Journal Express, Knoxville, IA

CNHI/SE Iowa

September 5, 2013

Why we post nothing about our daughter online

I vividly remember the Facebook post. It was my friend's 5-year-old daughter "Kate," (a pseudonym) standing outside of her house in a bright yellow bikini, the street address clearly visible behind her on the front door. A caption read "Leaving for our annual Labor Day weekend at the beach," and beneath it were more than 50 likes and comments from friends - including many "friends" that Kate's mom barely knew.

The picture had been uploaded to a Facebook album, and there were 114 shots just of Kate: freshly cleaned and swaddled on the day of her birth . . . giving her Labradoodle a kiss . . . playing on a swing set. But there were also photos of her in a bathtub and an awkward moment posing in her mother's lacy pink bra.

I completely understood her parents' desire to capture Kate's everyday moments, because early childhood is so ephemeral. I also knew how those posts would affect Kate as an adult, and the broader impact of creating a generation of kids born into original digital sin.

Last week, Facebook updated its privacy policy again. It reads in part: "We are able to suggest that your friend tag you in a picture by scanning and comparing your friend's pictures to information we've put together from your profile pictures and the other photos in which you've been tagged." Essentially, this means that with each photo upload, Kate's parents are, unwittingly, helping Facebook to merge her digital and real worlds. Algorithms will analyze the people around Kate, the references made to them in posts, and over time will determine Kate's most likely inner circle.

The problem is that Facebook is only one site. With every status update, YouTube video, and birthday blog post, Kate's parents are preventing her from any hope of future anonymity.

That poses some obvious challenges for Kate's future self. It's hard enough to get through puberty. Why make hundreds of embarrassing, searchable photos freely available to her prospective homecoming dates? If Kate's mother writes about a negative parenting experience, could that affect her ability to get into a good college? We know that admissions counselors review Facebook profiles and a host of other websites and networks in order to make their decisions.

There's a more insidious problem, though, which will haunt Kate well into the adulthood. Myriad applications, websites and wearable technologies are relying on face recognition today, and ubiquitous bio-identification is only just getting started. In 2011, a group of hackers built an app that let you scan faces and immediately display their names and basic biographical details, right there on your mobile phone. Already developers have made a working facial recognition API for Google Glass. While Google has forbidden official facial recognition apps, it can't prevent unofficial apps from launching. There's huge value in gaining real-time access to view detailed information about the people with whom we interact.

The easiest way to opt-out is to not create that digital content in the first place, especially for kids. Kate's parents haven't just uploaded one or two photos of her: They've created a trove of data that will enable algorithms to learn about her over time. Any hopes Kate may have had for true anonymity ended with that ballet class YouTube channel.

Knowing what we do about how digital content and data are being cataloged, my husband and I made an important choice before our daughter was born. We decided that we would never post any photos or other personally identifying information about her online. Instead, we created a digital trust fund.

The process started in earnest as we were selecting her name. We'd narrowed the list down to a few alternatives and ran each through domain and keyword searches to see what was available. Next, we crawled through Google to see what content had been posted with those name combinations, and we also looked to see if a Gmail address was open.

We turned to KnowEm.com, a website I often rely on to search for usernames, even though the site is primarily intended as a brand registration service. We certainly had a front-runner for her name, but we would have chosen something different if the KnowEm results produced limited availability or if we found negative content associated with our selection.

With her name decided, we spent several hours registering her URL and a vast array of social media sites. All of that tied back to a single email account, which would act as a primary access key. We listed my permanent email address as a secondary - just as you'd fill out financial paperwork for a minor at a bank. We built a password management system for her to store all of her login information.

On the day of her birth, our daughter already had accounts at Facebook, Twitter, Instagram, and even Github. And to this day, we've never posted any content.

All accounts are kept active but private. We also regularly scour the networks of our friends and family and remove any tags. Those who know us well understand and respect our "no posts about the kid" rule.

When we think she's mature enough, we'll hand her an envelope with her master password inside. She'll have the opportunity to start cashing in parts of her digital identity, and we'll ensure that she's making informed decisions about what's appropriate to reveal about herself, and to whom.

It's inevitable that our daughter will become a public figure, because we're all public figures in this new digital age. I adore Kate's parents, and they're raising her to be an amazing young woman. But they're essentially robbing her of a digital adulthood that's free of bias and presupposition.

Webb writes a column about data for Slate. She's the head of Webbmedia Group, a digital strategy agency, the author of "Data, A Love Story" and the co-founder of Spark Camp.

               

 

 

1
Text Only
CNHI/SE Iowa
  • American sunscreens need an upgrade

    The last time a new sunscreen ingredient came on the U.S. market, the Y2K bug was threatening to destroy our way of life. Intel had just introduced the Pentium III processor, featuring an amazing 500 MHz of computing power.

    April 24, 2014

  • 20140424-AMX-COFFEE24.jpg Coffee growers' prayers for rain met with threat of deluge

    Brazil's drought made arabica coffee this year's best-performing commodity. Now, farmers are facing a downpour that is once more threatening crops.

    April 24, 2014 1 Photo

  • Celebrity quack moms are a terrible influence on everyday parents

    On April 15, the actress Alicia Silverstone released a book called "The Kind Mama: A Simple Guide to Supercharged Fertility, a Radiant Pregnancy, a Sweeter Birth, and a Healthier, More Beautiful Beginning." It's chock-full of attachment parenting lessons and dangerous misinformation.

    April 24, 2014

  • 0425 OTT eagle stock photo Mahaska Co. man accused of killing bald eagle NEW SHARON — A Mahaska County man faces federal charges after allegedly beating a bald eagle to death and decapitating it. Jason John Thomas was arrested in New Sharon after being indicted by a federal grand jury. He is accused of killing the eagle i

    April 24, 2014 1 Photo

  • Affirmative action ruling challenges colleges seeking diversity

    The U.S. Supreme Court's support of Michigan's ban on race-based affirmative action in university admissions may spur colleges to find new ways to achieve diversity without using racial preferences.

    April 23, 2014

  • A 'wearable robot' helps her walk again

    Science is about facts, numbers, laws and formulas. To be really good at it, you need to spend a lot of time in school. But science is also about something more: dreaming big and helping people.

    April 23, 2014

  • Cuba is running out of condoms

    The newest item on Cuba's list of dwindling commodities is condoms, which are now reportedly in short supply. In response, the Cuban government has approved the sale of expired condoms.

    April 23, 2014

  • The waffle taco's biggest enemy isn't McDonald's. It's consumer habits.

    Gesturing to Taco Bell, Thompson said McDonald's had "not seen an impact relative to the most recent competitor that entered the [breakfast] space," and that new competition would only make McDonald's pursue breakfast more aggressively.

    April 23, 2014

  • Screen Shot 2014-04-22 at 4.42.47 PM.png VIDEO: Leopard attacks crowd in India

    A leopard caused panic in the city of Chandrapur when it sprung from the roof of a house and charged at rescue workers.

    April 22, 2014 1 Photo

  • The top 12 government programs ever

    Which federal programs and policies succeed in being cost-effective and targeting those who need them most? These two tests are obvious: After all, why would we spend taxpayers' money on a program that isn't worth what it costs or helps those who do not need help?

    April 22, 2014