Difference between revisions of "Work Flow"

From Responsible Data Wiki
Jump to: navigation, search
(Wishlist)
Line 14: Line 14:
 
* “snap chat” / data preservation app that would allow metadata to disappear upon transmission and would be safe for the transmitter, receiver, and the subject
 
* “snap chat” / data preservation app that would allow metadata to disappear upon transmission and would be safe for the transmitter, receiver, and the subject
  
- Chain of Evidence app that would keep record of any changes made to any file
+
* "chain of evidence" app that would keep record of any changes made to any file
  
- “default” app that scans devices for default settings to identify and explain in clear terms their security implications
+
* “default” app that scans devices for default settings to identify and explain in clear terms their security implications
  
- app to hide your location (puts false information into metadata)
+
* app to hide your location (puts false information into metadata)
  
- “sneaky” lock features for phone/camera/computer/devices such that an officer couldn’t tell that the screen was locked, or it would show a false “camera roll” of images
+
* “sneaky” lock features for phone/camera/computer/devices such that an officer couldn’t tell that the screen was locked, or it would show a false “camera roll” of images

Revision as of 21:01, 8 April 2015

Tools/best practices

- Pre-production data checklist (ethical)

- What data should I/ should I not collect?

- How and when should I transmit data?

Wishlist

  • Diagrams of possible and customizable workflow models (for different kinds of media, resources, timeframes, etc.) and shared action plans for collaborators
  • “snap chat” / data preservation app that would allow metadata to disappear upon transmission and would be safe for the transmitter, receiver, and the subject
  • "chain of evidence" app that would keep record of any changes made to any file
  • “default” app that scans devices for default settings to identify and explain in clear terms their security implications
  • app to hide your location (puts false information into metadata)
  • “sneaky” lock features for phone/camera/computer/devices such that an officer couldn’t tell that the screen was locked, or it would show a false “camera roll” of images