Chapter 3. The Custodial Filter

Ethics, Law, and Responsibility in Digital Preservation

← Return to Main Index

Course: Archaeobytology 200: Advanced Triage & Methodology

Section: Part II - The Anvil

Status: Final Academic Draft

Abstract

This chapter establishes the ethical and legal framework that governs all preservation decisions in Archaeobytology: the Custodial Filter. While Chapters 1 and 2 provided the methodology for finding and classifying artifacts, this chapter addresses the critical question that precedes all technical work: Should this artifact be preserved, and if so, how should access be controlled? Drawing on privacy law, copyright doctrine, archival ethics, and emerging frameworks for digital stewardship, this text provides a formal decision protocol for navigating the tension between preservation (the imperative to save) and protection (the duty to prevent harm). The Custodial Filter is not a barrier to preservation but a necessary safeguard that ensures the Archaeobytologist operates as a responsible steward, not a digital grave robber.

Preamble: The Crisis of Custody

The Excavation Protocol (Chapter 1) taught the practitioner how to find the artifact. The Triage Protocol (Chapter 2) taught them how to classify its state. But between diagnosis and preservation lies a third, more profound challenge: the question of custody.

The term "custody" comes from the Latin custodia, meaning "guardianship" or "protection."[1] In law, custody implies not just possession but responsibility—the duty to care for something on behalf of others, including those who cannot speak for themselves. The Archaeobytologist, upon excavating an artifact, becomes its custodian. This is not a right but a burden.

This burden is unique to the digital realm. In physical archaeology, the artifact is dead matter: a potsherd, a bone, a tool. It cannot speak, cannot be harmed further, and its "life" ended millennia ago. But the digital artifact is different. It may contain the living voices of real people—their names, their faces, their private communications. It may be copyrighted, owned by entities that still exist. It may carry cultural significance to communities that never consented to its preservation. It may, if mishandled, cause tangible harm.

This is the crisis of custody: the digital past is not safely dead. It is entangled with the living present. The practitioner who excavates without ethical consideration is not an archaeologist but a voyeur, or worse, a thief.

The Custodial Filter is the formal protocol that prevents this. It is the set of tests, questions, and frameworks that must be applied to every artifact before preservation work begins. It asks three foundational questions:

This chapter provides the formal methodology for answering these questions. It is the conscience of the discipline.

Filter 1: The Privacy Test (Protecting the Living)

The first and most urgent filter is privacy. The question is simple but consequential: Does this artifact contain Personally Identifiable Information (PII) that could be used to identify, contact, or harm living individuals?

The Taxonomy of PII

Not all personal information is equally sensitive. Privacy scholars distinguish between three categories of identifiers, as formalized in the GDPR and privacy impact assessment frameworks:[2]

Category 1: Direct Identifiers

These are data points that directly identify a specific individual without need for additional information.

Risk Level: HIGH. These must be redacted unless explicit consent exists or the individual is a public figure.

Category 2: Quasi-Identifiers

These are data points that, when combined, can be used to re-identify individuals even if no direct identifier is present. Computer scientist Latanya Sweeney demonstrated that 87% of the U.S. population could be uniquely identified using just three quasi-identifiers: ZIP code, birthdate, and gender.[3]

Risk Level: MEDIUM-HIGH. These require contextual assessment. A single quasi-identifier may be acceptable; multiple in combination are not.

Category 3: Sensitive Attributes

These are data points that, while not directly identifying, reveal information that could cause harm, discrimination, or distress if exposed.

Risk Level: CONTEXT-DEPENDENT. Even if anonymized, this information may cause harm to the individual if the context makes re-identification possible.

The REDACT vs. PRESERVE Decision Tree

Once PII is identified, the practitioner must make a formal decision: redact, embargo, or preserve as-is.

Path 1: REDACT (Anonymize the Artifact)

When to use: The artifact has high research value, but PII is present and cannot be justified as necessary.

Methodology:

Academic Grounding: This approach aligns with the "k-anonymity" framework, where data is modified such that any individual is indistinguishable from at least k-1 others in the dataset.[4]

Path 2: EMBARGO (Restrict Access)

When to use: The artifact's research value depends on preserving the PII (e.g., a study of online harassment patterns requires seeing actual usernames), but public release would cause harm.

Methodology:

Precedent: This mirrors practices in oral history archives, where interviews containing sensitive material are embargoed until the interviewee's death or a specified date.[5]

Path 3: PRESERVE AS-IS (Public Release Justified)

When to use: The individuals are public figures, the information is already public, or the historical significance outweighs privacy concerns.

Justification Framework:

Warning: This path must be taken with extreme caution. As privacy scholar Helen Nissenbaum argues, "privacy is contextual"—something posted publicly in 2005 may not have been intended to be searchable, archived, and analyzed in 2025.[6] The "already public" exception is not a blank check.

Filter 2: The Copyright Test (Respecting Ownership)

The second filter addresses legality: Do I have the legal right to preserve and distribute this artifact?

Unlike physical archaeology, where artifacts are often unclaimed or fall under "finders keepers" doctrines, digital artifacts almost always have an owner. A .mp3 file is copyrighted. A blog post is copyrighted. A screenshot of a website is copyrighted. The practitioner is not excavating abandoned property; they are handling someone's intellectual property.

The Four Pillars of Fair Use

In U.S. law, the "fair use" doctrine provides a limited exception to copyright, allowing use of copyrighted material without permission for purposes such as research, education, and criticism.[7] Fair use is determined by a four-factor test:

Factor 1: Purpose and Character of Use

Question: Is the use transformative? Is it for nonprofit educational or research purposes?

Archaeobytology Application: Preservation for scholarly research is highly favored under this factor. The work is transformative (the artifact is being studied, not consumed as entertainment) and nonprofit.

Example: Preserving a GeoCities homepage to study early web design patterns is transformative. Mirroring a GeoCities homepage to "revive cool 90s sites" for nostalgia traffic is not.

Factor 2: Nature of the Copyrighted Work

Question: Is the work factual or creative? Is it published or unpublished?

Archaeobytology Application: Factual works (databases, documentation, logs) receive less copyright protection than creative works (art, music, fiction). Unpublished works (private emails, drafts) receive stronger protection.

Example: Preserving a README.txt file (factual, functional) is more defensible than preserving an unpublished novel found on an abandoned server.

Factor 3: Amount and Substantiality

Question: How much of the work is being used? Is the "heart" of the work being taken?

Archaeobytology Application: Preserving a portion of a work for analysis is stronger than preserving it in its entirety for redistribution. However, preserving the whole work is sometimes necessary for research (e.g., a complete website for link analysis).

Example: Preserving a single blog post from a 500-post blog is more defensible than mirroring the entire blog for public access.

Factor 4: Effect on the Market

Question: Does this use harm the market value of the original work?

Archaeobytology Application: If the artifact is abandoned (the creator is unreachable, the platform is dead), market harm is nearly impossible. If the creator is active and still selling the work, preservation could harm their market.

Example: Preserving a Flash game from a dead website (no market exists) is defensible. Preserving and redistributing a Flash game still sold on Steam is not.

The Orphan Works Problem

The most common copyright challenge in Archaeobytology is the "orphan work"—a copyrighted artifact whose owner cannot be identified or located. Legally, these works remain under copyright (in the U.S., for 70 years after the author's death), but practically, no one can grant permission.[8]

Best Practice: Document a "good faith effort" to locate the copyright holder. This includes:

If after reasonable effort the owner cannot be found, preservation under fair use (with full citation and takedown policy) is the least-worst option. As copyright scholar Lawrence Lessig argues, orphan works law is broken, but the risk of lawsuit from an untraceable owner is near zero.[9]

The CITE & PRESERVE Protocol

For all copyrighted artifacts preserved under fair use, the practitioner must:

  1. Cite the Original Creator: Include full attribution in metadata (creator name, original URL, date).
  2. Provide Context: Explain the research purpose in accompanying documentation.
  3. Offer Takedown: Include a clear contact method for copyright holders to request removal.
  4. Limit Access if Necessary: If full public release is questionable, use researcher-only access or time-limited embargo.

This protocol balances preservation (the public good) with respect for ownership (the private right).

Filter 3: The Ethics Test (Beyond Law)

The third filter is the most difficult because it cannot be codified. It asks: Even if preservation is legal and privacy-compliant, is it ethical?

Law defines the floor of acceptable behavior. Ethics defines the ceiling of responsible behavior. The Archaeobytologist must operate at the ceiling.

The Harm Principle

The foundational ethical guideline comes from philosopher John Stuart Mill's "harm principle": actions are permissible unless they harm others.[10] In Archaeobytology, this translates to: Preservation is justified unless it causes tangible harm to individuals or communities.

Types of Potential Harm:

Test: For each artifact, ask: "If this person saw this preserved and public, would they feel violated? Would they be endangered?" If yes, preservation must be reconsidered.

The Community Consent Model

One of the most ethically complex scenarios is the preservation of artifacts created by marginalized or indigenous communities. These artifacts may be legally "public" (posted on open forums) but culturally "private" (intended only for in-group consumption).

Drawing on indigenous data sovereignty frameworks, scholars like Tahu Kukutai argue that communities should have the right to control how their cultural data is used, even if that data is technically public.[11] This has led to the development of the CARE Principles for Indigenous Data Governance: Collective benefit, Authority to control, Responsibility, and Ethics.[12]

Best Practice for Community-Sensitive Artifacts:

  1. Identify the Community: Is this artifact associated with a specific cultural, ethnic, or marginalized group?
  2. Seek Input: Contact community leaders, cultural organizations, or tribal councils to request guidance.
  3. Respect Refusal: If the community requests that the artifact not be preserved or made public, honor that request even if legal preservation would be possible.
  4. Co-Stewardship: Where possible, work with the community to determine preservation and access terms.

Example: A researcher discovers an archived forum for LGBTQ+ youth from the early 2000s. Even if the forum was technically public, preserving and publicizing it without consulting LGBTQ+ advocacy groups could expose individuals who were closeted at the time. Ethical practice requires community engagement.

The Right to Be Forgotten

The European Union's GDPR enshrines a "right to be forgotten"—the ability for individuals to request deletion of personal data under certain conditions.[13] While this right does not apply to archival research in the U.S., it represents an important ethical principle: individuals should have agency over their digital past.

Ethical Protocol:

As digital archivist Kate Theimer argues, "The digital archive must be a living, responsive institution, not a prison for the past."[14]

The Custodial Report: Formal Documentation

Just as the Triage Protocol requires a formal Triage Report, the Custodial Filter requires a Custodial Report documenting all ethical and legal decisions.

Required Elements of a Custodial Report:

  1. Artifact Identifier: File name, URL, or unique descriptor
  2. PII Assessment:
    • PII Present? (YES/NO)
    • If YES: Category (Direct/Quasi/Sensitive)
    • Action Taken: (REDACT/EMBARGO/PRESERVE AS-IS)
    • Justification: (2-3 sentences)
  3. Copyright Assessment:
    • Copyright Status: (Public Domain/Fair Use/Permission Granted/Orphan Work)
    • Fair Use Factors: (Four-factor analysis summary)
    • Owner Contact Attempt: (YES/NO, with documentation)
  4. Ethical Assessment:
    • Potential Harm: (NONE/LOW/MEDIUM/HIGH)
    • If MEDIUM or HIGH: Harm Type (Reputational/Safety/Dignitary/Community)
    • Mitigation Steps Taken
  5. Access Control: (PUBLIC/EMBARGO/RESEARCHER-ONLY/REDACTED VERSION ONLY)
  6. Takedown Policy: Contact method and response protocol
  7. Date of Assessment: Because legal and ethical standards evolve

Example Custodial Report:

Artifact: myspace_messages_2006.csv (Exported private messages from MySpace)

PII Assessment:

Copyright Assessment:

Ethical Assessment:

Access Control: RESEARCHER-ONLY (Pseudonymized version); FULL EMBARGO on raw data until 2040

Takedown Policy: Any individual identified in dataset may request full removal via [email protected]; requests reviewed within 30 days

Assessment Date: November 21, 2025

Conclusion: The Guardian, Not the Grave Robber

The Custodial Filter is not an obstacle to preservation. It is the foundation of responsible preservation. Without it, the Archaeobytologist is not a scholar but a data hoarder, a privacy violator, or a copyright infringer.

The practitioner who applies the Custodial Filter acknowledges a fundamental truth: the digital past is not abandoned property. It is entangled with living people, living communities, and living systems of ownership and meaning. To excavate without care is to harm.

The Custodial Filter ensures that every preserved artifact can be defended on three grounds:

This is the discipline's vow: to be a guardian of the past, not a grave robber. To preserve with purpose, not curiosity. To protect, not exploit.

With the artifact now excavated (Chapter 1), triaged (Chapter 2), and cleared through the Custodial Filter (Chapter 3), the practitioner is finally ready to proceed to the technical work of preservation: the choice between migration, emulation, and reconstruction. That is the work of Chapter 4.

But preservation without custody is theft. The Filter comes first. Always.

Works Cited

  1. [1] ↑Oxford English Dictionary. (2025). "Custody." Retrieved from https://www.oed.com/ — Etymology from Latin custodia, establishing the concept of guardianship.
  2. [2] ↑European Union. (2016). General Data Protection Regulation (GDPR), Articles 4 & 9. Official Journal of the European Union. The GDPR's taxonomy of personal data categories provides the foundational framework for PII classification.
  3. [3] ↑Sweeney, L. (2000). "Simple Demographics Often Identify People Uniquely." Carnegie Mellon University, Data Privacy Working Paper 3. Foundational work demonstrating re-identification risk from quasi-identifiers.
  4. [4] ↑Sweeney, L. (2002). "k-Anonymity: A Model for Protecting Privacy." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557-570. The foundational framework for anonymization in research datasets.
  5. [5] ↑Oral History Association. (2009). "Principles and Best Practices." Retrieved from https://oralhistory.org/ — Guidelines for embargo practices in sensitive oral history collections.
  6. [6] ↑Nissenbaum, H. (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press. Nissenbaum's theory of "contextual integrity" explains why "already public" does not equal "consent to archive."
  7. [7] ↑U.S. Copyright Act, 17 U.S.C. § 107 (Fair Use). The four-factor test remains the foundational framework for fair use analysis in U.S. law.
  8. [8] ↑U.S. Copyright Office. (2015). Orphan Works and Mass Digitization. A Report of the Register of Copyrights. Documents the orphan works problem and proposed (but not enacted) solutions.
  9. [9] ↑Lessig, L. (2004). Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity. Penguin Press. Lessig's critique of orphan works law provides the ethical justification for preservation despite copyright uncertainty.
  10. [10] ↑Mill, J. S. (1859). On Liberty. John W. Parker and Son. Mill's harm principle remains foundational to ethical frameworks in research and archival practice.
  11. [11] ↑Kukutai, T., & Taylor, J. (Eds.). (2016). Indigenous Data Sovereignty: Toward an Agenda. ANU Press. Foundational work on the right of indigenous communities to control their data.
  12. [12] ↑Carroll, S. R., et al. (2020). "The CARE Principles for Indigenous Data Governance." Data Science Journal, 19(43), 1-12. The CARE Principles provide an actionable framework for ethical data stewardship with indigenous communities.
  13. [13] ↑European Union. (2016). GDPR Article 17: Right to Erasure ("Right to Be Forgotten"). While not directly applicable in the U.S., this principle represents an important ethical standard.
  14. [14] ↑Theimer, K. (2018). "Digital Archives Should Be Living, Responsive Institutions." ArchivesNext (blog). Retrieved from http://www.archivesnext.com/ — Theimer's advocacy for responsive, ethical archival practice.