PRIVACY & ETHICS — Main Statement (Draft v0.1)

Playful rigor: build → perform → document → iterate. People first, always.

Maintainer: Ben (maker, artist, STEAM educator)
Status: Working draft
Last updated: 2025-09-16

Canonical source: PRIVACY_ETHICS.md
Last synced: 2025-09-16


0. Plain-Language Summary (TL;DR)


1. North Star

I build tools, scenes, and learning environments where other people create. My ethics follow that purpose: reduce harm, increase agency, share knowledge, and design systems that support equitable participation. I align with the free software movementfree as in freedom to study, modify, share, and use—and I operate in the spirit of Kent’s 10 rules as a craft ethos of clarity, humility, and responsibility in making.


2. Scope

This statement covers:

Note: Specific projects carry addenda with precise data-flows, risks, and micro-copy. Project ethics never weaken any principle here; they may strengthen them.


3. Principles

  1. Human dignity is inviolable. People are not datasets. No biometric identification or surveillance by default. Detection-only when possible.
  2. Equity is a system requirement. I design for the margins first and audit for disparate impacts.
  3. Consent is an interface. Opt-in, affirmative, revocable, time-bounded, and contextual. Consent UX is plain-language and visible.
  4. Data minimization. If I don’t need it, I don’t collect it. If I must collect it, I keep it short-lived and secure.
  5. Local first. Prefer on-device processing with no network calls.
  6. Transparency and legibility. Publish assumption ledgers, data-flow diagrams, and change logs.
  7. Right to inspect, correct, and erase. Participants can see what exists about them, fix it, or remove it—fast.
  8. Open knowledge, not open people. I release code, methods, and documentation under free/libre licenses while protecting personal data.
  9. Accountability. Clear roles, audit trails, and incident response. When harm happens, I repair where possible and learn in public.
  10. Proportionality & necessity. Fancy isn’t a justification. Risk must be proportionate to purpose.

4. Definitions


5. Data Practice

5.1 What I avoid

5.2 What I may collect (case-by-case)

5.3 Data lifecycle (default)

Stage Where Default TTL Who can access Notes
Capture On-device (RAM) transient Participant & operator Visible indicators (LED/UI) show capture state.
Process On-device transient Operator No cloud calls; no third-party inference.
Review On-device until decision Participant Buttons: Show me my data · Save · Delete now.
Save (opt-in) Encrypted local storage 30 days (project default) Maintainer TTL set in project addendum; user may set shorter.
Share (opt-in) Controlled repository case-specific Maintainer & participant License and purpose specified; revocable when feasible.
Erase Local + backups immediate Maintainer Erasure receipts logged; backups pruned.

Deletion Controls: Every project includes an obvious “Delete now” control and a post-capture review screen. No auto-save of personal data.


For youth (minors):


7. Safety, Fairness, and Testing


8. Licensing & Knowledge Sharing


9. Governance & Accountability


10. Exhibition & Classroom Norms (Community Covenant)


11. Project Addendum Template (per-project)

Each project includes a PRIVACY-ADDENDUM.md with:

  1. Purpose & benefits
  2. Data categories (exact fields)
  3. Data-flow diagram (camera ➜ RAM ➜ review ➜ save/erase)
  4. Risk register (with likelihood × impact × mitigations)
  5. Consent text (micro-copy as shown to participants)
  6. Retention policy (TTL & erasure path)
  7. Accessibility notes
  8. Contact & appeals

12. Known Limits & Commitments


13. Contact


14. Change Log (excerpt)


Appendix A: Values Cheat-Sheet (for posters/UI)