# What does UX have to do with User Data, Privacy and Consent?
## Introduction
Joana Chicau is a graphic designer, coder, researcher — with a background in dance. She researches the intersection of the body with the constructed, designed, programmed environment, aiming at widening the ways in which digital sciences is presented and made accessible to the public.
The latter has been informing a practice and exploration of various forms and formats — interweaving web programming with choreography — from the making of online platforms to performances or workshops.
In parallel Chicau has been actively participating and organizing events involving multi-location collaborative coding, algorithmic improvisation, discussions on digital equity and activism.
She is currently pursuing a PhD and lecturing at Creative Computing Institute, University of the Arts London.
* [Link to portfolio website;](https://joanachicau.com/)
### EXERCISE 00: Warm-Up
* join this [etherpad link](https://pad.vvvvvvaria.org/Lecture-UX-User-Data-Privacy-Consent) and respond to the question at the top of the document.
## User Data

Image Source [Tactical Tech](https://tacticaltech.org/projects/data-you/)
### EXERCISE 01: Mapping Online Presence
* join this [etherpad link](https://pad.vvvvvvaria.org/Lecture-UX-User-Data-Privacy-Consent) and respond to the first exercise.
## Online Tracking 🐾 🔍
> Have you ever read a newspaper and noticed a stranger reading it over your shoulder? Reading the news online is like having Google, Facebook, or Twitter doing the same thing. Known as "third party trackers", these companies collect data about who you are, what you’re reading and what you’re interested in, usually without you ever knowing it.

> Data about our device and online behaviour enables companies to link our likes and interests directly to us and to create profiles about us, which are then subsequently sold to advertisers.
Source [Tactical Tech](https://tacticaltech.org/projects/data-you/)
## Deceptive Design
> 'Deceptive design patterns are tricks used by websites and apps to get you to do things you might not otherwise do, like buy things, sign up for services or switch your settings.

> (...) Deceptive design patterns show up as tricky color schemes, frustrating mazes, sneaky designs and confusing language. Websites use these techniques to influence your behavior into a direction that benefits them more than it benefits you.' [Source Mozilla Blog](https://blog.mozilla.org/en/internet-culture/mozilla-explains/deceptive-design-patterns/)
### EXERCISE 02: Examples of Deceptive Design
* join this [etherpad link](https://pad.vvvvvvaria.org/Lecture-UX-User-Data-Privacy-Consent) and respond to the second exercise.
## What can UX Designers Do? 🔐 👀
### Designing for Privacy and Security
> 1. Proactive not reactive; preventive not remedial
> 2. Privacy as the default setting
> 3. Privacy embedded into design
> 4. Full functionality – positive-sum, not zero-sum
> 5. End-to-end security – full lifecycle protection
> 6. Visibility and transparency – keep it open
> 7. Respect for user privacy – keep it user-centric
Source: Principles originally reffered to the Privacy by Design in Law, Policy and Practice paper by Ann Cavoukian.

[Image source Mozilla Privacy and Security](https://blog.mozilla.org/en/category/privacy-security/)
In 2018, Sage Cheng, Natalie Cadranel, An Xiao Mina, and Martin Shelton, created a list which provides ‘checks’ and tips for considering the digital security and privacy of the people and communities involved.
> The checklist is divided into three phases: *research and ideation*, *prototyping and building*, *release and feedback*.
Within the process the authors highlight the importance of using encryption and to carefully study the context including risks related to government surveillance, censorship, law enforcement, among others. They advice designers and developers to partner with human rights organisations. They also mention the importance of clear and accessible language, to consider the local digital literacy level, to always ask for consent and, when possible, use participatory research methods.
Link to [Digital Security and Privacy
Protection UX Checklist](https://www.humanrightscentered.design/s/Secure-UX-Checklist.pdf)
### Designing for a Consentful Tech

Image Source: Una Lee and Dann Toliver, [the Ripple Mapping Tool](https://togethernet.org/assets/accessibility/ConsentfulTechZineTextVersion.pdf)
> Obtaining informed consent is an essential goal for designers. But what is “informed consent” in the context of digital power imbalances and dark patterns designed to convince people to hand over their data unconsciously? Many platform designers and policymakers have begun to focus on transparency, ethics, and trust to work towards creating ethical digital consent systems to communicate their intent and obligation to users.
[Source: Limits to Digital Consent](https://simplysecure.org/blog/the-limits-to-digital-consent-understanding-the-risks-of-ethical-consent-and-data-collection-for-underrepresented-communities/)



[Source Growth Design: Threads (by Meta) on Privacy Policy](https://growth.design/case-studies/apple-privacy-policy)
## Feedback
**ヽ( ◕▿◕ )ノ Thank you for joining this lecture!**
* please leave feedback at the end of the [etherpad link](https://pad.vvvvvvaria.org/Lecture-UX-User-Data-Privacy-Consent).
## Further references:
* [Dark Patterns website](https://darkpatterns.uxp2.com/);
* [Deceptive Design website](https://www.deceptive.design/hall-of-shame);
* [Deconstructing Transparency](https://toolkit.ttclabs.net/toolkit/virtual-discovery-exercises/deconstructing-transparency/)
* [Tactical Tech Data and You](https://tacticaltech.org/projects/data-you/)
* [Tracking Data Traces](https://myshadow.org/tracking-data-traces)
* [Privacy Not Included](https://foundation.mozilla.org/en/privacynotincluded/)
* [Design Justice Network zine](http://designjusticenetwork.org/zine)
* [Human Rights Centered Design](https://www.humanrightscentered.design/about)

Case, A. (2015) Calm Technology: principles and patterns for non-intrusive design. First Edition. Beijing: O’Reilly.