is currently taking place in Shanghai.

The subject matter may not mean much to some of us here in the west, but the CTF sets once again look to be exceptional, although not as packed with minifigs as they usually are. They will probably be good value, too.

View photos after the break, and keep up to date with everything that's been officially revealed for next year in our 2025 set listing.

Continue reading »

© 2024 Brickset.com. Republication prohibited without prior permission.




iva

KP pushes for entering PIA privatisation bid

An representational image of a PIA airplane. — AFP/FileKP’s offer would exceed Rs10 billion bid from Blue World Consortium.Province highlights commitment to preserving PIA as a national asset.KP government pledges strong backing for PIA’s revival and national interests.



iva

Frost & Sullivan names TomTom Telematics as 'Fleet Telematics Company of the Year'

Frost & Sullivan names TomTom Telematics as 'Fleet Telematics Company of the Year'




iva

TomTom to Provide Geocoding for Hotel Search Platform trivago

TomTom to Provide Geocoding for Hotel Search Platform trivago




iva

Theater festival offers solace in Burkina Faso, a nation torn by violence

The last three years have been tough for Fanta Charlotte Dabone, a mother of three from the conflict-battered West African country of Burkina Faso.




iva

Carbon pollution from high-flying rich in private jets soars

Carbon pollution from private jets has soared in the past five years, with most of those small planes spewing more heat-trapping carbon dioxide in about two hours of flying than the average person does in about a year, a new study finds.




iva

Georgetown, Maryland renew rivalry with four-game series

Georgetown and Maryland will renew their men's basketball rivalry with a four-game series starting in the 2025-26 season, the schools announced Tuesday.




iva

Maryland, Virginia announce renewal of men's basketball rivalry

As one series with Virginia ends, another begins for Maryland. The Terrapins and Cavaliers have announced a renewal of their men's basketball rivalry, to begin next year.




iva

Lexington Market, part 1: Survival of the Fittest

Change is knocking on the door of Baltimore’s iconic Lexington Market. Ground has been broken on a new market building, and local vendors are wondering if they’ll have a place in the much-hyped new structure. In this episode, merchants, artisans, security officers, and custodians reflect on their lives and the uncertain future of the market they call home.




iva

Ivanna Richards racing against men, dreaming of reaching Formula 1

Ivanna Richards hopes to one day crack the Formula 1 boys club.




iva

Letter to the editor: Cultivate STEM knack early

America has just gone through a bloodless conflict between competing political forces.




iva

No time to mope: Commanders prepare for Thursday night matchup with division-rival Eagles

The Washington Commanders woke up in second place in the NFC East on Monday morning. Sunday's loss to the Pittsburgh Steelers, the Commanders' third of the season, allowed the rival Philadelphia Eagles to slip into the top spot in the division.




iva

Notre Dame marks arrival of Paris Olympics' iconic trackside bell as cathedral reopening nears

Paris's Notre Dame cathedral, whose historic bells were silenced following 2019's devastating fire, will soon echo again with fresh chimes.




iva

BESAFE/BIOMOT Conference: Motivations and arguments to act for biodiversity

The joint BESAFE/BIOMOT Conference "Motivations and arguments to act for biodiversity" took place on 10 & 11 June 2015 in Brussels, Les Ateliers des Tanneurs. The main objective of the conference was to present alternative ways to inspire innovative policy making to act for nature.

Based on four years of large-scale research by the two European projects, the conference aimed to define what could really work to motivate society to act for nature. The conference involved a wide audience in high-level keynotes, science-policy interface sessions, stakeholder meetings and panels. 

The joint event was also a platform for the BESAFE project Final Conference where the beta version of the BESAFE tool was presented and tested. The tool is planned as a user-friendly application where stakeholders can browse project results and background information to help them to help them to improve biodiversity argumentation.





iva

Aricle Alert: Combining internal and external motivations in multi-actor governance arrangements for biodiversity and ecosystem services

A new paper "Combining internal and external motivations in multi-actor governance arrangements for biodiversity and ecosystem services" published in the journal Environmental Science & Policy looks at ways to motivate actions for biodiversity conservation and ecosystem services provision. The paper is a result of the EU FP7 funded project BIOMOT.

Abstract: 

This paper analyses the possibility of building a mutually supportive dynamics between internally and externally motivated behaviour for biodiversity conservation and ecosystem services provision. To this purpose a face to face survey amongst 169 key actors of 34 highly successful and prominent biodiversity arrangements in seven EU countries was conducted. The main finding of the paper is the feasibility of combining inherently intrinsically motivated behaviours (providing enjoyment, pleasure from experimentation and learning, aesthetic satisfaction) and internalized extrinsic motivations (related to the identification with the collective goals of conservation policy) through a common set of governance features. Successful initiatives that combine internal and external motivations share the following features: inclusive decision making processes, a broad monitoring by "peers" beyond the core staff of the initiatives, and a context that is supportive for the building of autonomous actor competences. These findings are in line with the psycho-sociological theory of motivation, which shows the importance of a psycho-social context leading to a subjective perception of autonomy and a sense of competence of the actors.

Original Source: 

Tom Dedeurwaerdere, Jeroen Admiraal, Almut Beringer, Flavia Bonaiuto, Lavinia Cicero, Paula Fernandez-Wulff, Janneke Hagens, Juha Hiedanpää, Paul Knights, Erica Molinario, Paolo Melindi-Ghidi, Florin Popa, Urban Šilc, Nathalie Soethe, Tiina Soininen, Jose Luis Vivero, Combining internal and external motivations in multi-actor governance arrangements for biodiversity and ecosystem services, Environmental Science & Policy, Volume 58, April 2016, Pages 1-10, ISSN 1462-9011, http://dx.doi.org/10.1016/j.envsci.2015.12.003





iva

Classical Music Festivals Around The World

Post-pandemic, the opportunity to enjoy live music and music festivals at home, abroad or further afield is again possible. The plethora of options is almost ... Read more

The post Classical Music Festivals Around The World appeared first on CMUSE.







iva

The Worship Podcast (Episode 18): What Does Revival Worship Sound Like? - Dustin Smith & James Galbraith

On this episode of The Worship Podcast, Dustin and James talk about their experience in revival movements, as well as lessons learned and things to consider for your worship experience.  What's the new sound?  Where is the sound of worship headed?  You might be surprised at their answer.

-----------------

The Worship Podcast is powered by All About Worship in partnership with WeAreWorship.

Subscribe to the podcast:
theworshippodcast.com
linktr.ee/theworshippodcast 

You can also connect with The Worship Podcast on social media:
The Worship Podcast on Facebook
The Worship Podcast on Instagram
The Worship Podcast on Twitter

 





iva

Shaikin: Baseball's best rivalry is no longer Yankees-Red Sox. It's Dodgers vs. Padres

The Dodgers and Padres have created the best rivalry in MLB through a willingness to spend on big-name players and be contenders every season.




iva

Christian World News - Revival in the Rainforest - September 13, 2024

A profound spiritual transformation is unfolding in the Amazon rainforest.