{"id":5819,"date":"2014-06-25T15:30:43","date_gmt":"2014-06-25T15:30:43","guid":{"rendered":"http:\/\/insideintercom.io\/?p=5819"},"modified":"2021-01-13T15:16:06","modified_gmt":"2021-01-13T15:16:06","slug":"privacy-implications-for-product-design","status":"publish","type":"post","link":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/","title":{"rendered":"Privacy implications for product design"},"content":{"rendered":"<p class=\"opening_paragraph\">What do you consider private? Are you happy for your phone number to be searchable online? Your age? Your home address? Your current location? Your browser history? Your tax return?<\/p>\n<p>Most of us will reply with a mix of yes and no answers, although some will answer negatively to all of the above. But undoubtedly your view of what\u2019s private and what you are comfortable sharing online has evolved over time.<\/p>\n<h3>The tyranny of real names<\/h3>\n<p>Less than a decade ago we hid behind avatars and handles for online communications but Facebook managed to change the paradigm with its <a href=\"https:\/\/www.facebook.com\/help\/112146705538576\">real names policy<\/a>. The hard line on real identity was a huge differentiator for Facebook.<\/p>\n<p>It generated <a href=\"http:\/\/paulbernal.wordpress.com\/2012\/09\/21\/facebook-snitchgate\/\">controversies<\/a> and when Google+ followed suit it\u00a0even sparked\u00a0the &#8220;<a href=\"https:\/\/www.eff.org\/deeplinks\/2011\/12\/2011-review-nymwars\">nymwars<\/a>&#8221; but overall it was a ballsy move that worked for a young company building a user base. People signed up because they knew they could share their lives just with their friends. The tactic was so successful, aided and abetted by the spread of Facebook\u2019s social sign-in to other services, that real names rapidly became the norm on the web.<\/p>\n<div class=\"post_image_wrapper\"><img decoding=\"async\" src=\"https:\/\/intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Sign-ups.jpg\" alt=\"\" \/><\/div>\n<p>Google also bases its social efforts, and supporting advertising business model, around real identities. At least in part because it has been quicker to monetize ads around users search and email, Google has faced more criticism for its data collection practices. During his time as CEO Eric Schmidt said online anonymity <a href=\"http:\/\/www.huffingtonpost.com\/2010\/08\/10\/eric-schmidt-privacy-stan_n_677224.html\">was dangerous<\/a>, but was at pains to stress that anonymity is not the same thing as privacy, which deserves to be protected. A European court ruled recently that Google shouldn\u2019t display search results which are deemed to be no longer relevant and could in fact damage a person\u2019s reputation, which will force it to make hard and messy decisions about where the line is drawn between individual privacy and the public interest.<\/p>\n<p>Mark Zuckerberg now admits the pendulum may have swung too far. \u201cIf you\u2019re always under the pressure of real identity, I think that is somewhat of a burden,\u201d he <a href=\"http:\/\/www.businessweek.com\/articles\/2014-01-30\/facebook-turns-10-the-mark-zuckerberg-interview#p3\">told BusinessWeek<\/a> in an interview to mark Facebook\u2019s tenth birthday.<\/p>\n<p>The simple narrative is that there has been a backlash amongst web users who don\u2019t want to trade their privacy for \u201cfree\u201d services. The revelations by Edward Snowden about state-sponsored surveillance cemented that view. The reality looks more complex however. If you look at the blunt metric of searches, we&#8217;re less interested in privacy than we have ever been.<\/p>\n<p><script src=\"\/\/www.google.com\/trends\/embed.js?hl=en-US&amp;q=privacy,+surveillance&amp;cmpt=q&amp;content=1&amp;cid=TIMESERIES_GRAPH_0&amp;export=5&amp;w=600&amp;h=380\"><\/script><\/p>\n<p>While privacy and surveillance have been a huge focus for the global media in the last year &#8211; in large part because of the threat presented to a free press &#8211; these concerns are not necessarily reflected in the general population. While admittedly a crude measure the Google Trends graph above shows searches for \u201cprivacy\u201d and \u201csurveillance\u201d actually peaked back in April 2004 and interest has been steadily waning since.<\/p>\n<h3>A short history of privacy<\/h3>\n<p>Zuckerberg\u2019s pendulum analogy is apt. The concept of privacy is not fixed but has ebbed and flowed throughout history. In the 17th and 18th centuries there was little or no privacy in homes &#8211; it wasn\u2019t unusual for a number of family members, and even house guests, to share the same bed.<\/p>\n<p>In the eighteenth century letters sent through the US mail system were routinely opened in transit with\u00a0no guarantee of confidentiality. That came in 1782 with an Act of Congress although the technology which gave effect to it, sealed envelopes, weren\u2019t invented until the middle of the following century.<\/p>\n<p>Privacy as a legal right only began to gain currency in 1890 with an article, \u201c<a href=\"https:\/\/www.jstor.org\/stable\/1321160?seq=1#metadata_info_tab_contents\">The Right to Privacy<\/a>\u201d, in the Harvard Law Review which reviewed case law to date and concluded privacy was a distinct right of citizens and deserved protection. The authors, Wealthy Harvard graduates Samuel Warren and Louis Brandeis, were reacting to what Warren felt were intrusive reports of the wedding of his daughter in Boston newspapers, and parts of their argument echo some recent commentary about online privacy.<\/p>\n<div class=\"post_image_wrapper\"><img decoding=\"async\" src=\"https:\/\/intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Quote.jpg\" alt=\"\" \/><\/div>\n<p>Now we\u2019ve progressed to the point privacy is considered a fundamental human right, enshrined in the UN Declaration of Human Rights, and numerous other pieces of local and international legislation. At a minimum most states provide constitutional protection for the sanctity of the home and secrecy of communications.<\/p>\n<h3>Privacy as a business model<\/h3>\n<p>The focus on privacy and online tracking presents clear opportunities for the creation of new products and services. Here&#8217;s two significant themes that have emerged.<\/p>\n<h2 id=\"1-private-actions\">1. Private actions<\/h2>\n<p>Following Snowden&#8217;s revelations about state surveillance online there has been an intense focus on privacy and what data is being collected as we move around the web, and that has had profound effects for the design of products.<\/p>\n<p>Launching a search engine, even one providing answers rather than links to web pages, seemed crazy in 2008, in the face of Google&#8217;s dominance, but <a href=\"https:\/\/duckduckgo.com\/\">DuckDuckGo<\/a> founder Gabriel Weinberg was clever enough to listen to users. Based on feedback from early users, <a href=\"http:\/\/www.fastcolabs.com\/3026698\/inside-duckduckgo-googles-tiniest-fiercest-competitor\">by his own admission<\/a> the \u201ctech heavy\u201d crew at Hacker News\/Reddit who are privacy minded, Weinberg decided strict privacy practices could become his unique selling point. DuckDuckGo doesn&#8217;t store users&#8217; search history or pass tracking cookies to advertisers.<\/p>\n<div class=\"post_image_wrapper\"><img decoding=\"async\" src=\"https:\/\/intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Duck-chart.jpg\" alt=\"\" \/><\/div>\n<p>DuckDuckGo enjoyed steady growth based on that reputation but as this graph shows, it doubled the amount of queries it handled in the days after Snowden\u2019s revelations.<\/p>\n<p>Similarly a whole host of companies &#8211; Hushmail, Lavaboom, Silent Circle, and Countermail &#8211; have made a business out of secure, private, web-based email. The takeaway? If there is a vocal group of users expressing dissatisfaction with the way incumbants are handling identity, privacy or security then that&#8217;s something they might be willing to pay you for.<\/p>\n<h2 id=\"2-anonymity-and-ephemerality\">2. Anonymity and ephemerality<\/h2>\n<p>Disruptive messaging apps also spotted an opportunity in Facebook and Google\u2019s big data practices.<\/p>\n<p>What\u2019s App offered flexible ad-free messaging allowing groups to quickly form and dissolve. One of its <a href=\"http:\/\/blog.whatsapp.com\/529\/Setting-the-record-straight\">unique selling points<\/a> pre-Facebook acquisition was the minimal amount of data collected about users. Snapchat started off with picture messaging but once it started to gain traction the popularity of its self destructing messages saw a rush to embrace ephemeral messaging by app makers. Social network Path recently made all its messages temporary &#8211; they disappear after 24 hours &#8211; and cited privacy as the logic for the move, while Tinder has introduced a Snapchat like feature for sharing pictures with your matches which disappear after 24 hours.<\/p>\n<div class=\"post_image_wrapper\"><img decoding=\"async\" src=\"https:\/\/intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Apps-chart-names.png\" alt=\"\" \/><\/div>\n<p>Apps like <a href=\"http:\/\/whisper.sh\/\">Whisper<\/a> and <a href=\"https:\/\/www.secret.ly\/\">Secret<\/a> have added the logical next layer &#8211; anonymity &#8211; although it&#8217;s far from clear how absolute privacy is on those platforms. Their Achilles Heel is that they have access to your contacts and\/or location and require you to identify yourself to them. Whether they can protect that information from court orders, government snoops or malicious hackers remains untested.<\/p>\n<p>Through the prism of the simple linear narrative of privacy the popularity of these apps is simply explained. But arguably rather than privacy the most important ability they offer is a flexibility, a loose coupling, that is anathema to the real names, tagged photos and fixed relationships of Facebook.<\/p>\n<h3>Growing trust and privacy<\/h3>\n<p>It\u2019s easy, particularly post-Snowden, to fall into the trap of thinking the Internet is just a threat to privacy. But there are so many examples of how it has facilitated private communications for everything from <a href=\"http:\/\/ijoc.org\/index.php\/ijoc\/article\/viewArticle\/1246\">political organisation<\/a> during the Arab Spring to couples getting together who may never have met otherwise.<\/p>\n<div class=\"post_image_wrapper\"><img decoding=\"async\" src=\"https:\/\/intercom.com\/blog\/wp-content\/uploads\/2014\/06\/trust.jpg\" alt=\"\" \/><\/div>\n<p>We\u2019ve also seen a huge rise in trust between strangers which has been made possible due to online reputation systems. We\u2019ve rapidly moved from sharing information &#8211; our experience at a restaurant or hotel, a review of a new product &#8211; to sharing our physical stuff. People are now opening up their homes to strangers (<a href=\"https:\/\/www.airbnb.com\/\">Airbnb<\/a>), driving them places in their cars (<a href=\"https:\/\/www.lyft.com\/\">Lyft<\/a>) and even dropping pets off at their homes (<a href=\"http:\/\/www.rover.com\/\">Rover<\/a>).<\/p>\n<h3>A technology problem waiting to be solved<\/h3>\n<p>Privacy has evolved and changed in modern society, and will continue to do so, while technology is usually playing catch-up with what society deems correct. Remember how sealed envelopes were invented decades after the US authorities enshrined the right to private communications in law?<\/p>\n<p>The pendulum of privacy swings both ways for products. Depending on your viewpoint, it can be a flaw or a feature, and there&#8217;s usually a product on both sides. Twitter lets the whole world see your messages, while WhatsApp promises to let you speak in private unsearchable groups. Instagram shows the whole world your photos forever, where Snapchat lets you share them temporarily.<\/p>\n<p>Users are increasingly making judgements on which side of the line products fall on. The majority are comfortable trading personal information to use products, but could easily turn against this as a standard practice. The more information gathered and the more personal the nature of it, the higher the stakes.<\/p>\n<hr \/>\n<p>Main\u00a0image:\u00a0<a href=\"https:\/\/www.flickr.com\/photos\/g4ll4is\/\">g4ll4is<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What do you consider private? Are you happy for your phone number to be searchable online? Your age? Your home address? Your current location? Your browser history? Your tax return? Most of us will reply with&hellip;<\/p>\n","protected":false},"author":84,"featured_media":5839,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"category":[5],"tags":[56,54,131,62,132],"coauthors":[350],"class_list":["post-5819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-product-and-design","tag-facebook","tag-google","tag-privacy","tag-product-management","tag-surveillance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Privacy implications for product design<\/title>\n<meta name=\"description\" content=\"What&#039;s considered private changes over time. But what are the implications of the current focus on privacy and surveillance for product design?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy implications for product design\" \/>\n<meta property=\"og:description\" content=\"What&#039;s considered private changes over time. But what are the implications of the current focus on privacy and surveillance for product design?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/\" \/>\n<meta property=\"og:site_name\" content=\"The Intercom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/intercominc\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-25T15:30:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-13T15:16:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Privacy-Keyboard-370.png\" \/>\n\t<meta property=\"og:image:width\" content=\"370\" \/>\n\t<meta property=\"og:image:height\" content=\"230\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Collins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jaycee001\" \/>\n<meta name=\"twitter:site\" content=\"@intercom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Collins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/\"},\"author\":{\"name\":\"John Collins\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/person\\\/718c61e2ca1798079da935dd3aee0796\"},\"headline\":\"Privacy implications for product design\",\"datePublished\":\"2014-06-25T15:30:43+00:00\",\"dateModified\":\"2021-01-13T15:16:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/\"},\"wordCount\":1503,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/06\\\/Privacy-Keyboard-370.png\",\"keywords\":[\"Facebook\",\"Google\",\"privacy\",\"product management\",\"surveillance\"],\"articleSection\":[\"Product &amp; Design\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/\",\"name\":\"Privacy implications for product design\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/06\\\/Privacy-Keyboard-370.png\",\"datePublished\":\"2014-06-25T15:30:43+00:00\",\"dateModified\":\"2021-01-13T15:16:06+00:00\",\"description\":\"What's considered private changes over time. But what are the implications of the current focus on privacy and surveillance for product design?\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/privacy-implications-for-product-design\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/06\\\/Privacy-Keyboard-370.png\",\"contentUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/06\\\/Privacy-Keyboard-370.png\",\"width\":370,\"height\":230},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/\",\"name\":\"The Intercom Blog\",\"description\":\"Articles and Podcasts on Customer Service, AI and Automation, Product, and more\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\",\"name\":\"The Intercom Blog\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Intercom-logo-sq-black-trans.png\",\"contentUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Intercom-logo-sq-black-trans.png\",\"width\":1000,\"height\":1000,\"caption\":\"The Intercom Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/intercominc\",\"https:\\\/\\\/x.com\\\/intercom\",\"https:\\\/\\\/www.instagram.com\\\/intercom\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/2491343\",\"https:\\\/\\\/www.pinterest.ie\\\/intercom\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJG0MvLP03kyzzAkD-w98aQ\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Intercom_(company)\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/person\\\/718c61e2ca1798079da935dd3aee0796\",\"name\":\"John Collins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4db0024789314263949be876f0685dc2cbc27fcf34abc4eb5d4e5d0a60be5890?s=96&d=mm&r=pg6e3361a0532d70728ba77e0bd8b9caa4\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4db0024789314263949be876f0685dc2cbc27fcf34abc4eb5d4e5d0a60be5890?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4db0024789314263949be876f0685dc2cbc27fcf34abc4eb5d4e5d0a60be5890?s=96&d=mm&r=pg\",\"caption\":\"John Collins\"},\"description\":\"John leads the Content team at Intercom that manages the award-winning Inside Intercom blog, podcast, and books. He brings over 20 years of editorial experience to the team as a former journalist and editor covering technology and business for major publications such as The Irish Times.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/johncollinsireland\\\/\",\"https:\\\/\\\/x.com\\\/jaycee001\"],\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/author\\\/john\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Privacy implications for product design","description":"What's considered private changes over time. But what are the implications of the current focus on privacy and surveillance for product design?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/","og_locale":"en_US","og_type":"article","og_title":"Privacy implications for product design","og_description":"What's considered private changes over time. But what are the implications of the current focus on privacy and surveillance for product design?","og_url":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/","og_site_name":"The Intercom Blog","article_publisher":"https:\/\/www.facebook.com\/intercominc","article_published_time":"2014-06-25T15:30:43+00:00","article_modified_time":"2021-01-13T15:16:06+00:00","og_image":[{"width":370,"height":230,"url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Privacy-Keyboard-370.png","type":"image\/png"}],"author":"John Collins","twitter_card":"summary_large_image","twitter_creator":"@jaycee001","twitter_site":"@intercom","twitter_misc":{"Written by":"John Collins","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/#article","isPartOf":{"@id":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/"},"author":{"name":"John Collins","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/person\/718c61e2ca1798079da935dd3aee0796"},"headline":"Privacy implications for product design","datePublished":"2014-06-25T15:30:43+00:00","dateModified":"2021-01-13T15:16:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/"},"wordCount":1503,"publisher":{"@id":"https:\/\/www.intercom.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Privacy-Keyboard-370.png","keywords":["Facebook","Google","privacy","product management","surveillance"],"articleSection":["Product &amp; Design"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/","url":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/","name":"Privacy implications for product design","isPartOf":{"@id":"https:\/\/www.intercom.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/#primaryimage"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Privacy-Keyboard-370.png","datePublished":"2014-06-25T15:30:43+00:00","dateModified":"2021-01-13T15:16:06+00:00","description":"What's considered private changes over time. But what are the implications of the current focus on privacy and surveillance for product design?","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intercom.com\/blog\/privacy-implications-for-product-design\/#primaryimage","url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Privacy-Keyboard-370.png","contentUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Privacy-Keyboard-370.png","width":370,"height":230},{"@type":"WebSite","@id":"https:\/\/www.intercom.com\/blog\/#website","url":"https:\/\/www.intercom.com\/blog\/","name":"The Intercom Blog","description":"Articles and Podcasts on Customer Service, AI and Automation, Product, and more","publisher":{"@id":"https:\/\/www.intercom.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intercom.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.intercom.com\/blog\/#organization","name":"The Intercom Blog","url":"https:\/\/www.intercom.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2019\/08\/Intercom-logo-sq-black-trans.png","contentUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2019\/08\/Intercom-logo-sq-black-trans.png","width":1000,"height":1000,"caption":"The Intercom Blog"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/intercominc","https:\/\/x.com\/intercom","https:\/\/www.instagram.com\/intercom\/","https:\/\/www.linkedin.com\/company\/2491343","https:\/\/www.pinterest.ie\/intercom\/","https:\/\/www.youtube.com\/channel\/UCJG0MvLP03kyzzAkD-w98aQ","https:\/\/en.wikipedia.org\/wiki\/Intercom_(company)"]},{"@type":"Person","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/person\/718c61e2ca1798079da935dd3aee0796","name":"John Collins","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4db0024789314263949be876f0685dc2cbc27fcf34abc4eb5d4e5d0a60be5890?s=96&d=mm&r=pg6e3361a0532d70728ba77e0bd8b9caa4","url":"https:\/\/secure.gravatar.com\/avatar\/4db0024789314263949be876f0685dc2cbc27fcf34abc4eb5d4e5d0a60be5890?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4db0024789314263949be876f0685dc2cbc27fcf34abc4eb5d4e5d0a60be5890?s=96&d=mm&r=pg","caption":"John Collins"},"description":"John leads the Content team at Intercom that manages the award-winning Inside Intercom blog, podcast, and books. He brings over 20 years of editorial experience to the team as a former journalist and editor covering technology and business for major publications such as The Irish Times.","sameAs":["https:\/\/www.linkedin.com\/in\/johncollinsireland\/","https:\/\/x.com\/jaycee001"],"url":"https:\/\/www.intercom.com\/blog\/author\/john\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2014\/06\/Privacy-Keyboard-370.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts\/5819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/comments?post=5819"}],"version-history":[{"count":0,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts\/5819\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/media\/5839"}],"wp:attachment":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/media?parent=5819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/category?post=5819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/tags?post=5819"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}