home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,368 of 2,445   
   Mike Powell to All   
   (Digital) Consent is broken. How do we f   
   11 Feb 26 15:10:54   
   
   TZUTC: -0500   
   MSGID: 2126.consprcy@1:2320/105 2df2209c   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Consent is broken. How do we fix it?   
      
   Opinion By Max Anderson published 5 hours ago   
      
   The need to move towards contextual consent   
      
   Most people encounter "consent" through a banner that interrupts their   
   first click on a website. If they read it at all - and many don't -   
   they'll accept or close it and move on. The company behind the banner records   
   a yes or a no, stores it somewhere, and considers the job done. Consent given.   
      
   Clearly, this is a process built for compliance, not for people.   
      
   If you were optimizing for the end user, a cookie banner - like the kind that   
   litters the modern internet - would be the worst possible implementation.   
   Think of the last time you interacted with a cookie banner. That moment tells   
   you everything about why consent feels broken.   
      
   Consent has been reduced to a legal notice rather than a functional mechanism   
   for controlling data. It's treated as something to display, not something to   
   operationalize.   
      
   If consent is to have meaning - to users, regulators, or the companies   
   handling data - it needs to move beyond banners. It has to be embedded and   
   enforced across consumer journeys, data systems, and partners. That requires   
   rethinking how consent is defined, collected, and managed.   
      
   1. Consent is bigger than cookies   
      
   Most organizations still equate consent with cookies, largely because that's   
   where the conversation started. But privacy laws today are about how and why   
   data is used, not just how it's stored.   
      
   The key question is no longer "Can we set this cookie?" It's "Why are   
   we collecting this data, who will process it, and for what purpose?"   
      
   This distinction is important. When a person opts out of "selling or   
   sharing" data, simply stopping a tag isn't enough. Data already sent to an   
   ad platform may still be processed and monetized.   
      
   Unless permissions extend beyond the browser to downstream systems and apps, an   
   organization can't credibly claim to honor that choice.   
      
   Treating consent as a front-end event rather than an end-to-end control leaves   
   a wide gap between what people expect and what actually happens behind the   
   scenes.   
      
   2. Consent has to travel with data   
      
   A click on a banner starts a chain of obligations. True compliance depends on   
   whether those obligations propagate throughout the data environment...through   
   APIs, SDKs, event pipelines, data warehouses, and third-party integrations.   
      
   To make that possible, organizations need a source of truth for permissions: a   
   record of who consented to what, when, and for which purpose. That record must   
   drive automated enforcement across systems, not manual updates or email   
   requests.   
      
   When a user revokes consent, suppression should occur automatically - whether   
   that means halting data flows, deleting records, or adjusting partner   
   configurations.   
      
   The standard isn't "Did we show a message?" but "Can we prove that our   
   systems behaved in accordance with the user's choice?"   
      
   3. Ask at the right time, with the right scope   
      
   The least effective time to ask for meaningful consent is the first second   
   someone visits your site. That's when users know the least about what   
   they're agreeing to, and when context is absent.   
      
   A better approach is contextual consent: asking when the purpose is clear and   
   the value exchange is visible. What does this look like in practice?   
      
   When someone begins checkout, ask to save their cart or send follow-up offers.   
      
   When a user presses play on a video, explain what analytics data will be   
   collected and why.   
      
   When a visitor performs a search, ask to store queries to improve future   
   results.   
      
   These prompts tie a specific data use to a specific benefit, creating informed   
   choice.   
      
   Contextual consent also allows for granularity. Instead of one global decision   
   that applies to every system, permissions can map to defined purposes, whether   
   that's analytics, personalization, or advertising. And each has its own   
   controls and retention rules.   
      
   4. Sensitivity is declared and derived   
      
   Many organizations focus on data that's explicitly classified as sensitive   
   like health information, financial records, and precise location, but overlook   
   the inferences created by ordinary digital behavior.   
      
   A product URL containing "prenatal-vitamins," a search for a medical   
   condition, or a referral from a faith-based site can all expose sensitive   
   attributes. Even without explicit identifiers, these signals can create legal   
   and reputational risk if shared or analyzed without proper authorization.   
      
   Understanding this means looking beyond cookie scanning. It requires visibility   
   into what data actually leaves the device, where it's transmitted, and what   
   can be inferred from it. Modern scanning and classification tools can detect   
   high-risk combinations and trigger stricter consent requirements or   
   suppression.   
      
   Sensitivity isn't always declared, it can emerge through context.   
      
   5. Proof not promises   
      
   Most consent failures aren't caused by bad intentions, but by   
   misconfiguration. For example: a tag is added through a CMS update or a   
   marketing tool starts collecting new parameters by default.   
      
   Privacy programs need the equivalent of security testing: continuous validation   
   that user choices are being respected in real time.   
      
   Automated privacy testing can simulate user journeys, toggle preferences, and   
   verify whether disallowed events still fire.   
      
   Verification turns consent from a checkbox into a measurable control, capable   
   of producing evidence that can stand up to scrutiny.   
   6. Governance makes consent durable   
      
   Consent cannot live within one department. Legal defines the obligations;   
   engineering implements the enforcement; marketing and product teams manage how   
   data is collected and used. Without shared ownership, consent breaks down.   
      
   Effective data governance programs share three traits:   
      
   Centralized permissions logic. A structured data model for storing and   
   enforcing choices across systems.   
      
   Transparent inventory. Clear knowledge of what runs on the site, what data it   
   collects, where it goes, and under what legal basis.   
      
   Accountability. Named owners for consent UX, tag management, partner oversight,   
   and verification.   
      
   When each function understands its role, organizations can demonstrate control   
   instead of just intent.   
      
   When consent is handled properly, it becomes part of how companies build   
   credibility in the way they use data. People can see what they're agreeing to   
   and why it matters, and the user experience feels clear rather than   
   obstructive.   
      
   Behind the scenes, teams have structured, verifiable access to information they   
   can use responsibly, supported by systems that keep those permissions   
   consistent across tools and partners. Compliance isn't just a matter of faith   
   or documentation but is evidenced in how the technology behaves.   
      
   The cookie banner itself may remain, but it should no longer bear the full   
   burden of compliance. Progress depends on embedding consent into the data   
   lifecycle: linking it to purpose, enforcing it through design, and verifying   
   that it continues to hold true as systems evolve.   
      
   That requires coordination across functions, constant validation, and a shared   
   commitment to transparency in how data is used.   
      
   Consent was meant to give people control and organizations clarity. Getting it   
   right demands both, and doing so restores meaning to a mechanism that has, for   
   too long, been treated as a checkbox.   
      
   This article was produced as part of TechRadarPro's Expert Insights channel   
   where we feature the best and brightest minds in the technology industry today.   
   The views expressed here are those of the author and are not necessarily those   
   of TechRadarPro or Future plc. If you are interested in contributing find out   
   more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro   
      
      
   https://www.techradar.com/pro/consent-is-broken-how-do-we-fix-it   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: Capitol City Online (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca