Electronic Bill of Rights is Free Information for Tech Safety and Privacy Advocates

Electronic Bill of Rights- Digital Human Rights

Electronic Bill of Rights- Digital Human RightsElectronic Bill of Rights- Digital Human RightsElectronic Bill of Rights- Digital Human Rights

Electronic Bill of Rights- Digital Human Rights

Electronic Bill of Rights- Digital Human RightsElectronic Bill of Rights- Digital Human RightsElectronic Bill of Rights- Digital Human Rights

Contact EBOR

Electronic Bill of Rights (EBOR)

 

The Electronic Bill of Rights (EBOR) Mission Statement


 

My name is Rex M. Lee, and I am a security advisor to governments, an OTA app and platform developer, and a former advisor to Congress for tech hearings (2017–2021) involving Meta, Google, ByteDance, and other social media platform developers.


It is important to understand that I am not a paid advocate, nor am I seeking donations or financial support.  As a matter of fact, I never charged the U.S. government, nor any other government money for my counsel.


My mission is straightforward: to help end technology addiction, harm, and death while restoring privacy, security, and safety associated with the use of phones, computers, connected products, AI, apps, social media, chatbots, and other connected products and services.


I believe that tech addiction and the loss of privacy can be significantly reduced by enforcing existing consumer and child protection laws regulated by the Federal Communications Commission (FCC), Federal Trade Commission (FTC), and State AGs, along with banning:

  • Surveillance Capitalism
  • Addictive Design
  • Targeted Advertising
  • Contracts of Adhesion (predatory terms of service)
  • Surveillance and Data Mining by Any Company


AI infused tech addiction and the loss of privacy are not being solved through new laws, lawsuits, congressional hearings, books, or documentaries.  


Books and documentaries are great for awareness, but only addressing addictive design will not resolve the root cause; targeted advertising rooted in Surveillance Capitalism.  


For more than 15 years, we have been trapped in the same feedback loop: hold a congressional hearing, file lawsuits, and create new laws, yet, AI infused tech addiction, exploitation, surveillance, manipulation, AI indoctrination, and the erosion of privacy have only accelerated while more adults, teens, and children are harmed or killed.  


Advertisers need to be held accountable for funding tech addiction, without advertising money, there is no need for additive and manipulative technologies.

I am simply advocating for the elimination of Surveillance Capitalism, addictive design practices, targeted advertising, and contracts of adhesion that force consumers to participate in predatory data collection and surveillance-based business models.

 

I am not opposed to advertising, social media, AI, chatbots, or mobile applications. I believe advertisers, AI companies, social media platforms, chatbot providers, and app developers can achieve the same level of success and profitability they enjoy today through honest, transparent, and safe business practices.


I also believe that personal data is the sovereign property of the individual who generates it. As such, individuals should have full ownership and control over their Name, Image, Likeness, and Data (NILD), much like professional athletes, entertainers, and other public figures who retain legal rights over their personal brand and identity.


Contact Rex M. Lee- Free Information


 If you are a privacy or technology safety advocate interested in addressing the root causes of tech addiction and the loss of privacy by eliminating Surveillance Capitalism, I encourage you to contact me.


I would be happy to share more than 12 years of research into operating systems, mobile applications, social media platforms, AI systems, chatbots, and other digital technologies. 


My research also examines the growing risks associated with civil-military fusion programs, including the potential weaponization of personal information by governments and other actors for surveillance, influence, intelligence, and security-related purposes.


Read the enclosed sections below for more history and information.

Contact Rex M. Lee

Electronic Bill of Rights - History

 

The Electronic Bill of Rights- Congressional Policy Proposal


 I have over 35 years of experience in telecommunications and technology, including serving as a senior executive. As a result, when I write or speak about technology, telecommunications, and cybersecurity, I do so from firsthand experience. 


I helped launch the world’s largest legal hacking firm, Houdinisoft, which was adopted by Verizon, AT&T, T-Mobile, and other global mobile network operators, as well as used for digital forensics.


I specialize in threats posed by Surveillance Capitalism, tech addiction, AI indoctrination, tech-based hybrid warfare, and civil-military fusion programs in Russia, China, and the United States.


In 2017, after advising Congress regarding the Facebook-Cambridge Analytica scandal, I was asked by Senator Ted Cruz’s office to author a congressional policy change proposal for digital rights from a developer’s perspective rather than from tech lobbyists working for Big Tech.


My initial digital rights proposal targeted the root cause of tech addiction, harm, and loss of privacy. It centered on banning Surveillance Capitalism, which would restore privacy, security, and safety to consumers of smartphones, computers, and connected products. Yet, my proposal was rejected by the U.S. Senate because there is no profit in solving the problem—especially by addressing targeted advertising, which fuels tech addiction and the loss of privacy.


I stopped advising Congress after the Instagram-Facebook whistleblower hearing involving Meta product designer Frances Haugen because the hearings became little more than puppet shows for grandstanding lawmakers who publicly claim they want to solve the problem while simultaneously taking money from the U.S.-China tech lobby. After each hearing, it became business as usual in Silicon Valley.

Aside from the harms caused by tech addiction, there are numerous other harms driven by targeted advertising rooted in Surveillance Capitalism (see harms below).


Addressing tech addiction alone will not restore privacy, security, or safety to consumers of smartphones, computers, and connected products powered by Android, iOS, or Windows.


Advertisers are equally—if not more—responsible for fueling tech addiction, manipulation, harm, and death among end users of AI-infused apps, social media platforms, and AI chatbots, including adults, teens, and children.

 

As a matter of fact, an entire multi-billion-dollar privacy industry has emerged in which so-called tech safety and privacy advocates make millions of dollars through books, documentaries, paid network TV and podcast appearances, interviews, and speaking fees. 


While these efforts may raise awareness, many of these advocates refuse to fully endorse banning Surveillance Capitalism because this predatory, exploitative, and harmful business model fuels the very industry from which they profit. 


Many of these so-called advocates, refuse to hold advertisers responsible for fueling the tech addiction, harm, and death, while refusing to hold Google, Apple, or Microsoft responsible for distributing highly addictive AI infused apps, social media platforms, gaming platforms, and AI chatbots that induce AI indoctrination, known as The Eliza Effect.


Without the continuation of Surveillance Capitalism, many of these paid advocates and attorneys would no longer have careers built around addressing the symptoms of a problem they refuse to eliminate at its root cause, Surveillance Capitalism.

 


Learn More by Contacting Rex M. Lee

Harms Caused by Surveillance Capitalism & Loss of Privacy

Executive Summary- Understanding Harms Caused by Targeted Advertising Rooted in Surveillance Capitalism


The Electronic Bill of Rights (EBOR) is not a theoretical framework—it is grounded in existing federal law.

 

Before individuals can understand how they are harmed, they must first understand how the surveillance capitalism business model operates through essential telecom and technology products—such as smartphones—that are necessary for modern life and come at a cost.


It is also critical to understand which devices and platforms—including those supported by Android, iOS, and Windows—serve as the primary vectors for surveillance, as well as the scale and scope of data extraction from those devices and services.


The following section explains how this process works, including:


  • How data is collected, aggregated, and analyzed 
  • The volume and types of highly confidential information involved 
  • How that data is used, shared, and monetized 
  • The legal mechanisms enabling these practices, including contracts of adhesion (terms of service) that condition access to essential products and services on acceptance of broad data collection policies


It is not just privacy that is at stake—it is the systematic exploitation of individuals for profit at the expense of their privacy, security, and safety, as well as their data and financial sovereignty, biological autonomy (including biometric and genetic information), civil liberties, and fundamental human rights by way of products and services that cost money.


Always-On Surveillance and Data Mining Nodes: Connected Telecom and Technology Products


Modern connected devices—including smartphones, tablet PCs, connected home products, personal computers, servers, wearable technologies, security and environmental systems, connected vehicles, AI-enabled toys, and other digital services—form a pervasive and continuous data-collection environment.


These devices and platforms operate as always-on data collection nodes, enabled by operating systems such as Android, iOS, and Windows, as well as AI-infused applications, social media platforms, and chatbots.


Within this ecosystem:


  • Data is continuously collected, transmitted, and analyzed 
  • User behavior, location, interactions, and preferences are monitored 
  • Multiple layers of software and services contribute to ongoing data aggregation 


This model is primarily supported by data-driven business practices centered on targeted advertising, often described as surveillance-based monetization.


Participation in this ecosystem is frequently governed by non-negotiable terms of service (contracts of adhesion), where access to essential products and services is conditioned on acceptance of broad data collection and use policies.

 

Indiscriminate Data Collection Across Global Technology Platforms — Leaky Operating Systems and “Legal Malware”


Data collected from individuals—including teens, children, and business professionals—is often facilitated through what can be described as “leaky operating systems” (Android, iOS, and Windows). These systems support a broad ecosystem of AI-infused applications, social media platforms, and AI chatbots that are designed to drive engagement and data collection at scale.


Within this framework, many of these applications and platforms function in ways that may be characterized as “legal malware”—software that operates within the bounds of the predatory contract of adhesion (terms of service) while enabling extensive data extraction, behavioral tracking, and monetization.


These operating systems and their associated ecosystems underpin essential connected telecom and technology products—including smartphones, computers, and other digital services—that are now required for participation in modern life.


 The surveillance and data mining being conducted by Alphabet (Google), Apple, Microsoft, Meta, TikTok USDS JV, ByteDance (China), Wildberries (Russia), and others is "indiscriminate" meaning they are collecting from individuals, businesses, and government agencies is the following buckets of highly confidential information (over 5,000 data points):


  • Personal, Business, Employment, Financial, and Legal
  • Medical, Health, and Biometric
  • Location, Geofence, and Motion
  • Behavioral 
  • Sensitive User Data (Texts, Emails, Attachments, Calendar, Contacts, Phone/Messaging Logs, Accounts, Audio Recordings of End User, Photos, Videos, Files, and Other Specific user Data)
  • External Information Connected to Host Device- Thumb Drive, External Hard Drive, Computer, TV, Connected Vehicle, any Connected Source
  • Indiscriminate Audio, Video, and Physical Surveillance on Personal and Business Activities 24x7/365 Days Per Year

 

Digital DNA Profiling and Data Exploitation


All data collected from individuals—including teens and children—is aggregated into identifiable digital profiles, often referred to as Digital DNA. These profiles represent detailed behavioral, personal, and usage patterns tied to a specific individual.


Operating system providers and developers—including those behind Android, iOS, and Windows—enable the creation of these identifiable user profiles through system-level data access, application activity, and integrated services. These profiles are then leveraged for monetization, primarily through targeted advertising, as well as other commercial uses, including data sharing and resale.


In addition to data collected directly from device owners and end users, operating system providers, app developers, and AI platforms may also acquire and combine user profile data from third-party sources. This results in a layered aggregation model, where multiple entities contribute to and exploit increasingly comprehensive user profiles.


The outcome is a data ecosystem in which:


  • Individuals are continuously profiled across devices and platforms 
  • Data is combined, enriched, and redistributed among multiple parties 
  • Both users and paying customers may be subject to profiling and monetization 
  • Sensitive behavioral and personal data becomes a commercial asset
  • Highly addictive AI infused apps, social media platforms, and AI chatbots programmed to induce "The Eliza Effect" (AI indoctrination) are used to ensure maximum engagement

 

The widespread use of highly addictive and manipulative technologies embedded in AI-infused applications, social media platforms, and AI chatbots has contributed to a growing global technology addiction crisis. This crisis affects adults, teens, and children alike and has been associated with increases in anxiety, depression, violence, online bullying, self-harm, public discord, political polarization, and suicide.


At some point, the question needs to be asked:


"If addiction, harm, mental health decline, exploitation, and the loss of life among teens and children are not the line at which government, advertisers, and Big Tech change their business models, then what is?" 

 

Google's Global AdTech Infrastructure and User Profiling


Individuals who access the internet through devices supported by Android, iOS, or Windows operating systems are subject to large-scale data collection and profiling within Google's global advertising ecosystems supported by the AdTech AI-Quantum Control Platform (Core) that distributes targeted ads to billions of people around the world 24x7/365 days per year.


Google's ecosystem—often described as the AdTech Core and ecosystem of micro cores—aggregate user data to enable the delivery of targeted advertising across international markets. Through a network comprised of over 35,000 data brokers, developers, advertisers, PR agencies, developers, and platform providers, user information can be distributed and utilized across multiple jurisdictions worldwide, including those in China and Russia.


This includes regions with varying regulatory standards, raising important questions about:


  • Where user data is processed and stored 
  • Who has access to that data across global markets 
  • How data flows between commercial ecosystems and international entities 
  • The extent to which user profiles are shared, licensed, or monetized globally
  • Targeted ads are sent to a user anywhere in the world through multiple digital signatures that include GPS, geofence, nearfield communication (NFC tags), Bluetooth, Wi-Fi access points, cellular tower triangulation, and bio metric data that includes facial recognition and voice prints


These platforms operate through interconnected advertising infrastructures—sometimes referred to as “micro AdTech ecosystems”—that support real-time bidding, audience targeting, and behavioral profiling at planetary scale.


Through biometric data, individuals can potentially be identified and located—even without carrying their personal device—using technologies such as facial recognition and voice pattern analysis. These capabilities can operate through nearby connected devices, cameras, or other networked products within close proximity via Google's AdTech Core and global ecosystem, for advertisers this is the greatest system every created, for military use it is the greatest targeting system on the planet.


Weaponized AdTech Technologies: The Rise of Global Civil–Military Fusion


Global advertising technology (AdTech) infrastructures—originally developed for commercial targeting—are increasingly being examined in the context of national security and information operations.


Large-scale AdTech platforms and their surrounding ecosystems enable capabilities such as:


  • Behavioral profiling at population scale 
  • Real-time data aggregation and analysis 
  • Precision targeting of individuals and groups 
  • Content amplification and distribution across digital channels 


These same capabilities may be leveraged beyond commercial use cases. Governments and state-aligned actors have been documented utilizing data-driven platforms and digital ecosystems for purposes including:


  • Intelligence gathering and surveillance 
  • Information operations, including misinformation and propaganda 
  • Influence and behavioral shaping at scale 
  • Strategic espionage and data mining and analytics 
  • Targeted digital campaigns across populations 
  • Blackmail


This convergence of commercial data infrastructure and government use cases is often described as civil–military fusion, where technologies developed in the private sector are adapted for national security and strategic operations.


Chinese and Russian civil military programs including those in the U.S. involving Palantir Technologies Gotham Intelligence and Military Core pose massive threats to privacy, security, and safety to everyone, including teens and children, connected to the internet by way of any device or services supported by Android, iOS, or Windows.


Summary of Harms Caused by Targeted Advertising Rooted in Surveillance Capitalism


Tech addiction cannot be compared to alcohol, drug, or tobacco addiction.


Addictive brain hijacking, manipulative advertising, and AI indoctrination combined equals military grade brainwashing technology far more dangerous than subliminal advertising technology banned in the 20th century.


Addictive design is equally harmful to adults as it is to teens and children and should be banned.


There are also far more harms caused by targeted advertising rooted in Surveillance Capitalism, below is a summary of the main harms addressed by the Electronic Bill of Rights:


  • Tech Addiction – Addictive design patterns are intentionally engineered to maximize engagement, dependency, and compulsive use associated with brain hijacking and manipulative advertising technology coupled with AI indoctrination technologies.
  • AI Indoctrination (The Eliza Effect)- AI infused apps are intentionally designed to cause the Eliza Effect which is the humanization of the chatbot to use for consumer, political, and ideological indoctrination.
  • Psychological Harm – Digital platforms have been linked to anxiety, depression, loneliness, self-harm, violence, and suicide.
  • Cognitive Manipulation – Algorithms can shape opinions, behaviors, and decision-making without meaningful awareness or consent.
  • Tech-Based Hybrid Warfare – Governments, intelligence agencies, and political actors use digital platforms to influence, manipulate, and target populations.
  • Government Surveillance by Proxy – Partnerships between governments and technology platforms can enable large-scale surveillance and data collection.
  • Weaponized Consumer Products – Smartphones, computers, and connected devices have evolved into always-on surveillance and data-extraction platforms.
  • Forced Participation – Consumers must often accept non-negotiable terms of service to use products they already purchased.
  • Deceptive Trade Practices – Complex legal agreements and fragmented disclosures undermine informed consent and transparency.
  • Covert Piggybacking & Cross-Platform Surveillance – Multiple companies may monitor and collect data through shared code embedded within a single application.
  • Financial Exploitation – User data generates significant profits for corporations while consumers receive little transparency, control, or compensation.
  • Digital DNA Profiling – Thousands of data points can be combined into highly detailed profiles containing personal, business, medical, biometric, and location information.
  • Weaponized Digital Profiles – Personal data profiles can be used for behavioral targeting, surveillance-based pricing, discrimination, and social scoring.
  • Loss of Privacy, Civil Liberties & Human Rights – Continuous monitoring and data collection erode personal autonomy, confidentiality, and fundamental freedoms.
  • Loss of Data & Financial Agency – Centralized technology platforms control access to digital services, limiting user choice, competition, and ownership of personal data.
  • Internet Centralization – A small number of companies control the operating systems, app ecosystems, AI platforms, and digital infrastructure that power modern life.
  • Consumer Oppression & Cyber-Enslavement – Individuals pay for products and services that simultaneously monitor, profile, and monetize them.


Conclusion


Together, these harms highlight the need for an Electronic Bill of Rights (EBOR) to restore privacy, security, safety, civil liberties, human rights, data ownership, and informed consent in the digital age.

 


Learn More by Contacting Rex M. Lee

Non-Enforcement of Existing Protection Laws

 

Non-Enforcement of Existing Consumer, Child Protection, Privacy, and National Security Laws Beyond the Scope of Section 230


For decades, telecommunications, consumer protection, child safety, and privacy laws have established clear legal obligations regarding the protection of user data, confidentiality, and the lawful use of communications infrastructure.


Yet today, consumers—including minors—are routinely subjected to pervasive surveillance and data mining through smartphones, applications, operating systems, and connected products, despite the existence of these established legal safeguards.
These practices are often justified through terms of service and privacy policies. However, EBOR asserts that contractual consent does not override statutory law, particularly when services are essential to modern life. 


Key Insight- “You cannot contract your way out of federal law.” 

Telecommunications infrastructure—including wireless, landline, fiber, and satellite—is regulated under a public interest framework, not a purely commercial one. The use of this infrastructure for surveillance-based business models raises serious legal and constitutional questions.
 

The Legal Foundation Already Exists


1. Customer Proprietary Network Information (CPNI)

47 U.S.C. S 222
Telecommunications carriers are legally required to protect the confidentiality of customer data, including:

  • Call records 
  • Usage data 
  • Location information 
  • Service-related metadata 


Carriers do not own this data—they are custodians with a duty to protect it. 


2. FCC CPNI Regulations


47 C.F.R. SS 64.2001–64.2011

These rules implement Section 222 and require:

  • Explicit customer approval for data use in many cases 
  • Safeguards against unauthorized access 
  • Mandatory breach notification 
  • Restrictions on disclosure of sensitive data 


These are enforceable regulatory obligations, not optional guidelines.

 3. Unjust and Unreasonable Practices

47 U.S.C. S 201(b)

It is unlawful for telecommunications providers to engage in practices that are unjust or unreasonable.


The misuse of customer data—especially at scale—may fall within this prohibition.
 

Non-Discrimination in Service


47 U.S.C. S 202(a)


This statute prohibits discriminatory or coercive practices in telecommunications services, including conditions that unfairly burden consumers.
 

5. Public Interest Obligation (Communications Act Standard)


Telecommunications carriers operate under a legal requirement to serve the:


“Public interest, convenience, and necessity.” 
This establishes a public trust obligation—meaning infrastructure cannot be used solely for exploitative commercial purposes at the expense of consumers.

6. Consumer Protection Law


FTC Act – 15 U.S.C. S 45

Prohibits:

  • Unfair business practices 
  • Deceptive representations 
  • Misleading privacy disclosures 

This applies directly to digital platforms, apps, and data-driven services.
 

Additional Federal Law: Foreign-Controlled Applications

Protecting Americans From Adversarial Controlled Applications Act


This law is designed to address national security risks posed by applications and platforms that are owned, controlled, or influenced by foreign adversaries.

Key Provisions:

  • Targets Foreign Adversary Control- Applies to applications owned or controlled by entities in countries designated as foreign adversaries (e.g., China, Russia). 
  • Divestment or Ban Requirement- Requires companies to divest foreign ownership/control or face removal (ban) from U.S. app stores and infrastructure. 
  • Focus on Data Security & Influence Operations- Addresses risks related to: 
    • Mass data collection on U.S. citizens 
    • Surveillance and profiling 
    • Algorithmic manipulation and propaganda 
  • Applies to App Stores and Distribution Platforms- Prohibits companies like Apple and Google from distributing non-compliant applications in the U.S. 
  • National Security Enforcement Mechanism- Gives the federal government authority to act when foreign-controlled platforms pose a threat to U.S. national security. 


The Core Problem


Consumers are told: “You agreed to it.”  But in reality:

  • Refusing terms often means losing access to essential telecommunication and internet services regulated by the FCC
  • Devices are purchased, yet functionality is restricted without consent 
  • Data collection is bundled into non-negotiable agreements 
  • Federal law protects from discrimination meaning no company can bar a person from access to telecommunications and internet infrastructure by way of a contract of any kind, especially through coercion by way of products and services that cost money
  • No contract can superweed federal law regarding unauthorized surveillance and data mining through any essential telecommunications and tech product or service, such as a smartphone, supported by telecom infrastructure and internet infrastructure regulated by the FCC due to existing public trust/obligation laws


This raises a fundamental question:

Is consent valid when participation in modern society requires acceptance? 

Systemic Gaps in Enforcement


At both the state and federal level, a consistent pattern has emerged:

  • Meaningful enforcement is limited 
  • Legislative efforts often stall during escalation 
  • Critical provisions are frequently removed during the legislative process 
  • Industry lobbying results in incomplete or weakened laws 


The result:

Incomplete legislation + weak enforcement = systemic backdoors for exploitation
 

National Security and Public Safety Implications


Surveillance and data mining conducted through phones, computers, and connected products by any company—and especially by companies based in adversarial nations—extends far beyond privacy concerns and poses significant national security risks. 


It impacts:

  • Government systems 
  • Critical infrastructure (energy, utilities, telecom) 
  • Enterprise networks 
  • Schools and homes 
  • Devices used by minors 


Key concerns include:

  • Foreign access to sensitive data 
  • Surveillance through consumer devices 
  • Exposure of behavioral, biometric, and location data 
  • Risks to children through always-on digital ecosystems


Public-Interest Questions That Must Be Answered


  • How much sensitive data is being collected and where is it stored? 
  • Who has access to that data—domestically and globally? 
  • Are existing confidentiality laws being violated through modern platforms? 
  • What protections exist for minors inside connected environments? 
  • How much surveillance is occurring through devices already paid for by consumers? 

The EBOR Position


The Electronic Bill of Rights is based on three fundamental legal principles:

1. Statutory Law Overrides Contracts


Terms of service cannot waive federally protected rights.

2. Consent Must Be Meaningful

Coerced or conditional consent is not valid consent.

3. Telecom Infrastructure Carries Public Obligations

Licensed spectrum and regulated networks are not private data-extraction systems.
 

Why EBOR Is Necessary

The issue is not the absence of law.
The issue is:

  • Lack of enforcement 
  • Incomplete legislation 
  • Business models built on surveillance and data extraction 

EBOR exists to:

  • Clarify rights 
  • Enforce existing law 
  • Close legal loopholes 
  • Protect consumers, families, and national security


Call to Action


The Electronic Bill of Rights calls on:

  • Tech safety and privacy advocates
  • Lawmakers 
  • Regulators 
  • Businesses 
  • Critical infrastructure operators 
  • Consumers 


to recognize and act on the following reality:


Privacy, security, and safety are not optional features. They are legal rights.

Legal Disclaimer


This material is provided for informational and educational purposes only and does not constitute legal advice. Readers should consult qualified legal counsel for advice regarding specific legal matters.   



Learn More by Contacting Rex M. Lee

EBOR- Framework

 

The Electronic Bill of Rights (EBOR)


Restoring Privacy, Security, and Consumer Protection Under Existing Law**


Electronic Bill of Rights Framework for Clean Data Business Practices Are Available Upon Request. 

  

Electronic Bill of Rights Framework for Clean Data Business Practices


Article I: Right to Data Privacy

  • Individuals      shall have the right to control their personal data, including collection,      storage, processing, and distribution.
  • Consent      must be explicit, informed, and revocable at any time.
  • Companies      and organizations must disclose how user data is collected, shared, and      monetized in clear, understandable language—free from technical jargon,      written in plain English (or the applicable primary language of the user),      and easily accessible without requiring excessive navigation or legal      expertise.

Article II: Right to Data Security


  • Individuals      have the right to expect robust security measures to protect their      personal information.
  • Companies      must implement end-to-end encryption, multi-factor authentication, and      other security protocols to prevent unauthorized access.
  • Any      data breach must be immediately disclosed to affected individuals and      regulatory bodies.


Article III: Right to Digital Anonymity


  • No      individual shall be compelled to disclose personal information beyond what      is necessary for a specific service.
  • Users      shall have the right to browse the internet, communicate, and conduct      transactions anonymously.

Article IV: Right to Be Forgotten


  • Individuals      have the right to request the permanent deletion of their data from online      platforms and databases.
  • Companies      must honor deletion requests promptly, barring exceptions for legal or      regulatory obligations.


Article V: Right to Opt-Out of Data Monetization


  • Users      shall have the right to opt out of targeted advertising and data-sharing      agreements without being penalized or denied service.
  • Alternative      business models that do not rely on invasive data mining must be      available.


Article VIII: Right to Digital Freedom and Free Speech


  • No      entity, public or private, shall unlawfully censor or restrict lawful      digital expression.
  • Content      moderation policies must be transparent, consistently applied, and subject      to independent appeals processes.


Article IX: Right to Own and Control Digital Identity


  • Individuals      have the right to control their digital identities, including usernames,      biometric data, and online personas.
  • No      government or corporation shall claim ownership over an individual’s      digital identity.


Article X: Right to Decentralized and Open Internet


  • Users      have the right to access a free, open, and decentralized internet without      undue restrictions.
  • Net      neutrality must be upheld to prevent ISPs from prioritizing certain      content over others.
  • Decentralized      technologies must be legally protected to ensure alternatives to      centralized control.


Article XI: Right to Protection from Corporate and Foreign Surveillance


  • Companies, app developers, and multinational corporations shall be banned from      conducting surveillance and data mining on any smartphone, tablet PC, connected product, or PC supported by Android, iOS, or Windows.


Article XII: Right to National and Consumer Security and Safety


  • It      shall be illegal for tech giants to form symbiotic relationships with      foreign tech companies beholden to oppressive governments or adversarial      nations.
  • No      corporation shall be permitted to distribute intrusive, addictive, or      dangerous operating systems, apps, or AI-infused products developed under      the control of oppressive governments.
  • It      shall be illegal to share developer tools, AI development tools, or      AI-driven chips (GPUs) with companies under the control of oppressive      governments or adversarial nations.


Article XIII: The Abolishment of Web Scraping, Web Crawling, and Web Tracking


  • Web      scraping is data theft and shall be illegal without explicit consent of      the website owner or content creator.
  • It      shall be illegal to train AI on scraped copyrighted or original works      without consent.
  • AI      shall not impersonate any individual (likeness, biometric data, or voice      print) without explicit consent.
  • Individuals      shall retain the right to sell access to their likeness.
  • Web      tracking shall be illegal—no individual shall be tracked by websites,      crawlers, bots, or any tracking technology.


Article XIV: The Right to Accountability from Tech Giants


  • Developers,      executives, and board members shall be held accountable for harm,      addiction, or death caused by their products.
  • Section      230 protections shall be abolished.
  • Tech      companies shall be accountable as editors if they censor or suppress      legitimate news and press.


Article XV: The Right to Safe, Secure, and Private Preinstalled Apps & Technology


  • No      operating system may include uncontrollable preinstalled surveillance or      data mining technology.


Article XVI: The Right to Safe Technology


  • No      app, social media platform, or AI product may contain addictive or      manipulative technologies designed to exploit users.
  • Platforms      must disclose bot use, and no platform may use bots to deceive.
  • Governments      and intelligence agencies shall be banned from creating consumer accounts.
  • Consumer      protection laws must be enforced; tech lobbying must be transparent.


Article XVII: The Right to Influencer and Bot Transparency


  • Influencers,      corporations, and agencies must disclose use of bots.
  • Deceptive      marketing via automation shall be illegal.
  • Malicious      bot use for disinformation, election interference, or propaganda shall be      illegal.


Article XIX: Freedom from Addictive, Divisive, and Manipulative Technology

  • Developers      shall not provide technology designed to hijack user behavior or induce      manipulation.
  • Such      technologies, deemed more harmful than subliminal advertising, shall be      banned.


Article XX: Freedom from Government & Tech Collusion


  • Governments are banned from using personal information collected from phones, computers, and consumer products collected through surveillance business practices for warfare via civil military fusion programs
  • Governments      are banned from colluding with tech firms to suppress rights, liberties,      free speech, press, or privacy.
  • Developers      are banned from hiring former government officials for political      influence.
  • Governments      may only hire former tech employees for legitimate national security      purposes—not for political suppression.


Article XXI: Right to Data Collection Transparency


  • Companies      must disclose all data collection, sharing, and monetization practices.
  • Users      may request a copy of their data and demand deletion within 7 business      days.
  • Third-party      data collection must be disclosed, including from data brokers.


Article XXII: Freedom from Indiscriminate Surveillance and Data Mining


  • Indiscriminate      surveillance and non-essential data collection shall be banned.
  • Collection      of confidential, legal, medical, biometric, or classified information      shall be prohibited.


Article XXIII: Freedom from Forced Participation by Way of Legal Agreements


  • Contracts      of adhesion forcing consumers to accept surveillance or data mining to use      purchased products shall be banned.


Article XXIX: Freedom to Control Technology and Connected Products


  • Consumers      must have full control over their devices and be able to delete unwanted      software or apps.


Article XXX: The Right to Transparent Legal Language & App Permissions


  • All      legal language must be concise and transparent.
  • Consumers      must have full control over app permissions.
  • All      data collection and app permissions must be disclosed in one place.

Article XXXI: Ban on Teen Acceptance of Legal Agreements


  • No      minor under 18 shall be permitted to accept legal agreements for digital      services.


Article XXXII: Right to Transparent AI and Algorithmic Accountability


  • AI      and algorithms must be transparent, explainable, and free from      discrimination.
  • Users      must be able to contest AI-driven decisions.
  • Dangerous,      addictive, manipulative, or exploitative algorithms shall be illegal.


Article XXXIII: Right to Fair Terms, Conditions & Legal Consent


  • End-user      agreements must be concise, plain-language, and overseen independently.
  • One-way      contracts of adhesion shall be banned.
  • Consumers      rejecting terms must still be able to use purchased products.


Article XXXIV: Anti-Trust Protections & Internet Centralization


  • Surveillance      for competitive advantage shall be banned.
  • Tech      companies shall not monopolize OS, apps, media, or AI via app stores or      preinstalled software.
  • Tech      lobbying by former government officials shall be banned.


Article XXXV: National, Internet, and Technology Safety


  • Symbiotic      relationships between domestic tech firms and adversarial      nation-controlled companies shall be banned.
  • Sharing      of developer tools, AI tools, or chips with adversarial nations shall be      prohibited.


Article XXXVI: The Right to Sue and Hold Tech Giants Accountable


  • Consumers      shall have the right to sue for predatory or dangerous products.
  • Tech      firms and their executives may be held criminally and civilly liable.
  • Section      230 protections shall be abolished.


Article XXXVII: Prohibition on AdTech Surveillance Infrastructure in Government and Civil-Military Programs such as the U.S. Government and Palantir Technologies.


  • Ban      the use of Google’s AdTech AI–Quantum Algorithmic Control Platform and      Ecosystem in any government system, platform, or infrastructure,      including its integration into civil-military fusion programs such as      those associated with the U.S. government and platforms like Palantir      Technologies’ Gotham. 
  • A      complete prohibition shall be enforced on the integration of any      consumer-facing products, applications, operating systems, or connected      devices with government, military, or intelligence platforms used for      surveillance, intelligence gathering, or covert operations. 
  • No      commercial technology stack designed for telecommunications, computing,      targeted advertising, behavioral profiling, or data monetization shall be      repurposed for government or defense use under any circumstance. 
  • Warrant      Requirement for Government Surveillance- All forms of surveillance,      monitoring, or data collection conducted by any government      entity—regardless of purpose—shall require prior authorization through a      lawful court-issued warrant, based on probable cause and in full      compliance with constitutional protections.
  • No      exceptions shall be permitted for bulk data collection, predictive      analytics, or AI-driven surveillance conducted without individualized      judicial oversight.


Article XXXVIII: Equal Protection for Digital Currency, Financial, Biological, Medical, Legal, and AI–Quantum Platforms 


All rights, protections, and enforcement mechanisms established under the Electronic Bill of Rights shall apply equally to all essential digital services and emerging technologies, including but not limited to:


  • Digital      currency and financial platforms 
  • Banking,      payment systems, and financial infrastructure 
  • Biological,      medical, and health-related technologies 
  • Legal      technology platforms and digital court systems 
  • Artificial      intelligence systems, including AI-infused applications and AI chatbots 
  • Quantum      computing platforms and next-generation computational systems 
  • Any      future technologies that materially impact consumer rights, privacy,      safety, or autonomy 


These protections shall extend across all layers of the digital ecosystem, ensuring that no platform, technology, or service is exempt from accountability due to its classification as “emerging,” “experimental,” or “innovative.”


Universal Applicability to AI-Infused Digital Services


The combined Articles of the Electronic Bill of Rights shall apply in full to all AI-infused applications, platforms, chatbots, and digital services, regardless of delivery model, including:


  • Mobile      applications (iOS, Android, and other operating systems) 
  • Web-based      platforms and cloud services 
  • Embedded      systems within connected devices (IoT) 
  • Enterprise      and government-integrated systems 
  • Decentralized      and blockchain-based platforms 


No developer, platform provider, or technology company shall bypass or dilute these protections through terms of service, contracts of adhesion, or technical architecture.


Future-Proofing Consumer Protection


As technology evolves, all new categories of essential digital services shall automatically fall under the protections of the Electronic Bill of Rights without requiring additional legislation.


This ensures that innovation does not outpace consumer protection, and that human rights, data sovereignty, and individual autonomy remain preserved in the age of AI and quantum computing.


  • The      combined Articles Apply to All New Evolving Essential Services and      Technology AI Infused Apps, Platforms, AI Chatbots and Other Digital      Service


Learn More by Contacting Rex M. Lee

Contact Rex M. Lee

Electronic Bill of Rights

Rex M. Lee: Rlee@ElectronicBillofRights.com

Send a note

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cancel

Electronic Bill of Rights

Copyright © 2026 Electronic Bill of Rights - All Rights Reserved.

Powered by