The 2015 Corporate Accountability Index ranks 16 Internet and telecommunications companies according to 31 indicators focused on corporate disclosure of policies and practices that affect users’ freedom of expression and privacy.
Company scores and accompanying analysis have been generated through a rigorous process including peer review, company feedback, and quality control.
The data produced by the Index can inform the work of human rights advocates, policymakers, and responsible investors. It can also help companies improve their own policies and practices.
Download a PDF of the 2015 Indicators with definitions and research guidance, or explore them online below:
Ranking Digital Rights Corporate Accountability Index
2015 Research Indicators:
- C1. Policy and leadership
- C2. Governance and management oversight
- C3. Internal implementation
- C4. Impact assessment
- C5. Stakeholder engagement
- C6. Remedy
- F1. Availability of Terms of Service
- F2. Terms of Service, notice and record of changes
- F3. Reasons for content restriction
- F4. Reasons for account or service restriction
- F5. Notify users of restriction
- F6. Process for responding to third party requests
- F7. Data about government requests
- F8. Data about private requests
- F9. Data about Terms of Service enforcement
- F10. Network management (telecommunications companies)
- F11. Identity policies (Internet companies)
- P1. Availability of privacy policies
- P2. Privacy policies, notice and record of changes
- P3. Collection of user information
- P4. Sharing of user information
- P5. User control over information collection and sharing
- P6. Users’ access to their own information
- P7. Retention of user information
- P8. Collection of user information from third parties (Internet companies)
- P9. Process for responding to third party requests
- P10. User notification about third party requests for user information
- P11. Data about third party requests for user information
- P12. Security standards
- P13. Encryption of users’ private content (Internet companies)
- P14. Inform and educate users about potential threats
C: Commitment
The company demonstrates a clear commitment in words and deeds to respect the human rights to freedom of expression and privacy. Both rights are part of the Universal Declaration of Human Rights and are enshrined in the International Covenant on Civil and Political Rights. They apply online as well as offline. In order for a company to perform well in this section, the company’s commitment should at least follow, and ideally surpass, the UN Guiding Principles on Business and Human Rights and other industry-specific human rights standards focused on freedom of expression and privacy such as the Global Network Initiative.
C1. Policy and leadership
A. Does the company make explicit, prominent, and clearly articulated policy commitment to human rights including freedom of expression and privacy?
Answer categories (select one):
- Yes
- No
B. Do senior executives of the company make meaningful commitment to advance users’ freedom of expression and privacy?
Answer categories (select one):
- Executive-level comment: A senior executive has made statements in a prominent venue.
- Managerial-level comment: Company managers or spokesperson(s) have made statements in a prominent venue.
- None/no-evidence: Company representatives have not made related statements in a prominent venue.
Evaluation: This indicator is evaluated in two parts. A company can only receive full credit for this indicator if it receives a “Yes” for part A and “executive-level comment” for part B. We expect to see company commitments that relate to both freedom of expression and privacy.
Potential sources:
- Company human rights policy
- A company’s listing of its executive leadership team to identify who the company defines to be executive-level (for element B1). Company organization chart, annual reports, or proxy statements may also identify who is part of the company’s executive leadership team.
- Major media outlets
- Recordings or transcripts from public conferences
- Public responses, letters, or other communications with legislators or government agencies
- Public communications with civil society organizations
- Company blog posts (with author clearly listed)
C2. Governance and management oversight
Is there oversight at board, executive, and management levels on how the company’s policies and practices affect freedom of expression and privacy?
Checklist elements (select all that apply):
- Board-level oversight: A board committee has formal oversight over how company practices affect freedom of expression and privacy.
- Executive-level responsibility: An executive-level committee, team, program or officer oversees how company practices affect freedom of expression and privacy.
- Management-level responsibility: A management-level committee, team, program or officer oversees how company practices affect freedom of expression and privacy.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if they disclose information about how they consider these issues at the board, executive, and management levels. At the board level, this would be a committee. Below board-level, it can include a company unit or individual that reports to the executive or managerial level. The committee, program, team, officer, etc. should specifically identify freedom of expression and privacy in its description of responsibilities.
Potential sources:
- List of board of directors committees
- Company governance documents
- Company CSR/sustainability report
- Company organizational chart
- Company human rights policy
C3. Internal implementation
Does the company have mechanisms in place to implement its commitment to freedom of expression and privacy?
Checklist elements (select all that apply):
- The company provides employee training on freedom of expression and privacy issues.
- The company maintains an employee whistleblower program.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if they disclose information about employee training on freedom of expression and privacy and they disclose the existence of a whistleblower program that encompasses these issues. Disclosure around employee training should specify that the training covers freedom of expression, privacy, or both.
Potential sources:
- Company code of conduct
- Employee handbook
- Company organizational chart
- Company CSR/sustainability report
- Company blog posts
C4. Impact assessment
Does the company conduct regular, comprehensive, and credible due diligence, such as human rights impact assessments, to identify how all aspects of their business impact freedom of expression and privacy?
Checklist elements (select all that apply):
- The company examines laws affecting privacy and freedom of expression in jurisdictions where it operates and uses this analysis to inform company policies and practices.
- The company regularly assesses free expression and privacy risks associated with existing products and services.
- The company assesses free expression and privacy risks associated with a new activity, including the launch and/or acquisition of new products or services or entry into new markets.
- The company assesses free expression and privacy risks associated with the processes and mechanisms used to enforce its Terms of Service.
- The company conducts in-depth due diligence wherever the company’s risk assessments identify concerns.
- Senior executives and/or members of the company’s board of directors review and consider the results of assessments and due diligence in strategic decision-making for the company.
- The company conducts assessments on a regular schedule.
- The company’s assessment is assured by an external third party.
- The external third party that assures the assessment is accredited to a relevant and reputable human rights standard by a credible organization.
Note that this indicator does not expect companies to publish detailed results of their human rights impact assessments, since a thorough assessment includes sensitive information. Rather, it expects that companies should disclose that they conduct HRIAs and provide information on what their HRIA process encompasses.
While this indicator uses the language of human rights impact assessments, companies may use different names for this review process. What companies call their process is less important than what the process encompasses and accomplishes. This indicator will include a review of Privacy Impact Assessments (PIAs) and other assessment processes that contain characteristics or components listed in this indicator but are not necessarily called “human rights impact assessments.”
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if they demonstrate that their assessment process addresses all elements in the checklist. If a company conducts HRIAs, but there is no public disclosure of the fact that it does so, the company will not receive credit.
Potential sources:
- Company CSR/sustainability reports
- Company human rights policy
- Regulatory documents (e.g., U.S. Federal Trade Commission)
- Reports from third-party assessors or accreditors
- Global Network Initiative assessment reports
C5. Stakeholder engagement
Does the company engage with a range of stakeholders on freedom of expression and privacy issues?
A. The company is a member of a multi-stakeholder initiative whose focus includes a commitment to upholding of freedom of expression and privacy based on international human rights principles.
B. If not, does the company satisfy any of the following elements?
- The company is a member of an industry organization that engages with non-industry and non-governmental stakeholders on freedom of expression and privacy.
- The company initiates or participates in meetings with stakeholders that represent, advocate on behalf of, or are people directly and adversely impacted by the company’s business.
Engaging with stakeholders, particularly those who operate in high-risk environments, can be sensitive. A company may not feel comfortable publicly disclosing specific details about which stakeholders it consults, where or when they meet, and what they discuss. While we encourage companies to provide details about non-sensitive stakeholder engagement, we seek, at minimum, public disclosure that a company engages with stakeholders who are or represent users whose rights to freedom of expression and privacy are at risk. One way the public knows a company participates in this type of engagement is through its involvement in a multi-stakeholder initiative that brings the company in touch with representatives from various stakeholder groups including human rights organizations and others who advocate for the rights of at-risk groups.
Evaluation: A company will only receive full credit for this indicator if it fulfills element A. A company will receive partial credit if it meets one or both of the elements under B.
Potential sources:
- Company CSR/sustainability report
- Company annual report
- Company blog
- Membership lists on the Global Network Initiative and Industry Dialogue websites
- Company FAQ or Help Center
C6. Remedy
Does the company have grievance and remedy mechanisms?
Checklist elements (select all that apply):
- The company discloses its processes for receiving complaints or grievances.
- The company lists the kinds of complaints it is prepared to respond to.
- The company articulates its process for responding to complaints.
- The company reports on the number of complaints received.
- The company provides evidence that it is responding to complaints, including examples of outcomes.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if they demonstrate that their remedy and grievance mechanisms include all elements in the checklist.
Potential sources:
- Company terms of service or equivalent user agreements
- Company content policies
- Company privacy policies, privacy guidelines, or privacy resource site
- Company CSR/sustainability report
- Company help center or user guide
- Company transparency report (for the number of complaints received)
F: Freedom of Expression
In its disclosed policies and practices, the company demonstrates concrete ways in which it respects the right to freedom of expression of users, as articulated in the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights and other international human rights instruments. The company’s disclosed policies and practices demonstrate how it works to avoid contributing to actions that may interfere with this right, except where such actions are lawful, proportionate and for a justifiable purpose. Companies that perform well on this indicator demonstrate a strong public commitment to transparency not only in terms of how they respond to government and others’ demands, but also how they determine, communicate, and enforce private rules and commercial practices that affect users’ freedom of expression.
F1. Availability of Terms of Service
Are the company’s Terms of Service freely available and easy to understand?
Checklist elements (select all that apply):
- Free: The company’s terms of service (ToS) are easy to find and freely available without needing to sign up or subscribe.
- Language: The ToS is available in the language(s) most commonly spoken by the company’s users.
- Easy to understand: The ToS are presented in an understandable manner.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist. This indicator includes a review of other documents such as “community guidelines” or service-specific rules that further explain to users what the terms mean. Privacy policies are NOT included in this indicator since they are covered in separate indicators in the “Privacy” section.
Potential sources:
- Company terms of service, terms of use, terms and conditions, etc.
- Company acceptable use policy, community guidelines, rules, etc.
F2. Terms of Service, notice and record of changes
Does the company commit to provide meaningful notice and documentation to users when it changes its Terms of Service?
Checklist elements (select all that apply):
- The company discloses the method of direct notification to users (e.g., email, SMS, etc.).
- The company discloses the timeframe within which it provides notification (e.g., two weeks prior to changes occurring).
- The company maintains a public archive or change log.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company terms of service
F3. Reasons for content restriction
Does the company disclose whether it prohibits certain types of content or activities?
Checklist elements (select all that apply):
- The company explains what types of content or activities it does not permit.
- The company explains its process for enforcing its rules.
- The company provides examples to help the user understand what the rules are and how they are enforced.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company Terms of Service, user contract, acceptable use policy, community standards, content guidelines, abusive behavior policy, or similar document that explains the rules users have to follow.
- Company support, help center, or FAQ (e.g., questions around why is content removed, why is an account suspended, etc)
F4. Reasons for account or service restriction
Does the company explain the circumstances under which it may restrict or deny users from accessing the service?
Checklist elements (select all that apply):
- The company explains the reason(s) why it may restrict a user’s account.
- The company explains why it may shut down or restrict service to a particular area or group of users (where applicable).
- The company provides specific examples of situations that may trigger restriction or denial of service by the company.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist. Element 2 is only applicable to telecommunications companies; Internet companies will receive a N/A (non-applicable) score for element 2. Internet companies must fulfill elements 1 and 3 to receive full credit for this indicator.
Potential Sources
- Company Terms of Service, user contract, acceptable use policy, community standards, content guidelines, abusive behavior policy, or similar document that explains the rules users have to follow.
- Company support, help center, or FAQ (e.g., questions around why is content removed, why is an account suspended, etc)
F5. Notify users of restriction
If the company restricts content or access, does it disclose how it notifies users?
Checklist elements (select all that apply):
- If the company hosts user-generated content, the company commits to notify users who generated the content when it is restricted.
- The company commits to notify users who attempt to access content that has been restricted.
- In its notification, the company includes an explanation of the basis for the content restriction (legal or otherwise).
- The company commits to notify users when it restricts access to the service.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company Terms of Service, acceptable use policy, community standards, content guidelines, abusive behavior policy, or similar document that explains the rules users have to follow.
- Company support, help center, or FAQ (e.g., questions around why is content removed, why is an account suspended, etc.)
- Company human rights policy
F6. Process for responding to third-party requests
Does the company publish information about its process for evaluating and responding to requests from governments and other third parties to restrict content or service?
Checklist elements (select all that apply):
- The company explains its process for receiving and responding to non-judicial government requests.
- The company explains its process for responding to court order
- The company explains its process for responding to requests made by private parties.
- The company explains its process for responding to requests from foreign jurisdictions.
- The company’s explanations include the legal basis under which it may comply.
- The company commits to carry out due diligence on requests before deciding how to respond.
- The company’s process commits to push back on unlawful requests.
- The company provides guidance or examples of policy implementation.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company transparency report
- Company law enforcement guidelines
- Company terms of service
- Company policy on copyright or intellectual property
- Company help or support center
- Company blog posts
F7. Data about government requests
Does the company regularly publish data about government requests (including judicial orders) to remove, filter, or restrict content or access to service, plus data about the extent to which the company complies with such requests?
Checklist elements (select all that apply):
- The company breaks out the number of requests it receives by country.
- The company lists the number of accounts affected.
- The company lists the number of pieces of content or URLs affected.
- The company lists the types of subject matter associated with the requests it receives.
- The company identifies the specific legal authority making the requests.
- The company lists the number of requests it complied with.
- The company either publishes the original requests or provides copies to a third-party archive such as Chilling Effects or a similar organization.
- The company reports this data at least once a year.
- The data reported by the company can be exported as a structured data file
In some cases, the law might prevent a company from disclosing information referenced in this indicator’s elements. For example, we expect companies to publish exact numbers rather than ranges of numbers. We acknowledge that laws sometimes prevent companies from doing so, and researchers will document situations where this is the case. But a company will lose points if it fails to meet all elements. This represents a situation where the law causes companies to be uncompetitive, and we encourage companies to advocate for laws that enable them to fully respect users’ rights to freedom of expression and privacy.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company transparency report
F8. Data about private requests
Does the company regularly publish data about requests from non-governmental (and non-judicial) parties to remove, filter, or restrict access to content, plus data about the extent to which the company complies with such requests?
Checklist elements (select all that apply):
- The company breaks out the number of requests it receives by country.
- The company lists the number of accounts affected.
- The company lists the number of pieces of content or URLs affected.
- The company lists the reasons for removal associated with the requests it receives (e.g., copyright violation, hate speech, incitement to violence, child abuse images, etc.).
- The company describes the types of parties from which it receives requests (e.g. requests made under a notice-and-takedown system, requests from a non-governmental organization, requests from a voluntary industry self-regulatory body, etc.).
- The company lists the number of requests it complied with.
- The company either publishes the original requests or provides copies to a third-party archive such as Chilling Effects or a similar organization.
- The company reports this data at least once a year.
- The data reported by the company can be exported as a structured data
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company transparency report
F9. Data about Terms of Service enforcement
Does the company regularly publish information about the volume and nature of actions taken to enforce the company’s own terms of service?
Checklist elements (select all that apply):
- The company lists the number of accounts affected.
- The company lists the number of pieces of content or URLs restricted.
- The company lists the types of content restricted during the reporting period (e.g., hate speech, harassment, incitement to violence, sexually explicit content, etc.).
- The company provides examples of why it took action in different types of cases.
- The company reports this data at least once a year.
- The data reported by the company can be exported as a structured data
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company transparency report
F10. Network management (telecommunications companies)
Does the company disclose whether it prioritizes or degrades transmission or delivery of different types of content (e.g, traffic shaping or throttling) and if so, for what purpose?
Answer categories (select one):
- The company discloses that it does not prioritize or degrade the delivery of content.
- The company discloses that it prioritizes or degrades content delivery and the purpose of doing so.
- The company discloses that it prioritizes or degrades content delivery but doesn’t explain the purpose.
- The company does not disclose information about prioritizing or degrading the delivery of content.
Evaluation: Researchers are instructed to select one of four possible answer categories. Only companies that meet the criteria for the first answer category, “The company discloses that it does not prioritize or degrade the delivery of content.” will receive full credit for this indicator. Other answer categories receive progressively less credit.
Potential Sources:
- Company explanation of network management or traffic management practices
F11. Identity policy (Internet companies)
Does the company require users to verify their identity with government-issued identification, or with other forms of identification connected to their offline identity?
Answer categories (select one):
- No
- Yes
Evaluation: This indicator has two possible answers. A company will receive full credit if its answer is “No,” and a company will receive no credit if its answer is “Yes.”
Potential sources:
- Company terms of service or equivalent document
- Company help center
- Company sign up page
P: Privacy
In its disclosed policies and practices, the company demonstrates concrete ways in which it respects the right to privacy of users, as articulated in the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights and other international human rights instruments. The company’s disclosed policies and practices demonstrate how it works to avoid contributing to actions that may interfere with users’ privacy, except where such actions are lawful, proportionate and for a justifiable purpose. They will also demonstrate a strong commitment to protect and defend users’ digital security. Companies that perform well on this indicator demonstrate a strong public commitment to transparency not only in terms of how they respond to government and others’ demands, but also how they determine, communicate, and enforce private rules and commercial practices that affect users’ privacy.
P1. Availability of Privacy Policies
Are the company’s privacy policies freely available and easy to understand?
Checklist elements (select all that apply):
- Free: The company’s privacy policies are easy to find and freely available without needing to sign up or subscribe.
- Language: The privacy policies are available in the language(s) most commonly spoken by the company’s users.
- Easy-to-understand: The policies are presented in an understandable manner.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist. Terms of Service are NOT included in this indicator since they are covered in separate indicators in the “Freedom of Expression” section.
Potential sources:
- Company privacy policy, data use policy
P2. Privacy Policies, notice and record of changes
Does the company commit to provide meaningful notice and documentation to users when it changes its privacy policies?
Checklist elements (select all that apply):
- The company discloses the method of direct notification to users (e.g., email, SMS, etc.).
- The company discloses the time frame within which it provides notification (e.g., two weeks prior to changes occurring).
- The company maintains a public archive or change log.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company privacy policy, data use policy
P3. Collection of user information
Does the company disclose what user information it collects, how it collects this information, and why?
A. The company discloses that it collects no user information.
B. If not, does the company satisfy any of the following elements?
- Data minimization: The company commits to limit collection of user information to what is directly relevant and necessary to accomplish the purpose of its service.
- The company clearly discloses what user information it collects.
- The company clearly discloses how it collects user information.
- The company clearly discloses why it collects user information.
The term “user information” appears in many indicators throughout this section. RDR takes an expansive interpretation of what constitutes user information:
“User information is any data which is connected to an identifiable person, or may be connected to such a person by combining datasets or utilizing data-mining techniques.”
As further explanation, user Information is any data which documents a user’s characteristics and/or activities. This information may or may not be tied to a specific user account. This information includes, but is not limited to, personal correspondence, user-generated content, account preferences and settings, log and access data, data about a user’s activities or preferences collected from third parties either through behavioral tracking or purchasing of data, and all forms of metadata. User Information is never considered anonymous except when included solely as a basis to generate global measures (e.g. number of active monthly users). For example, the statement, ‘Our service has 1 million monthly active users,’ contains anonymous data, since it does not give enough information to know who those 1 million users are. Our definition is:
“Anonymous data is data that is in no way connected to another piece of information that could enable a user to be identified.”
The expansive nature of this view is necessary to reflect several facts. First, skilled analysts can de-anonymize large data sets. This renders nearly all promises of anonymization unattainable. In essence, any data tied to an ‘anonymous identifier’ is not anonymous; rather, this is often pseudonymous data which may be tied back to the user’s offline identity. Second, metadata may be as or more revealing of a user’s associations and interests than content data, thus this data is of vital interest. Third, entities that have access to many sources of data, such as data brokers and governments, may be able to pair two or more data sources to reveal information about users. Thus, sophisticated actors can use data that seems anonymous to construct a larger picture of a user.
Evaluation: If a company’s disclosure states that it does not collect any user information, fulfilling element A, the company receives full credit for the indicator. If a company does not fulfill element A, the researcher will look for company disclosure to meet the checklist elements of B. A company can receive partial credit if its disclosure meets all elements in the B checklist.
In some cases, laws or regulations might require companies to collect certain information or might prohibit or discourage the company from disclosing what user information they collect. Researchers will document situations where this is the case, but a company will still lose points if it fails to meet all elements. This represents a situation where the law causes companies to be uncompetitive, and we encourage companies to advocate for laws that enable them to fully respect users’ rights to freedom of expression and privacy.
Potential sources:
- Company privacy policy (primary source)
- Company section on data protection or data collection (secondary source)
P4. Sharing of user information
Does the company disclose if and why it shares user information with third parties?
A. The company discloses that it does not share user information.
B. If not, does the company satisfy any of the following elements?
- The company clearly discloses what user information it shares.
- The company clearly discloses why it shares user information.
- The company provides a detailed description of the types of third parties with which it shares user information.
- The company discloses the names of all third parties with which it shares user information and explains what information it shares with each third party.
- If the company offers multiple services, it clearly discloses whether and how it will share user information between different services.
The term “user information” appears in many indicators throughout this section. RDR takes an expansive interpretation of what constitutes user information:
“User information is any data which is connected to an identifiable person, or may be connected to such a person by combining datasets or utilizing data-mining techniques.”
As further explanation, user Information is any data which documents a user’s characteristics and/or activities. This information may or may not be tied to a specific user account. This information includes, but is not limited to, personal correspondence, user-generated content, account preferences and settings, log and access data, data about a user’s activities or preferences collected from third parties either through behavioral tracking or purchasing of data, and all forms of metadata. User Information is never considered anonymous except when included solely as a basis to generate global measures (e.g. number of active monthly users). For example, the statement, ‘Our service has 1 million monthly active users,’ contains anonymous data, since it does not give enough information to know who those 1 million users are. Our definition is:
“Anonymous data is data that is in no way connected to another piece of information that could enable a user to be identified.”
The expansive nature of this view is necessary to reflect several facts. First, skilled analysts can de-anonymize large data sets. This renders nearly all promises of anonymization unattainable. In essence, any data tied to an ‘anonymous identifier’ is not anonymous; rather, this is often pseudonymous data which may be tied back to the user’s offline identity. Second, metadata may be as or more revealing of a user’s associations and interests than content data, thus this data is of vital interest. Third, entities that have access to many sources of data, such as data brokers and governments, may be able to pair two or more data sources to reveal information about users. Thus, sophisticated actors can use data that seems anonymous to construct a larger picture of a user.
Evaluation: If a company’s disclosure states that it does not share any user information, fulfilling element A, the company receives full credit for the indicator. If a company does not fulfill element A, the researcher will look for company disclosure to meet the checklist elements of B. A company can only receive partial credit if its disclosure meets all elements in the B checklist.
Potential sources:
- Company privacy policy (primary source)
- Company policies related to sharing data, interaction with third parties (secondary source)
P5. User control over information collection and sharing
Does the company provide users with options to control the company’s collection and sharing of their information?
Checklist elements (select all that apply):
- The company provides users with options to control the company’s collection of their information.
- The company provides users with options to control the company’s sharing of their information.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist. We expect companies to disclose what the options to control are, rather than simply disclose that the users have options.
Potential sources:
- Company privacy policy
- Company account settings
P6. Users’ access to their own information
Are users able to view, download or otherwise obtain, in structured data formats, all of the information about them that the company holds?
Checklist elements (select all that apply):
- The company allows users to view their data.
- The company allows users to receive a copy of their data.
- The data can be downloaded in a structured data format.
- This data includes all public-facing and private information a company holds about a user.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company privacy policy
- Company account settings
- Company help center
- Company blog posts
P7. Retention of user information
Does the company disclose how long it retains user information?
A. The company discloses that it does not retain user information.
B. If not, does the company satisfy any of the following elements?
- The company discloses that it retains user information (not actively submitted by the user for the purpose of storage or publication) in an anonymized form.
- The company discloses the types of user information it retains.
- The company discloses how long it retains user information.
- The company discloses that it deletes all user information after users terminate their account.
Evaluation: If a company’s disclosure states that it does not retain any user information, fulfilling element A, the company receives full credit for the indicator. If a company does not fulfill element A, the researcher will look for company disclosure to meet the checklist elements of B. A company can only receive partial credit if its disclosure meets all elements in the B checklist.
In some cases, laws or regulations might require companies to retain certain information for a given period of time. Researchers will document situations where this is the case, but a company will still lose points if it fails to meet all elements. This represents a situation where the law causes companies to be uncompetitive, and we encourage companies to advocate for laws that enable them to fully respect users’ rights to freedom of expression and privacy.
P8. Collection of user information from third parties (Internet companies)
Does the company publish clear information about whether it collects user information from third parties?
A. The company discloses that it does not collect user information from third parties.
B. If not, does the company satisfy any of the following elements?
- The company clearly explains how it may collect user information from third parties (e.g. use of a widget or advertising service).
- The company clearly states how it uses the information it collects.
- The company clearly states how long it retains information it collects.
- The company respects user-generated signals (e.g. “Do Not Track” headers) to opt-out of data collection.
Evaluation: If a company’s disclosure states that it does not collect any user information from third parties, fulfilling element A, the company receives full credit for the indicator. If a company does not fulfill element A, the researcher will look for company disclosure to meet the checklist elements of B. A company can only receive partial credit if its disclosure meets all elements in the B checklist.
Potential sources:
- Company privacy policy
- Company policy on third parties
P9. Process for responding to third-party requests for user information
Does the company publish information about its process for evaluating and responding to requests from government and other third parties for stored user data and/or real-time communications, including the legal basis for complying with such requests?
Checklist elements (select all that apply):
- The company explains its process for receiving and responding to non-judicial government requests.
- The company explains its process for responding to court order
- The company explains its process for responding to requests made by private parties.
- The company explains its process for responding to requests from foreign jurisdictions.
- The company’s explanations include the legal basis under which it may comply.
- The company commits to carry out due diligence on requests before deciding how to respond.
- The company’s process commits to push back on unlawful requests.
- The company provides guidance or examples of policy implementation.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
In some cases, the law might prevent a company from disclosing information referenced in this indicator’s elements. Researchers will document situations where this is the case, but a company will still lose points if it fails to meet all elements. This represents a situation where the law causes companies to be uncompetitive, and we encourage companies to advocate for laws that enable them to fully respect users’ rights to freedom of expression and privacy.
Potential sources:
- Company transparency report
- Company law enforcement guidelines
- Company privacy policy
- Company blog posts
P10. User notification about third-party requests for user information
Does the company commit to notify users to the extent legally possible when their data has been requested by governments and other third parties?
Checklist elements (select all that apply):
- The company commits to notify users when government entities (including courts or other judicial bodies) request their user data.
- The company commits to notify users when non-government entities request their user data.
- The company discloses situations when it might not notify users, including a description of the types of government requests it is prohibited by law from disclosing to users.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company transparency report
- Company law enforcement guidelines
P11. Data about third-party requests for user information
Does the company regularly publish data about government and other third-party requests for user information, plus data about the extent to which the company complies with such requests?
Checklist elements (select all that apply):
- The company breaks out the number of user data and real-time communications access demands it receives by country.
- The company lists the number of accounts affected.
- The company lists whether a demand sought communications content or non-content (e.g., metadata, basic subscriber information, or non-content transactional data) or both.
- The company identifies the specific legal authority or type of legal process through which law enforcement and national security demands are made.
- The company includes requests that come from court orders or subpoenas (including civil cases).
- The company includes other non-governmental requests.
- The company lists the number of requests it complied with, broken down by category of demand.
- The company lists what types of government requests it is prohibited by law from disclosing.
- The company reports this data at least once per year.
- The data reported by the company can be exported as a structured data
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
In some cases, the law might prevent a company from disclosing information referenced in this indicator’s elements. For example, we expect companies to publish exact numbers rather than ranges of numbers. We acknowledge that laws sometimes prevent companies from doing so, and researchers will document situations where this is the case. But a company will lose points if it fails to meet all elements. This represents a situation where the law causes companies to be uncompetitive, and we encourage companies to advocate for laws that enable them to fully respect users’ rights to freedom of expression and privacy.
Potential sources:
- Company transparency report
P12. Security standards
Does the company deploy industry standards of encryption and security for its products and services?
Checklist elements (select all that apply):
- The company commits to keep up-to-date with the latest encryption and security standards and publishes evidence that it does so.
- The company commits to address security vulnerabilities when they are discovered and publishes general information about how it does so.
- The company discloses that it has systems in place to limit and monitor employee access to user information.
- The company discloses that it regularly conducts security audits on its technologies and practices affecting user information.
- The company discloses that the transmission of user communications is encrypted by default.
- The company discloses that it deploys advanced authentication methods to prevent fraudulent access.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company privacy policies
- Company security guide
P13. Encryption of users’ private content (Internet companies)
Can users encrypt their own content and thereby control who has access to it?
Answer categories (select one):
- Private user content is encrypted by default; the company itself has no access.
- The company offers a built-in option to encrypt private content.
- The company’s terms or other policies explain that the user may deploy third party encryption technologies.
- No disclosure.
- The company’s terms or other policies prohibit encryption.
Evaluation: This is a single-choice indicator, meaning researchers should only select one answer. The answer categories will be scored on a scale. The highest possible score is awarded to answer #1, and companies that meet it will receive full credit. Companies meeting #2 will receive partial credit (percentage to be determined), and companies meeting #3 will receive a smaller percentage of credit. Companies that receive answer #4 or answer #5 will receive zero credit for this indicator.
Potential sources:
- Company terms of service or privacy policy
- Company security guide
- Company help center
- Company sustainability reports
- Official company blog and/or press releases
P14. Inform and educate users about potential threats
Does the company publish information to help users defend against cyber threats?
Checklist elements (select all that apply):
- The company commits to inform users about unusual account activity, most recent account activity, and possible unauthorized access.
- The company publishes practical materials that educate users on how to protect themselves from cyber threats relevant to their services.
Evaluation: This indicator is scored using a checklist, meaning companies can only receive full credit if their disclosure meets all elements in the checklist.
Potential sources:
- Company security center
- Company help pages or community support page
- Company account settings page
- Company blog
- Company sustainability report
Appendix 1 – Definitions and Key References
Note: This is not a general glossary. The definitions and explanations provided below were written specifically to guide researchers in evaluating Internet and telecommunications companies on this project’s Research Indicators.
Account restriction / restrict a user’s account – Limitation, suspension, deactivation, deletion, or removal of a specific user account or permissions on a user’s account.
Anonymous data — Data that is in no way connected to another piece of information that could enable a user to be identified.
The expansive nature of this definition used by the Ranking Digital Rights project is necessary to reflect several facts. First, skilled analysts can de-anonymize large data sets. This renders nearly all promises of anonymization unattainable. In essence, any data tied to an ‘anonymous identifier’ is not anonymous; rather, this is often pseudonymous data which may be tied back to the user’s offline identity. Second, metadata may be as or more revealing of a user’s associations and interests than content data, thus this data is of vital interest. Third, entities that have access to many sources of data, such as data brokers and governments, may be able to pair two or more data sources to reveal information about users. Thus, sophisticated actors can use data that seems anonymous to construct a larger picture of a user.
Board-level committee — A committee of the company’s board of directors (or similar governing body).
Change log — A record that depicts the specific changes in a document, in this case, a terms of service document.
Collect / Collection – All means by which a company may gather information about users. A company may collect this information directly from users, for example, when users submit user-generated content to the company. A company may also collect this information indirectly, for example, by recording log data, account information, metadata, and other related information that describes users and/or documents their activities.
Content – The information contained within wire, oral, or electronic communications (e.g., a conversation that takes place over the phone or face-to-face, the text written and transmitted in an SMS or email).
Court orders – Orders issued by a court. They include court orders in criminal and civil cases.
Cyber threat – The process by which a malicious actor (including but not limited to criminals, insiders, or nation states) may gain unauthorized access to user data using hacking, phishing, or other deceptive techniques.
Data minimization – According to the European Data Protection Supervisor (EDPS), “The principle of ‘data minimization’ means that a data controller [“the institution or body that determines the purposes and means of the processing of personal data”] should limit the collection of personal information to what is directly relevant and necessary to accomplish a specified purpose. They should also retain the data only for as long as is necessary to fulfil that purpose. In other words, data controllers should collect only the personal data they really need, and should keep it only for as long as they need it.”
Source: European Data Protection Supervisor, Data Protection Glossary, https://secure.edps.europa.eu/EDPSWEB/edps/site/mySite/pid/74
Delivery – When data packets reach an end user.
Documentation – The company provides records that users can consult.
Do Not Track – Also known by the acronym “DNT”, this refers to a setting in a user’s browser preferences which tells entities not to “track” them. In other words, every time a user loads a website, any parties that are involved in delivering the page (of which there are often many, primarily advertisers) are told not to collect or store any information about the user’s visit to the page. However, this is merely a polite request – a company may ignore a DNT request, and the vast majority do.
Easy to find – The information or document is located on the home page of the company or service, or at most, on a page that is one click away from the home page.
Easy to understand & understandable manner – The company has taken steps to help users actually understand the information. This includes, but is not limited to, providing summaries, tips, or guidance that explain what the terms mean, using section headers, readable font size, or other graphic features to help users understand the document, or writing the terms using readable syntax.
Encryption – This essentially hides the content of communications so only the intended recipient can view it. The process uses an algorithm to convert the message (plaintext) into a coded format (ciphertext) so that the message looks like a random series of characters to anyone who looks at it. Only someone who has the appropriate encryption key can decrypt the message, reversing the ciphertext back into plaintext. Data can be encrypted when it is stored and when it is in transmission.
For example, users can encrypt the data on their hard drive so that only the intended recipient with the encryption key can decipher the contents of the drive. Additionally, users can send an encrypted email message, which would prevent anyone from seeing the email contents while the message is moving through the network to reach the intended recipient. With encryption in transit (for example visible when a website uses HTTPS), the communication between a user and a website is encrypted, so that outsiders, such as the user’s Internet Service Provider can only see the initial visit to the website, but not what the user communicates on that website, or the sub-pages that the user visits.
For more information, see this resource: http://www.explainthatstuff.com/encryption.html
Stakeholder Engagement – Interactions between the company and stakeholders. Companies or stakeholders can initiate these interactions, and they can take various formats, including meetings, other communication, etc.
Executive-level oversight – The executive committee or a member of the company’s executive team directly oversees issues related to freedom of expression and privacy.
Explicit – The company specifically states its support for freedom of expression and privacy.
Freely available – A person can see the information without having to sign in, make a purchase, download software, add a plugin or cookie, or otherwise provide information or take action in exchange for viewing the the information.
Government requests – This includes requests from government ministries or agencies, law enforcement, and court orders in criminal and civil cases.
Grievance – “[A] perceived injustice evoking an individual’s or a group’s sense of entitlement, which may be based on law, contract, explicit or implicit promises, customary practice, or general notions of fairness of aggrieved communities.” (p. 32 of 42.)
Source: “Guiding Principles on Business and Human Rights: Implementing the United Nations ‘Protect, Respect and Remedy Framework,” 2011,
http://www.ohchr.org/Documents/Publications/GuidingPrinciplesBusinessHR_EN.pdf
Human Rights Impact Assessments (HRIA) – For the purpose of this methodology, HRIAs are a systematic approach to due diligence. A company carries out these assessments or reviews to see how its products, services, and business practices affect the freedom of expression and privacy of its users.
For more information about Human Rights Impact Assessments and best practices in conducting them, see this special page hosted by the Business & Human Rights Resource Centre: http://www.business-humanrights.org/UNGuidingPrinciplesPortal/ToolsHub/Companies/StepTaken/ImpactAssessment
The Danish Institute for Human Rights has developed a related Human Rights Compliance Assessment tool (https://hrca2.humanrightsbusiness.org), and BSR has developed a useful guide to conducting a HRIA: http://www.bsr.org/en/our-insights/bsr-insight-article/how-to-conduct-an-effective-human-rights-impact-assessment
For guidance specific to the ICT sector, see the excerpted book chapter (“Business, Human Rights and the Internet: A Framework for Implementation”) by Michael Samway on the project website at: http://rankingdigitalrights.org/resources/readings/samway_hria
Also see Part 3 Section 2 on assessment in the European Commission’s ICT Sector Guide on Implementing the UN Guiding Principles on Business and Human Rights: http://ec.europa.eu/enterprise/policies/sustainable-business/files/csr-sme/csr-ict-hr-business_en.pdf
Management-level – A committee, program, team, or officer that is not part of the company’s board of directors or the executive team.
Managerial-level comment– Comment from company employees with management roles and titles who are not part of the executive team.
Meaningful commitment – The company discusses freedom of expression and privacy in its own materials as well as in external appearances (e.g., presentations, media, etc). The company has discussed freedom of expression and privacy several times, rather than just once. The company responds to free expression and privacy concerns (e.g., making public statements, filing lawsuits, etc).
Multi-stakeholder initiative – A credible multi-stakeholder organization includes and is governed by members of at least three other stakeholder groups besides industry: civil society, investors, academics, at-large user or customer representatives, technical community, and/or government. Its funding model derives from more than one type of source (corporations, governments, foundations, public donations, etc.). Its independence, rigor, and professionalism are of a high standard, with strong participation by human rights organizations that themselves have solid track records of independence from corporate and/or government control. The Global Network Initiative is an example of a multi-stakeholder initiative focused on freedom of expression and privacy.
Non-content – Data about an instance of communication or about a user. Companies may use different terms to refer to this data, including metadata, basic subscriber information, non-content transactional data, account data, or customer information. The Guardian has a useful guide with examples of what counts as metadata on various services.
In the U.S., the Stored Communications Act defines non-content customer communications or records as, “name; address; local and long distance telephone connection records, or records of session times and durations; length of service (including start date) and types of service utilized; telephone or instrument number or other subscriber number or identity (including any temporarily assigned network address); and means and source of payment for such service (including any credit card or bank account number).” The European Union’s Handbook on European Data Protection Law states, “Confidentiality of electronic communications pertains not only to the content of a communication but also to traffic data, such as information about who communicated with whom, when and for how long, and location data, such as from where data were communicated.”
Non-judicial government requests – These are requests that come from government entities that are not judicial bodies, judges, or courts. They can include requests from government ministries, agencies, police departments, police officers (acting in official capacity) and other non-judicial government offices, authorities, or entities.
Notice / Notify – The company communicates with users or informs users about something related to the company or service.
Officer – A senior employee accountable for an explicit set of risks and impacts, in this case privacy and freedom of expression.
Options to control – The company provides the user with a direct and easy-to-understand mechanism to opt-in or opt-out of data collection, use, or sharing. “Opt-in” means the company does not collect, use, or share data for a given purpose until users explicitly signal that they want this to happen. “Opt-out” means the company uses the data for a specified purpose by default, but will cease doing so once the user tells the company to stop. Note that this definition is potentially controversial as many privacy advocates believe only “opt-in” constitutes acceptable control. However, for the purposes of RDR, we have elected to count “opt-out” as a form of control.
Oversight / Oversee – The company’s governance documents or decision-making processes assign a committee, program, team, or officer with formal supervisory authority over a particular function. This group or person has responsibility for the function and is evaluated based on the degree to which it meets that responsibility.
Policy commitment – The company’s commitment should be part of a human rights policy document. This represents a formal statement that has gone through an evaluation process and has receive approval at the highest levels of the company. General commitments or statements made in non-policy documents (e.g., CSR reports, webpages, blog posts, press releases) do not count.
Privacy policies – Documents that outline a company’s practices involving the collection and use of information, especially information about users.
Source: “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers,” U.S. Federal Trade Commission, March 2012, p. 77.
Private requests – Requests made by any person or entity not acting under direct governmental or court authority. These requests can come from a self-regulatory body such as the Internet Watch Foundation, or a notice-and-takedown system, such as the U.S. Digital Millennium Copyright Act . For more information on notice-and-takedown, as well as the DMCA specifically, see the recent UNESCO report, “Fostering Freedom Online: The Role of Internet Intermediaries” at http://unesdoc.unesco.org/images/0023/002311/231162e.pdf (p. 40-52 of 211).
Prioritization – Prioritization occurs when a network operator “manage[s] its network in a way that benefits particular content, applications, services, or devices.” For RDR’s purposes, this definition of prioritization includes a company’s decision to block access to a particular application, service, or device.
Source: U.S Federal Communications Commission’s 2015 Open Internet Rules, p. 7 of 400, https://apps.fcc.gov/edocs_public/attachmatch/FCC-15-24A1.pdf
Process for enforcing its rules – This includes cases where a company blocks, filters, removes, deletes, or otherwise renders a piece of content inaccessible. It also includes cases where a company shuts down, blocks, or otherwise denies service (either by deleting user accounts or shutting down the service) to an individual or group of individuals due to something the user(s) have done on the service.
Program / Team – A defined unit within a company that has responsibility over how the company’s products or services intersect with, in this case, freedom of expression and/or privacy.
Prominent – The company’s disclosure is easy to locate on the company’s website.
Prominent venue – This may include public statements or declarations made before a significant public audience, including at a major public conference, in a press interview, in a company blog post, in a public securities filing, etc. This does not include company press releases.
Public archive – A publicly available resource that contains previous versions of the terms of service or comprehensively explains each round of changes the company makes to its terms of service.
Real-time communications access – Surveillance of a conversation or other electronic communication in “real time” while the conversation is taking place, or interception of data at the very moment it is being transmitted. This is also sometimes called a “wiretap.” Consider the difference between a request for a wiretap and a request for stored data. A wiretap gives law enforcement authority to access future communications, while a request for stored data gives law enforcement access to records of communications that occurred in the past. The U.S. government can gain real-time communications access through the Wiretap Act and Pen Register Act, both part of the Electronic Communications Privacy Act (ECPA); the Russian government can do so through “System for Operative Investigative Activities” (SORM).
For more information on how wiretaps and pen registers affected online communications under the USA Patriot Act (through May 2015), see the following sections of the ACLU webpage “Surveillance Under the USA Patriot Act”:
- Expansion of the “pen register” exception in wiretap law
- “Nationwide” pen register warrants
- Pen register searches applied to the Internet
Remedy – “Remedy may include apologies, restitution, rehabilitation, financial or non-financial compensation and punitive sanctions (whether criminal or administrative, such as fines), as well as the prevention of harm through, for example, injunctions or guarantees of non-repetition. Procedures for the provision of remedy should be impartial, protected from corruption and free from political or other attempts to influence the outcome.” (p. 22 of 27.)
Source: “Report of the Special Representative of the Secretary-General on the issue of human rights and transnational corporations and other business enterprises, John Ruggie. Guiding Principles on Business and Human Rights: Implementing the United Nations ‘Protect, Respect and Remedy’ Framework,” 2011.
Also see: the Telco Remedy Plan by Access: https://s3.amazonaws.com/access.3cdn.net/fd15c4d607cc2cbe39_0nm6ii982.pdf
Retention of user information – A company may collect data and then delete it. If the company does not delete it, the data is “retained.” The time between collection and deletion is the ‘retention period’. Such data may fall under our definition of ‘user information’, or it may be anonymous. Keep in mind that truly anonymous data may in no way be connected to a user, the user’s identity, behavior or preference, which is very rare.
A related topic is the ‘retention period’. For example, a company may collect log data on a continual basis, but purge (delete) the data once a week. In this case, the data retention period is one week. However, if no retention period is specified, the default assumption must be that the data is never deleted, and the retention period is therefore infinite. In many cases users may wish for their data to be retained while they are actively using the service, but would like it to be deleted (and therefore not retained) if and when they quit using the service. For example, users may want a social network service to keep all of their private messages, but when the user leaves the network they may wish that all of their private messages be deleted.
Senior executives – CEO and/or other members of the executive team as listed by the company on its website or other official documents such as an annual report. In the absence of a company-defined list of its executive team, other chief-level positions and those at the highest level of management (e.g., executive/senior vice president, depending on the company).
Service restriction – The company blocks, shuts down, or otherwise prevents access to the service. This service restriction can occur for a specific user, a group of users, or users in a particular area.
Shares / Sharing – The company allows a third party to access user information, either by freely giving the information to a third party (or the public, or other users) or selling it to a third party.
Stakeholders – People who have a “stake” because they are affected in some way by a company’s actions or decisions.
Note that stakeholders are not the same as “rights holders” and that there are different kinds of stakeholders: those who are directly affected, and “intermediary stakeholders” whose role is to advocate for the rights of direct stakeholders.
- Rights holders are the individuals whose human rights could be directly impacted. They interact with the company and its products and services on a day-to-day basis, typically as employees, customers, or users.
- Intermediary stakeholders include individuals and organizations informed about and capable of speaking on behalf of rights holders, such as civil society organizations, activist groups, academics, opinion formers, and policymakers.” (p. 10 of 28).
Source: Stakeholder Engagement in Human Rights Due Diligence: Challenges and Solutions for ICT Companies by BSR, Sept. 2014 http://www.bsr.org/reports/BSR_Rights_Holder_Engagement.pdf
Structured data – “Data that resides in fixed fields within a record or file. Relational databases and spreadsheets are examples of structured data. Although data in XML files are not fixed in location like traditional database records, they are nevertheless structured, because the data are tagged and can be accurately identified.” Conversely, unstructured data is data that “does not reside in fixed locations. The term generally refers to free-form text, which is ubiquitous. Examples are word processing documents, PDF files, e-mail messages, blogs, Web pages and social sites.”
Sources: PC Mag Encyclopedia
“structured data” http://www.pcmag.com/encyclopedia/term/52162/structured-data
“unstructured data” http://www.pcmag.com/encyclopedia/term/53486/unstructured-data
Terms of Service – This document may also be called Terms of Use, Terms and Conditions, etc. The terms of service “often provide the necessary ground rules for how various online services should be used,” as stated by the EFF, and represent a legal agreement between the company and the user. Companies can take action against users and their content based on information in the terms of service.
Source: Electronic Frontier Foundation, “Terms of (Ab)use” https://www.eff.org/issues/terms-of-abuse
Third party – A “party” or entity that is anything other than the user or the company. For the purposes of this methodology, third parties can include government organizations, courts, or other private parties (e.g., a company, an NGO, an individual person). (Note that this is an intentionally broad and inclusive definition.)
Throttling – A blunt form of traffic shaping in which a network operator slows the flow of packets through a network. Mobile operators may throttle traffic to enforce data caps. (Updated July 10, 2015)
For more information, see: Open Signal, “Data throttling: Why operators slow down your connection speed,” http://opensignal.com/blog/2015/06/16/data-throttling-operators-slow-connection-speed/
Transmission – The movement of data packets through a network.
Traffic shaping – Adjusting the flow of traffic through a network. This can involve conditionally slowing certain types of traffic. Traffic shaping can be used for network management purposes (e.g., prioritizing VoIP traffic ahead of normal web traffic to facilitate real-time communication) or for reasons that counter net neutrality principles (e.g., intentionally slowing video traffic to dissuade users from using high-bandwidth applications). (Updated July 10, 2015)
Users – This includes people who post or transmit the content online as well as those who try to access or receive the content.
User data – Content or non-content data about users and their communications (see definitions of “content” and “non-content” for more details). Note that indicators P9-P11 use the term “user data” to match the language used in companies’ “transparency reports” regarding third-party requests for information about users. The rest of this methodology uses the term “user information,” as defined below, when referring to information a company has pertaining to a specific user.
User-generated signals – Many companies allow users to “opt-out” of tracking by setting an array of company-specific cookies. If a user deletes cookies in order to protect privacy, they are then tracked until they re-set the “opt-out” cookie. Furthermore, some companies may require a user to install a browser add-on to prevent tracking. These two common scenarios are example of users being forced to use signals which are company-specific; and therefore do not count. Rather, a user-generated signal comes from the user and is a universal message that the user should not be tracked. The primary option for user-generated signal today is the “Do Not Track” header (covered above), but this wording leaves the door open to future means for users to signal they do not want to be tracked.
User Information — Any data which is connected to an identifiable person, or may be connected to such a person by combining datasets or utilizing data-mining techniques. As further explanation, user Information is any data which documents a user’s characteristics and/or activities. This information may or may not be tied to a specific user account. This information includes, but is not limited to, personal correspondence, user-generated content, account preferences and settings, log and access data, data about a user’s activities or preferences collected from third parties either through behavioral tracking or purchasing of data, and all forms of metadata. User Information is never considered anonymous except when included solely as a basis to generate global measures (e.g. number of active monthly users). For example, the statement, ‘Our service has 1 million monthly active users,’ contains anonymous data, since it does not give enough information to know who those 1 million users are.
Whistleblower program – This is a program through which company employees can report any alleged malfeasance they see within the company, including issues related to human rights. This typically takes the form of an anonymous hotline and is often the responsibility of a chief compliance or chief ethics officer.