Government Technology

Personal Computing: Who's Storing Your Words?

January 28, 2008 By

One of the oldest online maxims is "You own your own words." If only it were that simple.

This maxim comes from the pre-Internet explosion days when computer bulletin board systems were how most people communicated online. It was coined by the founder of the popular service The WELL, Stewart Brand, to try to place responsibility for what posters posted on them and not on him in case of libel disputes.

But it has also been interpreted to mean that nobody else but you should copy and reuse your words online unless they have your permission to do so, even though Brand himself opposed this copyright interpretation of what he wrote in his early WELL members agreement.

Fortunately, others have also agreed with this broader interpretation of what others can do with your words. But not everybody.

When you put up a Web site or blog or participate in Internet discussions, you may think that your words, whether they're hasty or wise, will gradually fade away over time. But Internet archive systems exist that in all likelihood are preserving them long term.

The best-known Web archive service is the Wayback Machine, part of a larger effort called the Internet Archive. If you've put up a Web site or blog then later had second thoughts and taken it down, chances are it's preserved through the Wayback Machine.

This free service has been taking snapshots of the Web at various points in time since 1996, with an astonishing 85 billion pages currently archived.

Archiving is all about redundancy, and the content of the Wayback Machine are mirrored, appropriately enough, at the New Library of Alexandria in Egypt. The original Library of Alexandria, founded by the Greek rulers of Egypt around 300 BC, was designed to be the repository of all the world's knowledge.

If you don't want your words preserved for posterity, the Wayback Machine lets you opt out. The service offers detailed directions on how to remove previous versions of your site from its archive and prevent it from making archives in the future.

Another well-known archive service is Google Groups, previously called Deja News and before that DejaViews. Google Groups is a Web interface to Usenet, the worldwide system of hundreds of thousands of online discussion groups. People can participate in these discussions through the Web, through their e-mail program, or through a specialized Usenet program.

The Google Groups Web site is most useful in letting you search for and join specific discussion groups as well as search for current and old posts of yours and others about specific subject matter, with archives of posts going back to 1981. Google Groups provides means to remove your previous posts from its archive and to prevent it from archiving future posts, but as with the Wayback Machine you have to take matters into your own hands.

To remove your posts from the Google Groups archive, you have to create a free account with it, and it's best to do so using the same e-mail address you used for the posts you want deleted. You can have it delete posts you made with an old e-mail address you know longer have, but this is more cumbersome. For details, read "

| More


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
McAfee Enterprise Security Manager and Threat Intelligence Exchange
As a part of the Intel® Security product offering, McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight advanced threats. You get the situational awareness, actionable intelligence, and instantaneous speed to immediately identify, respond to, and proactively neutralize threats in just milliseconds.
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
View All

Featured Papers