Privacy Policy (members)

From Artisan's Asylum

Jump to: navigation, search



In order to foster a safe and supportive member atmosphere, we ask all members to abide by these privacy policies. Please also see our Privacy Policy for how the Asylum itself protects members' personal data.

Personal responsibility

We expect our members to protect private and confidential information, especially that which affects the well-being of others, This can include pictures or names of our other members (some of whom go by names other than their so-called "legal" names), descriptions of their work, or the contents of their communications. The sections below expand on this philosphy.

We also expect you abide personally by the same provisions that the Asylum abides by in general. This means that the same sort of data that we take care to protect about our members should be protected by you as well.

Photography (still or video)

Not everyone shares the same attitude towards having their picture online. Please ask in advance before photographing people.

Additionally, some people may be working on projects that they don't wish to get publicized early. Please ask before photographing other members' work or before describing it in public. (If you have work that you absolutely don't want photographed while you're not around, consider covering it. Even with the best of intentions, it might otherwise wind up in the background of some unrelated shot.)


Do not set up any sort of surveillance or video system that might capture images of people in any area outside of your own rental space. If you set up any such system, we reserve the right to inspect it periodically to assure that this is the case. (If such a system were to record personal information outside of your own space, it would violate our own privacy policies, at least.) Any camera that even looks like it might be imaging space outside of your own rental area should be tagged with your name, contact information, and any explanatory information that would be useful in determining what it is that your camera is capturing. (The explanation is so that everyone who wonders about the camera doesn't have to individually track you down to ask about it.) Cameras with no identifying information may be covered or removed.

Anyone who sets up any system in their rental area that could capture or redistribute audio or video must (a) inform us (by sending mail to, and (b) post a sign notifying people who might walk into your space that such surveillance may be in use. [Note that the address above has been obsfuscated as an antispam measure; type in what you see. If you copy & paste, you'll notice that there are extra characters in there that aren't really part of the address.]

Historical note: When we were moving into Tyler and before we had a resident renter population, a couple of members set up "build-cams" that attempted to do time-lapse photography of the construction or move-in process. Such build-cams were set up to take multi-second exposures, which meant that most people would become unrecognizable blurs. However, now that we have renters, including people seated nearly motionless at desks for extended periods, such a build-cam would have to be carefully thought out, and probably discussed among the members at one of our meetings.


Members may transmit data on a shared infrastructure (our wireless network) or leave it stored on various computers (such as classroom machines or CNC machinery). We expect that members will not deliberately eavesdrop on each others' communications. We similarly expect that members will not to go unusual lengths (such as forensic examination of unused disk areas on shared machines) to recover files deleted by other members. If a member leaves an undeleted file on a shared computer, you may look at it to figure out what it is or who to contact about it (especially if you think it might need to be saved, or if it might need to be deleted to free up space), but you do not necessarily have rights to copy it for your own use; please ask first.

Please do not swamp our local network. While the occasional large download is fine, routine or continuous high-rate usage can interfere with others' use. Similarly, anything that attracts the attention of law enforcement (such as downloading copyrighted works) is also not allowed. This is both a legal and a privacy issue---if we have problems with these sorts of things, we will be forced to deploy much more privacy-intrusive technologies (such as individual authentication for every network connection, and much longer-lived logs of who does what) that degrade everyone's privacy and cost us time and effort. We'd rather not have to go there.

Private wireless access points in infrastructure mode (the usual mode) must be cleared with Asylum IT before deployment. (In general, there should be no reason you'd need to deploy one anyway.) In particular, we need to ensure that you aren't capturing data from other users, even by accident, and we need to make sure we can turn off your AP if it is interfering with our network. Access points in client mode (such as laptops) are of course allowed; that's why we have a wireless network. If you have a wired-only device, you may use an access point in client-bridge mode to get it on our network; please talk to IT for advice (for starters, we will need to give your AP a static IP address), and see also Acceptable use of our public network.

Personal tools
Wiki Maintenance