Electronic Bill of Rights

Electronic Bill of RightsElectronic Bill of RightsElectronic Bill of Rights

Electronic Bill of Rights

Electronic Bill of RightsElectronic Bill of RightsElectronic Bill of Rights

Empower Your Legal Rights Today

Empower Your Legal Rights TodayEmpower Your Legal Rights TodayEmpower Your Legal Rights Today

Support: Electronic Bill of Rights.

Contact

Empower Your Legal Rights Today

Empower Your Legal Rights TodayEmpower Your Legal Rights TodayEmpower Your Legal Rights Today

Support: Electronic Bill of Rights.

Contact

EBOR- Executive Summary

   

The Need for an Electronic Bill of Rights


For more than 30 years, Big Tech and government have sat at the table—while the paying customer and taxpayer has been excluded. 


Citizens fund the system through purchases and taxes, and empower lawmakers through their votes, only to see those same lawmakers enact and support policies that erode privacy, security, safety, civil liberties, and human rights—while shielding powerful technology interests instead of protecting the public.


This imbalance of power is no longer acceptable. It is time to restore accountability, transparency, and representation.


It is time for an Electronic Bill of Rights.


The rise of global tech addiction, digital colonialism, and cyber-enslavement—driven by exploitative business models rooted in Surveillance Capitalism—has created an urgent need for an enforceable Electronic Bill of Rights (EBOR).


In today’s connected world, personal data is routinely extracted, privacy is systematically eroded, and technology is increasingly weaponized against individuals by the very companies entrusted with their loyalty, patronage, and hard-earned money. What were once tools of empowerment have become instruments of behavioral manipulation, surveillance, and control.

Living “off the grid” is no longer a viable option. 


Smartphones, tablets, PCs, vehicles, wearables, and other connected products are now essential for participation in modern society. These products operate atop global telecommunications and internet infrastructure overseen by government agencies such as the Federal Communications Commission (FCC), the Federal Trade Commission (FTC), and the Department of Homeland Security (DHS)—institutions charged with protecting citizens, consumers, and national security.


Yet these protections have proven insufficient.


Everyday consumer products of necessity have been transformed into continuous surveillance and data-mining systems by multinational corporations—some operating in or aligned with adversarial nations such as China and Russia. These products rely on leaky operating systems—Android, iOS, and Windows—that enable addictive, manipulative, and psychologically invasive technologies. AI-infused applications and chatbots, often designed to exploit human trust through behavioral techniques such as the “Eliza Effect,” further magnify these risks—posing serious harm to adults, professionals, teens, and children alike.


At the same time, governments too often shield these business models through regulatory capture, lobbying, and inaction—prioritizing profits and geopolitical convenience over citizen safety, privacy, and civil liberties. As a result, individuals are no longer treated as citizens or customers, but as expendable data commodities—monetized, manipulated, and exposed to harm.


This symbiotic relationship between governments and surveillance-driven technology corporations must end.


Never before in history have technology developers, platform operators, OEMs, and AI innovators weaponized paid consumer products against their own users at such scale—forcing participation through coercive contracts of adhesion while stripping away data sovereignty, privacy, security, and autonomy.


Without enforceable digital rights, individuals will remain subject to predatory business practices, unchecked surveillance, monopolistic control, and foreign exploitation. The consequences extend far beyond privacy—they represent clear risks to public safety, cybersecurity, national security, and data sovereignty.


The Electronic Bill of Rights establishes a clear, enforceable framework to restore balance in the digital age. It affirms the right of individuals to control their data, devices, and digital lives—free from coercion, exploitation, and opaque surveillance systems. EBOR is designed to protect human dignity while enabling innovation that respects civil liberties and consumer rights.

Governments have a duty to defend their citizens—not merely from physical harm, but from digital exploitation embedded in the very infrastructure of modern life.

This is not an anti-technology movement. 


It is a pro-human, pro-freedom, and pro-security framework for the 21st century.

Only through enforceable digital rights can personal freedom, trust, and sovereignty be preserved in the age of AI, automation, and global surveillance.

EBOR- Framework

  Electronic Bill of Rights Congressional Policy Change Framework

  

Article I: Right to Data Privacy


  • Individuals      shall have the right to control their personal data, including collection,      storage, processing, and distribution.
  • Consent      must be explicit, informed, and revocable at any time.
  • Companies      and organizations must disclose how user data is collected, shared, and      monetized in clear, understandable language—free from technical jargon,      written in plain English (or the applicable primary language of the user),      and easily accessible without requiring excessive navigation or legal      expertise.

  

Article II: Right to Data Security


  • Individuals      have the right to expect robust security measures to protect their      personal information.
  • Companies      must implement end-to-end encryption, multi-factor authentication, and      other security protocols to prevent unauthorized access.
  • Any      data breach must be immediately disclosed to affected individuals and      regulatory bodies.

  

Article III: Right to Digital Anonymity


  • No      individual shall be compelled to disclose personal information beyond what      is necessary for a specific service.
  • Users      shall have the right to browse the internet, communicate, and conduct      transactions anonymously.

  

Article IV: Right to Be Forgotten


  • Individuals      have the right to request the permanent deletion of their data from online      platforms and databases.
  • Companies      must honor deletion requests promptly, barring exceptions for legal or      regulatory obligations.

  

Article V: Right to Opt-Out of Data Monetization


  • Users      shall have the right to opt out of targeted advertising and data-sharing      agreements without being penalized or denied service.
  • Alternative      business models that do not rely on invasive data mining must be      available.

  

Article VIII: Right to Digital Freedom and Free Speech


  • No      entity, public or private, shall unlawfully censor or restrict lawful      digital expression.
  • Content      moderation policies must be transparent, consistently applied, and subject      to independent appeals processes.

  

Article IX: Right to Own and Control Digital Identity


  • Individuals      have the right to control their digital identities, including usernames,      biometric data, and online personas.
  • No      government or corporation shall claim ownership over an individual’s      digital identity.

  

Article X: Right to Decentralized and Open Internet


  • Users      have the right to access a free, open, and decentralized internet without      undue restrictions.
  • Net      neutrality must be upheld to prevent ISPs from prioritizing certain      content over others.
  • Decentralized      technologies must be legally protected to ensure alternatives to      centralized control.

  

Article XI: Right to Protection from Corporate and Foreign Surveillance


  • Companies,      app developers, and multinational corporations shall be banned from      conducting surveillance and data mining on any smartphone, tablet PC,      connected product, or PC supported by Android, iOS, or Windows.

  

Article XII: Right to National and Consumer Security and Safety


  • It      shall be illegal for tech giants to form symbiotic relationships with      foreign tech companies beholden to oppressive governments or adversarial      nations.
  • No      corporation shall be permitted to distribute intrusive, addictive, or      dangerous operating systems, apps, or AI-infused products developed under      the control of oppressive governments.
  • It      shall be illegal to share developer tools, AI development tools, or      AI-driven chips (GPUs) with companies under the control of oppressive      governments or adversarial nations.

  

Article XIII: The Abolishment of Web Scraping, Web Crawling, and Web Tracking


  • Web      scraping is data theft and shall be illegal without explicit consent of      the website owner or content creator.
  • It      shall be illegal to train AI on scraped copyrighted or original works      without consent.
  • AI      shall not impersonate any individual (likeness, biometric data, or voice      print) without explicit consent.
  • Individuals      shall retain the right to sell access to their likeness.
  • Web      tracking shall be illegal—no individual shall be tracked by websites,      crawlers, bots, or any tracking technology.

  

Article XIV: The Right to Accountability from Tech Giants


  • Developers,      executives, and board members shall be held accountable for harm,      addiction, or death caused by their products.
  • Section      230 protections shall be abolished.
  • Tech      companies shall be accountable as editors if they censor or suppress      legitimate news and press.

  

Article XV: The Right to Safe, Secure, and Private Preinstalled Apps & Technology


  • No      operating system may include uncontrollable preinstalled surveillance or      data mining technology.

  

Article XVI: The Right to Safe Technology


  • No      app, social media platform, or AI product may contain addictive or      manipulative technologies designed to exploit users.
  • Platforms      must disclose bot use, and no platform may use bots to deceive.
  • Governments      and intelligence agencies shall be banned from creating consumer accounts.
  • Consumer      protection laws must be enforced; tech lobbying must be transparent.

  

Article XVII: The Right to Influencer and Bot Transparency


  • Influencers,      corporations, and agencies must disclose use of bots.
  • Deceptive      marketing via automation shall be illegal.
  • Malicious      bot use for disinformation, election interference, or propaganda shall be      illegal.

  

Article XIX: Freedom from Addictive, Divisive, and Manipulative Technology


  • Developers      shall not provide technology designed to hijack user behavior or induce      manipulation.
  • Such      technologies, deemed more harmful than subliminal advertising, shall be      banned.

  

Article XX: Freedom from Government & Tech Collusion


  • Governments      are banned from colluding with tech firms to suppress rights, liberties,      free speech, press, or privacy.
  • Developers      are banned from hiring former government officials for political      influence.
  • Governments      may only hire former tech employees for legitimate national security      purposes—not for political suppression.

  

Article XXI: Right to Data Collection Transparency


  • Companies      must disclose all data collection, sharing, and monetization practices.
  • Users      may request a copy of their data and demand deletion within 7 business      days.
  • Third-party      data collection must be disclosed, including from data brokers.

  

Article XXII: Freedom from Indiscriminate Surveillance and Data Mining


  • Indiscriminate      surveillance and non-essential data collection shall be banned.
  • Collection      of confidential, legal, medical, biometric, or classified information      shall be prohibited.

  

Article XXIII: Freedom from Forced Participation by Way of Legal Agreements


  • Contracts      of adhesion forcing consumers to accept surveillance or data mining to use      purchased products shall be banned.

  

Article XXIX: Freedom to Control Technology and Connected Products


  • Consumers      must have full control over their devices and be able to delete unwanted      software or apps.

  

Article XXX: The Right to Transparent Legal Language & App Permissions


  • All      legal language must be concise and transparent.
  • Consumers      must have full control over app permissions.
  • All      data collection and app permissions must be disclosed in one place.

  

Article XXXI: Ban on Teen Acceptance of Legal Agreements


  • No      minor under 18 shall be permitted to accept legal agreements for digital      services.

  

Article XXXII: Right to Transparent AI and Algorithmic Accountability


  • AI      and algorithms must be transparent, explainable, and free from      discrimination.
  • Users      must be able to contest AI-driven decisions.
  • Dangerous,      addictive, manipulative, or exploitative algorithms shall be illegal.

  

Article XXXIII: Right to Fair Terms and Conditions


  • End-user      agreements must be concise, plain-language, and overseen independently.
  • One-way      contracts of adhesion shall be banned.
  • Consumers      rejecting terms must still be able to use purchased products.

  

Article XXXIV: Anti-Trust Protections & Internet Centralization

  • Surveillance      for competitive advantage shall be banned.
  • Tech      companies shall not monopolize OS, apps, media, or AI via app stores or      preinstalled software.
  • Tech      lobbying by former government officials shall be banned.

  

Article XXXV: National, Internet, and Technology Safety


  • Symbiotic      relationships between domestic tech firms and adversarial      nation-controlled companies shall be banned.
  • Sharing      of developer tools, AI tools, or chips with adversarial nations shall be      prohibited.

  

Article XXXVI: The Right to Sue and Hold Tech Giants Accountable


  • Consumers      shall have the right to sue for predatory or dangerous products.
  • Tech      firms and their executives may be held criminally and civilly liable.
  • Section      230 protections shall be abolished.

The Global Surveillance Architecture

The Silicon Valley Matrix- Has You!

 

Executive Summary


Introduction to the Global Surveillance Architecture


The next time you click “I Agree” to use your smartphone, an AI service, social media platform, or mobile app, pause and ask yourself a simple question:


Do you truly understand what you are agreeing to?


After reviewing the architecture that follows, ask an even more important question:


Are you giving informed and knowledgeable consent at all?


The first and most foundational layer of the Silicon Valley Matrix exploits a critical imbalance: the knowledge gap between technology developers and users. 


Complex systems, opaque code, and dense legal language are used to secure compliance—not understanding.


These agreements—commonly referred to as contracts of adhesion—are presented as mandatory, non-negotiable terms for products people depend on to function in modern society. 


Yet they rarely disclose the full scope of surveillance, cross-platform data mining, behavioral profiling, or third-party access operating beneath the surface.


This raises a fundamental question of legality and ethics:


Can consent be valid when material facts are hidden from the paying customer or product owner?


If users are unaware of the true number of entities monitoring them, the extent of data extraction, or the downstream uses of their personal information—including profiling, monetization, and manipulation—then consent is not informed. It is coerced.


Understanding this knowledge gap is the starting point for understanding the global surveillance architecture—and why enforceable digital rights are essential in the modern age.


 EBOR equips you with the knowledge needed to close the “knowledge gap,” empowering you to take informed action—by engaging your elected representatives and demanding real change to reclaim your privacy, data and financial sovereignty, civil liberties, and fundamental human rights. 


Global Surveillance Architecture


Modern surveillance does not exist as a single technology, platform, or application. It operates as a multi-layered global architecture—an interconnected system of technical, legal, financial, political, and intelligence mechanisms that extend far beyond operating systems, apps, devices, and AI.


This architecture—referred to as the Silicon Valley Matrix—now exceeds 20 distinct layers of surveillance, data mining, behavioral manipulation, and monetization, many of which are invisible to users, regulators, and lawmakers.


A System, Not a Product


Contrary to public perception, surveillance today is not limited to:


  • Smartphones
     
  • Apps
     
  • Social media
     
  • AI chatbots
     
  • Advertising trackers
     

These are merely entry points.


Behind them exists a cross-platform, cross-company, cross-border surveillance system that enables multiple private entities, data brokers, intelligence services, advertisers, financial platforms, and governments to monitor, profile, influence, and monetize individuals—often simultaneously—through a single intrusive app or AI-infused service.


Key Architectural Characteristics (High Level)


At a systemic level, the global surveillance architecture includes:


  • Cross-Platform Surveillance & Data Mining
    Individuals are tracked across devices, operating systems, apps, browsers, cloud services, payment platforms, and networks—creating unified behavioral and identity profiles that no single privacy setting can control.
     
  • SDK Piggybacking & Hidden Permission Layers
    Apps embed third-party and fourth-party software development kits (SDKs) that operate beyond visible permissions—allowing multiple undisclosed entities to collect data, issue command strings, and monitor users covertly, including children.
     
  • Legal Coercion via Contracts of Adhesion
    Surveillance is enforced not by consent, but by coercion—through non-negotiable Terms of Service and Privacy Policies that legally compel participation while stripping users of meaningful choice or remedy.
     
  • Regulatory Capture & Non-Enforcement Layers
    Existing consumer protection and privacy laws are routinely weakened, ignored, or selectively enforced due to lobbying, regulatory capture, and political pressure—allowing known harmful practices to persist.
     
  • Circumvention of Privacy Laws
    Frameworks such as GDPR and CCPA focus narrowly on data handling disclosures, not on:
     
    • Behavioral manipulation
       
    • Cross-entity data fusion
       
    • AI inference
       
    • Psychological exploitation
       
    • Covert SDK surveillance
       
    • Real-time bidding (RTB) markets
       
    • Intelligence access by proxy
      As a result, compliance often masks exploitation rather than preventing it.
       
  • Automated Real-Time Bidding (RTB) & Digital Access Markets
    Individuals are auctioned in milliseconds to advertisers, political actors, data brokers, and unknown third parties—creating a digital access market where attention, behavior, emotion, and influence are bought and sold at scale.
     
  • Addictive & Psychological Manipulation Layers
    AI-infused apps, social media platforms, games, and chatbots are engineered to exploit cognitive vulnerabilities—using addiction loops, emotional triggers, and the “Eliza Effect” to drive dependency and behavioral compliance.
     
  • Intelligence & Government Surveillance by Proxy
    Rather than direct surveillance, governments increasingly gain access through private platforms—using commercial apps, AI systems, and data brokers as intermediaries to bypass constitutional, legal, and jurisdictional limits.
     
  • Automated Bots, Fraud, and Information Warfare
    AI-driven bots are deployed to:
     
    • Defraud consumers
       
    • Inflate engagement
       
    • Manipulate markets
       
    • Spread misinformation and disinformation
       
    • Shape public opinion
      Often within the same platforms that claim to protect users.
       
  • Geofencing, Economic Profiling & Digital Discrimination
    Location, ZIP code, income level, demographics, and behavior are used to:
     
    • Adjust pricing
       
    • Limit access
       
    • Shape information exposure
       
    • Target manipulation
      Creating invisible digital class systems.
       
  • Crypto, Digital Currency & Financial Surveillance Layers
    Payment systems, digital wallets, crypto platforms, and tokenized assets increasingly integrate identity tracking, behavioral analytics, and programmable controls—extending surveillance into financial sovereignty.


 

Why Existing Laws Fail


Current privacy and consumer protection laws were not designed to address:


  • Multi-entity surveillance chains
     
  • Behavioral inference and AI profiling
     
  • SDK-level exploitation
     
  • Psychological harm and addiction
     
  • Surveillance enforced through contracts
     
  • Intelligence access via private platforms
     
  • Automated manipulation and bidding systems
     

As a result, citizens are left legally exposed, digitally coerced, and structurally exploited—even while companies claim compliance.


The Consequence


Adults, professionals, teens, and children are no longer treated as citizens or customers—but as data assets, behavioral products, and targets of monetization.


This is not a privacy failure alone.


It is a civil liberties crisis, a consumer protection failure, a cybersecurity risk, and a national and human security issue.


 

Why the Electronic Bill of Rights Is Necessary


The Electronic Bill of Rights (EBOR) exists to confront this reality at the architectural level.


EBOR is designed to:


  • Expose the full surveillance stack
     
  • Close legal and technical loopholes
     
  • Restore meaningful consent
     
  • Enforce data and device sovereignty
     
  • Protect adults, children, and future generations
     
  • End exploitation by design—not just by disclosure
     

Without enforceable digital rights, the Silicon Valley Matrix will continue to expand unchecked.


EBOR is not anti-technology.


It is anti-exploitation, pro-human, and essential for freedom in the digital age.


Thank You,


Rex M. Lee

Security Advisor/Tech Journalist

End Surveillance Capitalism!

Threats Posed by Surveillance Capitalism

There is a drastic need for an Electronic Bill of Rights due to threats posed by Surveillance Capitalism.


Topics- Electronic Bill of Rights Policy Framework


Below are topics that are addressed within the current EBOR congressional policy framework.


As technology changes, there will be more topics to added. 


Global Data Brokers – Alphabet (Google), Apple, Meta, ByteDance, and Microsoft

Today’s tech giants operate as global data brokers, competing in the trillion-dollar information trafficking industry—driven by surveillance-based business practices and targeted advertising.


Surveillance Capitalism
  

These corporations have adopted Surveillance Capitalism as their core business model—built on the systematic exploitation of product owners, including teens, children, and business professionals.


Exploitation Through Connected Products of Necessity 

  

Consumers of smartphones, tablet PCs, and other connected products supported by Android OS, Apple iOS, or Microsoft Windows are exploited for profit—at the direct expense of their privacy, safety, civil liberties, human rights, and data sovereignty.

  

The Rise of Cyber-Enslavement & Digital Colonialism Through Connected Products of Necessity


Essential connected products have been weaponized by OS, app, social media, and AI developers—transforming everyday devices, that cost money, into tools of surveillance and data mining that enable the developers to exploit product owners, including children, as uncompensated information-producing slaves.


Global data brokers, operating under the guise of operating system and AI infused app developers, are extracting the world’s most valuable resource—information—from nearly every nation, while governments fail to recognize that their citizens have been reduced to cyber-slaves. This information is harvested and sold without compensation to the individuals or the countries from which it originates. This is the very definition of Digital Colonialism. 


Non-Enforcement of Existing Consumer and Child Protection Laws


The Federal Trade Commission, The Federal Communications Commission, and state attorney generals, consistently fail to enforce existing privacy, protection, and telecommunication laws.


The failure to enforce existing laws leaves consumers, children, and business professionals vulnerable to predatory business practices, addictive technologies, harmful and deadly products, and unauthorized surveillance and data mining by way of tech and telecom products supported by telecom and internet infrastructure regulated by the FCC.

   

Government Oppression by Proxy – Tech and Government Collusion


Through collusion with tech giants, governments, including oppressive regimes, use connected products of necessity—supported by Android OS, Apple iOS, and Microsoft Windows—as proxy tools to erode human rights and civil liberties, including privacy, security, safety, free speech, and freedom of the press.

  

Leaky Operating Systems, Legal Malware, and Manipulative AI Chatbots
 

Android OS, Apple iOS, and Microsoft Windows support intrusive, addictive, manipulative, and dangerous apps, social media platforms, and AI chatbots—intentionally designed as legal malware.


These technologies incorporate brain hijacking techniques and exploit the Eliza Effect (humanization of AI), posing significant threats and harm to end users, especially children.

  

Cybersecurity Threats – Indiscriminate Surveillance and Data Mining


Indiscriminate surveillance and data mining conducted through Android OS, Apple iOS, and Microsoft Windows—as well as the apps, social media platforms, and AI they support—pose significant cybersecurity threats to businesses. 


Sensitive business data, including intellectual property (IP), is collected alongside highly confidential personal information by all developers involved, including those from adversarial nations such as China and Russia.

  

Legalized Espionage by Proxy – Tech Conflict of Interest


Tech giants like Alphabet, Meta, ByteDance (China), and Tencent (China) compete across global industries, yet governments permit these multinational corporations to conduct mass surveillance and data mining on individuals—including business professionals—for profit. 


These companies gather business intelligence across sectors by surveilling billions through smartphones, computers, and connected products powered by Android OS, Apple iOS, and Windows OS. 


These tech giants also collect sensitive data on corporate executives, employees, and board members—individuals who use their operating systems, apps, and AI who work for companies in direct competition with the very tech firms harvesting their information, this is the definition of legalized corporate espionage.


Unrestricted and Tech-Based Hybrid Warfare Waged Through Connected Products
 

The erosion of privacy and security in smartphones, PCs, servers, and other connected products has empowered governments—including oppressive regimes—to conduct unrestricted and tech-based hybrid warfare. 


This includes psychological and cognitive warfare, election interference, and the global dissemination of propaganda and misinformation through AI-infused apps, social media platforms, and AI chatbots.


These forms of warfare target all internet users—including teens and children.

  

Foreign Surveillance, Data Mining, and Espionage, Enabled by U.S. Tech Giants


Through their control over the global distribution of AI-infused apps, social media platforms, and AI chatbots, Google, Apple, and Microsoft are responsible for the global distribution of highly addictive apps, social media platforms, and AI chatbots developed in China and Russia. 


These U.S. tech giants also share intellectual property—including AI-related IP—with developers in these countries, who must tailor their products to operate on Android OS, Apple iOS, or Microsoft Windows, thereby facilitating foreign surveillance, data mining, and espionage by proxy.


Foreign Influence Operations Backed by Lobbyists and Law Firms
 

Tech companies from China and Russia conduct foreign influence operations through powerful law firms and lobbyists—many of whom are former elected officials and presidential advisors, regardless of political affiliation (Democrat, Republican, or Independent).

  

Loss of Privacy, Security, Safety, Civil Liberties, and Data Sovereignty

One-way contracts of adhesion—embedded in operating systems, apps, social media platforms, and AI—strip users of privacy, security, safety, civil liberties, human rights, and data sovereignty.


Loss of Copyrighted Content and Intellectual Property by Proxy

Governments enable tech giants to legally steal copyrighted content and intellectual property (IP) under the guise of AI innovation and unregulated surveillance-based business practices.


Forced Participation Through Predatory Contracts of Adhesion

Consumers are coerced into accepting predatory contracts of adhesion—tantamount to cyber-enslavement agreements—that require users to forgo privacy, security, safety, civil liberties, and data sovereignty simply to use connected products powered by Android OS, Apple iOS, or Microsoft Windows.


Government-Regulated Infrastructure Exploited for Unauthorized Surveillance
 

The Federal Communications Commission (FCC) enables surveillance and data mining by OS, app, social media, and AI developers by allowing their technologies to operate over telecommunications and internet infrastructure regulated for public use.


Legalized Oppression and Exploitation of Consumers and Children by Proxy
 

Governments have failed to protect consumers—including teens, children, and business professionals—from legalized oppression, exploitation, and cyber-enslavement via essential connected products.


Monopoly Control and Centralization of Internet Access

Alphabet, Microsoft, and Apple dominate global access to internet trade and commerce through control of the operating system market while controlling the global development and distribution of AI infused apps, social media, and AI chatbots all supported by surveillance technologies and business practices rooted in Surveillance Capitalism.


The Need for an Electronic Bill of Rights


Without comprehensive legislative reform—such as an Electronic Bill of Rights that directly addresses Surveillance Capitalism—there will be no privacy, security, data sovereignty, safety, or true civil liberties for anyone who connects to the internet via Android, iOS, or Windows.

 

Your privacy, your freedom, your future—it’s time to reclaim them through meaningful legislation rooted in an Electronic Bill of Rights.


Join the movement for private, secure, and safe technology and telecommunications by taking action today.


Contact us for a copy of the congressional policy change proposal that incudes the framework for an Electronic Bill of Rights.


We can help you contact your representatives, file consumer and constituent complaints, and submit the formal policy change proposals to your congressional representatives.


Please use the form below to contact us.


Thank You,


Rex M. Lee

Security Advisor/Tech Journalist

Join the Movement to Establish and EBOR

We Will Help You Voice Your Concern to Your Representatives- Contact Us to Learn More

Attach Files
Attachments (0)

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Electronic Bill of Rights

Contact Rex M. Lee at: Rlee@ElectronicBillofRights.com

Customer Reviews

Electronic Bill of Rights

Copyright © 2025 Electronic Bill of Rights - All Rights Reserved.

Powered by