The current IBOR variants are good but do not go far enough. There are other types of control or monitoring outside of the agreements listed above. Specifically:
-
IPv4 and IPv6 addresses (or whatever may supersede them) are used (agreement or not) to identify PCs and/or users. For instance, this is how one form of banning works on the chans. You've seen it other places too. The very large address space of IPv6 brings with it the capability to permanently uniquely all machines and people.
-
MAC addresses are used, and rightfully required, at the electrical level of networks to identify and route messages to the correct destination. However some software allows users to specify or randomly generate a MAC address at will; this is a good thing and should be required of operating system and device vendors. Likewise, cell phone IMEI and other identifiers must be able to be altered at will.
-
"Fingerprinting": Software has a means to identify individual people by a "browser fingerprint", "HTML5 canvas", and other techniques. Please see https:// panopticlick.eff.org for more information.
-
Randomly generated identifiers as described above should be as truly random or pseudo-random as possible. It's not enough to alter a non-significant portion of an identifier and call it "different" when in fact it might still serve to identify the same person or device, or group of persons or devices.
-
This is not necessarily of complete list. Geeks, marketers, and agencies might know of other techniques. Any technique, existing or new, must comply to the same rules of the IBOR to the full extent that they can.
I propose that the IBOR include concepts and words for people to alter, at will, any form of identification or enumeration used in any way on the internet.
The above are implemented at a technical level and are easy to code and test. This is distinct from and complementary to the right to be forgotten.
Further, any form of identification history must be erased from systems. Providers must not store the IMEIs, MACs, fingerprints, etc, that each user or device has used in the past. This includes backup facilities.