The next time you do a web search, sign into Facebook, make an online purchase, search Gmail, or write an email to a lover, "someone has invaded your privacy," warned law professor Lori Andrews. In her new book, she proposed that we adopt a Social Network Constitution. Most of us know how everyone from third parties to government agencies are finding ways to track everything we do online and offline, if we post about it, as the boundaries between offline and online privacy become increasingly blurred. The article, “How a simple Gmail search could lead to an invasion of your privacy,” on Business Insider included an interview with Lori Andrews, law professor and director of the Institute for Science, Law and Technology at the Illinois Institute of Technology. Andrews illustrated her point by saying:If over Gmail I say to my sister, ‘I’m thinking about getting a divorce,’ I could be offered less-good credit cards because people going through a divorce are less likely to pay their credit card bills. Google a medication for a friend or elderly relative, and people think you’ve got the disease.Regarding how third parties can misinterpret the data from our social networking pages or web searches, Andrews said, “Organizations are telling life insurance companies, ‘Don’t get a blood or urine test; that’s costly. Look at the person’s social network page.’ If someone is an avid reader the notion is they’re too sedentary. But people read on a treadmill! Actual research shows that people who read a lot are less likely to get Alzheimer’s.”She pointed out how a writer doing research might “Google” unusual topics and entire criminal cases have been built on web searches. (Surely you’ve at least disabled saving your Google web history and clear your cache when you close the browser?) Her example of how misinterpreted data could be damning included, as a mystery writer, she has searched the web for “the ingredients of date rape drugs.” Every writer has probably conducted some sort of research that could be misjudged and potentially come back to bite us as the boundaries between our offline and online selves increasingly becomes blurred.Andrews has a new book, I Know Who You Are and I Saw What You Did. On her site, she gives many more examples of how “virtually every interaction a person has in the offline world can be tainted by social network information.” Attorneys use Facebook and social media to vet jurors; some employers and universities ask for social network passwords. Government agencies monitor social networks and what you say online may eventually come back to bite you. While it may seem unethical, social media ‘private’ data is fair game for e-discovery in court. As an example, Andrews mentioned a “badly-injured woman who brought a products liability lawsuit in New York and was told by the judge that, since she was smiling in her Facebook photos, she couldn’t be that badly hurt.” Andrews wants to help show “how people can fight back when what they post on social networks is used against them.” She believes that one of the key elements in how to “protect the privacy of your digital self” is to adopt this Social Network Constitution:1. The Right to Connect. 2. The Right to Free Speech and Freedom of Expression. 3. The Right to Privacy of Place and Information. 4. The Right to Privacy of Thoughts, Emotions and Sentiments. 5. The Right to Control One’s Image. 6. The Right to Fair Trial. 7. The Right to an Untainted Jury. 8. The Right to Due Process of Law and the Right to Notice. 9. Freedom from Discrimination. 10. Freedom of Association.Kirkus Reviews wrote that Andrews’ principles to “govern our lives online” would “protect against police searches of social networks without probable cause, require social networks to post conspicuous Miranda-like privacy warnings and set rules for the use or collecting of user information.” Andrews’ version of an online constitution focuses more on privacy than the anti-SOPA inspired Digital Bill of Rights in which digital citizens have:1. The right to a free and uncensored Internet. 2. The right to an open, unobstructed Internet. 3. The right to equality on the Internet. 4. The right to gather and participate in online activities. 5. The right to create and collaborate on the Internet. 6. The right to freely share their ideas. 7. The right to access the Internet equally, regardless of who they are or where they are. 8. The right to freely associate on the Internet. 9. The right to privacy on the Internet. 10. The right to benefit from what they create.Regardless of if you agree with the Social Network Constitution, keep in mind that the next time you do a web search, sign into Facebook, make an online purchase, or write an email to a lover, “someone has invaded your privacy,” warned law professor Lori Andrews.Image Credit: Google, opensourcewayLike this? Here’s more posts:Mind’s Eye surveillance to watch, identify and predict human behavior from videoMachines alter election votes: Hacking voting machines so easy that Grandma can do itHow to use Bing Maps for ‘fun’ geo-stalkingBig Brother Surveillance Secrets Have Practically Outlawed PrivacyCoca-Cola hacked by Chinese and kept it a secretDeanonymizing You: I know who you are after 1 click online or a mobile callMicrosoft renames former Metro apps to ‘Windows 8 Store’ then ‘Windows Store’ appsSurveillance State: From Inside Secret FBI Terrorist Screening Room to TrapWire TrainingSocial media surveillance helps the government read your mindMicrosoft provides fusion center technology & funding for surveillanceYou + Big Data = Not Anonymous; Microsoft develops Differential Privacy for everyone Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe