Pre-Sale Discount Buy DRoL Tokens Now

Privacy Policy: Current vs. Future State

As part of our ongoing efforts to create enforceable digital property rights and data financialization within a prosperous knowledge economy, we present a comparison of our current privacy policy with our envisioned future state under Digital Rule of Law (DRoL) and the Data Liquidity Protocol.

Why We Are Making This Change

The digital landscape is rapidly evolving, and with it, the need for more robust, transparent, and enforceable legal agreements that empower users with true control over their digital assets. Digital Rule of Law represents a significant step forward in this regard, offering:

  • Enhanced Governance: A decentralized governance structure that ensures all participants have a voice and stake in the ecosystem.
  • Advanced Security & Integrity: State-of-the-art cryptographic measures to protect data integrity and privacy.
  • Enforceable Data Property Rights: Expanded rights for data owners, including data portability, erasure, and control.

What This Means for You

This side-by-side comparison is designed to illustrate how our privacy and data control practices will evolve to incorporate more sophisticated cryptographic measures, clearer legal frameworks, and enforceable data property rights. By adopting Digital Rule of Law, we aim to pioneer new standards in data protection, financialization, and multi-party data governance.

Aspect Current State: Privacy Policy Future State: DFF Privacy Policy under DRoL
Introduction Focuses on respecting privacy and complying with laws. Emphasizes commitment to privacy and security within Digital Rule of Law and the Data Liquidity Protocol framework, leveraging advanced cryptographic technologies that enforce data owner controlled data contracts at the file level.
Information Collection Divides information into “voluntarily provided” and “automatically collected.” Utilizes portable personas as portable identities with data contract controlled data products to manage shared personal information, technical data, and Data Liquidity Protocol information, providing comprehensive personalization while also enabling data owner control of all shared information and data.
Use of Information Lists purposes such as providing services, marketing, and analytics. Focuses on compliance with the Digital Rule of Law, facilitating secure transactions, and ensuring protocol interactions with advanced cryptographic measures that ensure data owners understand and can control all data uses.
Legal Basis Implied through legitimate reasons for processing. Explicitly states consent, contract, and legal obligation as bases for processing, supported by enforceable legal frameworks and data contracts with privacy preserving proofs, and consent revocation.
Data Sharing Mentions sharing with affiliates, service providers, and legal authorities. Manages sharing through portable personas and data contract controlling data products, ensuring compliance with Data liquidity Protocol standards and secure, transparent data exchanges that preserve data ownership and control.
Data Security General statement on protecting information with commercially acceptable means. Highlights robust security measures, encryption, and compliance with Data Liquidity Protocol, utilizing advanced cryptographic security, integrity, and intelligent envelopes orchestrated by data contracts for enhanced protection, integrity, and intelligence.
User Rights Covers access, correction, and non-discrimination. Includes access, rectification, erasure, data portability, and emphasizes enforceable user rights within the legal framework, ensuring users have comprehensive transparency and control over their data.
Data Retention Retains information as long as necessary for the purposes outlined. Similar approach but within the context of legal and protocol obligations, ensuring data is retained securely and compliantly through the data contract terms within the portable persona and data contract controlled data products that lock when not needed by the data owner.
Children’s Privacy States no targeting of children under 13. Automatically includes terms that comply with children’s privacy laws in portable personas and data contracts, ensuring secure and compliant interactions involving minors.
Third-Party Disclosure Lists various third parties including service providers and legal entities. Similar approach but within the context of legal and protocol obligations, ensuring data is retained securely and compliantly through the data contract terms within the portable persona and data contract controlled data products always controlled by the data owner.
Cookies Mentions use of cookies for tracking and personalization. Uses Verifiable Credentials (VCs) and Decentralized Identifiers (DIDs) within the portable persona to manage identities and preferences securely and privately.
Business Transfers Information may be transferred in case of business transitions. Similar approach but within the context of legal and protocol obligations, ensuring data is retained securely and compliantly through the data contract terms within the portable persona and data contract controlled data products always controlled by the data owner.