Computer-implemented method for improving a social network site computer network, and terminal, system and computer readable medium for the same

ABSTRACT

A method, at a terminal in a digital communications network, comprising: establishing direct or indirect communication access and linkage between the user-operated terminal and at least one remote computer(s) on which are stored, or by which access is available to prevent legible display of, stored user account object data; displaying indicia, or broadcasting data, representative of or indicating one or more predetermined criteria for selecting a subset of the stored user account object data; collecting data, representative of, or indicating, only the subset of the stored user account object data; and transmitting instructions to prevent legible display of the subset of the stored user account object data, according to the collected data representative of, or indicating, the one or more predetermined criteria for selecting the subset of the stored user account object data, from the terminal to the at least one remote computer(s). A terminal, system, and computer readable medium are also disclosed.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a U.S. National Stage Patent Application of PCTInternational Patent Application Ser. No. PCT/US2015/066174 (filed onDec. 16, 2015) under 35 U.S.C. § 371, which is a continuation-in-part,and claims the benefit, of U.S. patent application Ser. No. 14/712,882(filed on May 14, 2015) under 35 U.S.C. §§ 120 and 363, which claims thebenefit of U.S. Patent Application Ser. No. 62/098,305 (filed on Dec.30, 2014) under 35 U.S.C. § 119(e), which are all hereby incorporated byreference herein in their entireties.

TECHNICAL FIELD

The present disclosure relates to a computer-implemented method for oneor more of increasing data processing efficiency and improving datasecurity, of one or more computers communicatively connected to adigitally stored and operated social network site computer network; anda terminal, a system and a computer-readable medium for the same.

BACKGROUND

Current attempts to control the shear amount, the digital manipulation,the aggregation, and the dissemination of sensitive personal informationstored across computer-implemented social network site storage networksare resource, energy, and time consuming. These attempts consumeresources, energy, and time—on all three of individual, organizationaland large-and-mega-scale digital computer server and non-servernetworks.

Some advocate abstinence or discontinued use, which negates thetechnological advantages of social network site computer networks.

Others suggest sacrificing security by allowing all information toproliferate without reservation or with minimal reservation, whichcauses an overabundance of distributed content.

Still others teach identification management by identifying Facebook®and Twitter® content containing text (e.g., profanity) or objects inphotos (e.g., beer cans), which have been previously defined in ablacklist. Blacklist techniques suffer from several problems such as theinability to technically scale them for network-wide use, such thatlarge volumes of data cannot be managed. They also lead to falsepositives, wherein valued objects are unduly deleted.

On an individual scale, it is estimated that, for example, an averageFacebook user account stores nearly 8500 new data objects per year,which it is estimated would take more than two days to identify anddelete on an item-by-item basis assuming that it takes about 5 secondsto identify and remove each object.

It would be desirable to provide a more effective method of creatingmore efficient digital privacy management, which would reduce thestorage space required to store, the bandwidth to aggregate andcalculate, and/or the computing resources, time, and energy previouslyrequired, especially as regarding management of redundant and private,sensitive personal data.

SUMMARY

As used herein, an “account user terminal” is a terminal authorized, viaa unique set of social network site account user-held accesscredentials, to control a particular social network site user dataprofile assigned or related to a particular social network site accountuser.

First and second aspects of the disclosure may or may not be directed torespective method and computer readable medium (or alternatelythroughout “computer storage apparatus”) causing operations, for eachcomprising any one or more of: collecting or accessing data uniquelyrepresentative of, or uniquely indicating, one or more social networksite user account(s) and transmitting data necessary to access andcontrol the one or more digitally stored and operated social networksite user account(s) to at least one computer(s); establishing direct orindirect communication access and linkage between the terminal and theat least one computer(s) on which are stored, or by which access isavailable to control, stored user account object data that were input ormodified during prior access to and control over the one or more socialnetwork site user account(s) or associated social network site useraccount(s) that at some prior time had permission to edit data in, orappend data to, the stored user account object data of the one or moresocial network site user account(s), the stored user account data of theone or more user account(s) uniquely accessible based on access datadigitally pre-assigned to the one or more social network site useraccount(s); displaying indicia, or broadcasting data, representative ofor indicating one or more predetermined criteria for selecting a subsetof the stored user account object data; collecting data representativeof, or indicating, the subset of the stored user account object databased on the one or more predetermined criteria for selecting the subsetof the stored user account object data that were input or modifiedduring prior access to and control over the one or more user account(s)or associated social network site user account(s) that at some priortime had permission to edit data in, or append data to, the user accountobject data of the one or more user account(s); and transmittinginstructions to prevent display of the subset of the stored user accountobject data at (optionally, every and/or user-selected) user accountterminal(s) in the social network site computer network, according tothe collected data representative of, or indicating, the one or morepredetermined criteria for selecting the subset of the stored useraccount object data, from the terminal to the at least one remotecomputer(s); wherein the instructions are calculated to prevent thedisplay of the selected subset of the stored user account object data atat least one user account terminal in the social network site computernetwork, based on the one or more predetermined criteria.

Third and fourth aspects of the disclosure may or may not be directed torespective processor-based terminal and processor-based system, eachcomprising any one or more of: a first module arranged to collect oraccess data uniquely representative of, or uniquely indicating, the oneor more social network site user account(s) and transmitting datanecessary to access and control the one or more digitally stored andoperated social network site user account(s) to at least one remotecomputer(s); a second module arranged to establish direct or indirectcommunication access and linkage between the terminal and the at leastone remote computer(s) on which are stored, or by which access isavailable to control, stored user account object data that were input ormodified during prior access to and control over the one or more socialnetwork site user account(s) or associated social network site useraccount(s) that at some prior time had permission to edit data in, orappend data to, the stored user account object data of the one or moresocial network site user account(s), the stored user account data of theone or more user account(s) uniquely accessible based on access datadigitally pre-assigned to the one or more social network site useraccount(s); a third module arranged to display indicia, or broadcastdata, representative of or indicating one or more predetermined criteriafor selecting a subset of the stored user account object data; a forthmodule arranged to collect data representative of, or indicating, thesubset of the stored user account object data based on the one or morepredetermined criteria for selecting the subset of the stored useraccount object data that were input or modified during prior access toand control over the one or more user account(s) or associated socialnetwork site user account(s) that at some prior time had permission toedit data in, or append data to, the user account object data of the oneor more user account(s); and a fifth module arranged to transmitinstructions to prevent display of the subset of the stored user accountobject data at (optionaly, every and/or user-selected) user accountterminal(s) in the social network site computer network, according tothe collected data representative of, or indicating, the one or morepredetermined criteria for selecting the subset of the stored useraccount object data, from the terminal to the at least one remotecomputer(s); wherein the instructions are calculated to prevent displayof the selected subset of the stored user account object data at atleast one user account terminal of the social network site computernetwork, based on the one or more predetermined criteria.

Additional or alternative aspects of the disclosure are found in theappended claims. Further aspects, embodiments, features, and advantagesof the embodiments, as well as the structure and operation of variousembodiments are described in detail below with reference to accompanyingdrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings, which form a part of the specification andare to be read in conjunction therewith, and in which like referencenumerals are used to indicate like features in the various views:

FIG. 1 is a schematic diagram of three exemplary digitally stored andoperated social network site computer network environments, in whichembodiments may be implemented;

FIG. 2 is a diagram of software components, according to an embodiment;

FIG. 3 is a flow diagram showing an exemplary overall operation,according to an embodiment;

FIG. 4 illustrates an example computer useful for implementingcomponents of the embodiments, along with several network features thatmay be used in embodiments; and

FIG. 5 illustrates an exemplary embodiment of the computer of FIG. 4 ina mobile terminal.

DETAILED DESCRIPTION

Embodiments of the disclosure are concerned with the calculation of oneor more data set transformation instructions, in certain cases thetransmission of those instructions to at least one remote computer(s)(e.g., but not limited to, any combination of one or more of, a bank of,and geographically disparate communicatively connected, server(s) thatmanipulate user data). Ultimately, though not in certain method,terminal, system and computer-readable media embodiments, theseinstructions may or may not also be executed at one or more server(s),storage device(s) or other computer hardware holding or capable ofselectively preventing display of the data set(s) being operated on.

The data available for viewing on a user account terminal of a socialnetwork site computer network are reduced by one or more of deletingdata from one or more storage devices or data structures, restrictingdata transmission through the network, disabling receipt of transmitteddata, and non-legible display or data to one or more user accountterminals in the social network site computer network.

Though un-expectantly, it becomes apparent that data security andtechnological leveraging seemingly cannot coexist, creating atechnically derived tension. For example, the social network website,Facebook® boasts about 829 million daily active users. Every day, theseusers upload more than 4.75 billion items of content (e.g., statusupdates, wall posts, photos, videos, comments, tags and other metadata),‘like’ more than 4.5 billion items, and send more than 10 billionmessages,—contributing to the 600 terabytes of data collected byFacebook® every day. This unprecedented deluge of information revelationcan be attributed to the technical efficiencies provided by itsparticular digital interaction platform. Other social network sitespresent similar challenges, including but not limited to Twitter®,LinkedIn®, Instagram®, Snapchat®, etc.

It is also realized un-expectantly that, yet, because the advantage ofwidespread identity revelations require an audience, leveraging thetechnical advances necessarily means relationships, which are impossiblewithout others—sometimes others who on a wide-scale network at somepoint tend to misuse or compromise such data.

In embodiments, certain of the below-indicated non-limiting technicaladvantages and/or others, each of which depend upon what particularcombination of features disclosed herein is found in an embodiment, arerealized only upon persistent and arduous study through both (a)discovering the very existence of the above-indicated technical tension,and (b) inventing the technical solutions disclosed in part herein.

In embodiments, resulting deletion, non-transmission, non-receipt, ornon-legible display, and/or non-display of user-designated private orpersonal data thereby frees up processing resources both at anindividual level such as at a terminal, and all the more socollectively, across even a global network of data storage andprocessing infrastructure facilitating the ebb and flow of personal andbusiness related data of millions, if not even billions, of socialnetwork site users. These embodiments quite un-expectantly provide theunpredictable result(s) of reducing unwanted, unnecessary, andprivacy-compromising data flow to and from various terminals and othercomputers communicatively connected to one or more digitally stored andoperated social network site(s).

In embodiments, operations by which data set transformations are madeimprove data security by preserving or reclaiming the privacy of certainuser account data objects.

In embodiments, operations by which data set transformations are madeincrease system operational efficiency at each terminal.

In embodiments, operations by which data set transformations are madestrike an optimal balance between improving data security by preservingor reclaiming the privacy of certain user account data objects on theone hand, and increasing system operational efficiency, on the otherhand, all the while allowing continued data exchange and aggregationbetween one or more user computers communicatively connected to at leastone digitally stored and operated social network site.

In embodiments, the outcomes (alternately or additionally) affect quiteunpredictable technical advantages of continued connectivity to one ormore such sites (full utilization of these sites' own inherentcommunication and data transfer efficiencies), while reducing thecomputing time and energy required to receive individual or step-by-stepimplementations of merely small batch instructions to remove orotherwise secure relatively very little user account information.

The following describes a system for managing social networking sitecomputer network data, according to embodiments illustrated in FIGS.1-5. FIG. 1 is a diagram of computer network 451 including threeexemplary environments, in which embodiments may be implemented. Whilethe following is described in terms of FIG. 1, the embodiments are notlimited to the environment(s) illustrated in FIG. 1. For example, anysystem having generally the structure of FIG. 1, or that would benefitfrom the operation, methods and functions as described herein may beused.

In exemplary embodiments, system 451 shows terminal clients 201-251 eachor collectively comprising one or more browser(s) 10 of terminal 247(browser also in each of other terminals, but not shown), which is/areused to connect to server(s) 500 over one or more networks W13, W14, andW15.

According to embodiments, browser 10 may include any device, applicationor module that enables a user or computer to navigate and/or retrievedata from another data source, typically over a network. Browser 10 mayinclude any conventional web browser such as those that are widelyavailable. According to further embodiments, browser 10 may also beconfigured to use any number of protocols, known now or developed in thefuture, including protocols such as HTTP, FTP, and underlying protocolssuch as TCP/IP or UDP. In embodiments, browser 10 is configured to run(or execute) web applications without a GUI as a headless browser. Webapplications are applications that can be hosted within a web browser orthose that can be accessed, for example, over a network such as theInternet or an intranet.

Browser 10 can further communicate with an input (not shown) to allow auser to input data, to input commands, or to provide other controlinformation to browser 10. Browser 10 may request content from one ormore server(s) 50, based on prior user input that is stored at one ormore terminal(s) or server(s) 50 before accessing server(s) 50, and uponwhich instructions later sent to server 50 are calculated. Server(s) 50may respond to the request by providing content back to browser 10 andclient 201 via network W13. Browser 10 may also be configured toretrieve content from server(s) 50 without user intervention.

In embodiments, network(s) W13, W14, and W15 can be any type of datanetwork or combination of data networks including, but not limited to, alocal area network (LAN) accessed locally or remotely such as via a VPN,a medium area network, or a wide area network such as the Internet.Network W13, for example, can be a wired or wireless network that allowsclient 247 and server(s) 50 to communicate with each other. Network W13can further support world-wide-web (e.g., Internet) protocols andservices.

Server(s) 50 provides content (e.g., web pages, applications (or“apps”), audio, video, etc.) that can be retrieved by client 247 overnetwork W13. Content retrieved by client 247 can be disseminated viabrowser 10. In various embodiments, server(s) 50 and/or browser 10includes one or more features of content manager 200, which is describedfurther below.

As illustrated in FIG. 1, in embodiments, terminal and/or system dataflow configurations selectively delete (or otherwise prevent(s) legibledisplay of) user account data with an unexpected technical efficiencynot previously seen, in view of the above seemingly irreconcilabletensions. A base functional component of one aspect of the disclosure iscomposed of at least one of a plurality of terminals 201 to 251,configured to be ordered by predetermined default settings oruser-selected settings and/or software instructions into one or moredynamically changing and rearranging user terminal groupings. Certainnetwork terminals and/or systems, e.g., system 451, connect and allowexchange of information between local or far flung terminals within andfrom at least, but not limited to, three distinct types of networks W13,W14, and W15.

In embodiments, terminal group 401 comprises terminals 201 to 215,terminal group 403 comprises terminals 217 to 233, and terminal group405 comprises terminals 235 to 251, each group and collective groupsillustrating flow of data, albeit on a very small scale, among andacross varied networks, such as clear network W13, darknet or darkwebW14 (e.g., employed via The Onion Router (Tor)), and peer-to-peernetwork W15 via at least one (or more) server(s) 50. Server(s) 50receive, store, retrieve and deliver, across and at numerous andgeographically disparate locations, user account data on one or moredatabases 600.

In embodiments, terminal and system operations may or may not in wholeor in part be effectuated, executed, or implemented on or via clearnetwork W13 (comprising at least all of, or just a portion of, terminalgroups 403 and 405) whereby individual terminals, server(s) 50, or acombination thereof, calculate the actions to be taken on respectivedata sets, and propagate(s) those actions out to the network viaserver(s) 50 and beyond to all other users.

In embodiments, terminal and system operations may or may not in wholeor in part effectuated, executed, or implemented on or via dark net W14(comprising at least all of, or just a portion of, terminal groups 401and 405) whereby individual terminals, server(s) 50, or a combinationthereof calculate the actions to be taken on respective data sets, andpropagate(s) those actions out to the network via server(s) 50 andbeyond to all other users.

In embodiments, terminal and system operations may or may not in wholeor in part effectuated, executed, or implemented on or via a peer topeer network W15 (comprising at least all of, or just a portion of,terminal groups 401 and 403) whereby one or more terminals, server(s)50, or a combination thereof, calculate the actions to be taken onrespective data sets, and propagate(s) those actions out to the network.

In embodiments, server(s) 50 execute instructions for user account datadeletion after a retention period—and not immediately upon server(s) 50receiving the instructions to delete certain data from one or moreterminals, and/or not immediately upon terminal(s) receiving theinstructions to delete certain data at one or more terminals.

In embodiments, at least one of terminals 201 to 251 transmitinstructions to server(s) 50 to execute instructions causing successfuldeletion of associated user account object data from database(s) 600. Inturn, associated account terminals, such as used by “friends” onFacebook®, may (or may not) receive alerting data indicating theeffectiveness of one or more of the herein disclosed embodiments,thereby creating an acceleration and scaling of at least several of thetechnical advantages of various herein disclosed embodiments.

In embodiments, each terminal may or may not be geographically remotefrom or local to the computers that access and control the storagedevices on which social network site user data are stored.

In embodiments, each terminal may or may not be part of one or moredevice set(s), the one or more device set(s) that may or may notcomprising only one or multiple-single user, entity (e.g., informalgroup) or participant—controlled, owned or used device(s).

In embodiments, any one or more of these terminal(s) or device set(s)may or may not include for example remote log-on and/or remote usage viaany Web-capable device to a Web-based ASP or peer-to-peer decentralizednetwork even though device ownership, possession and/or control is onlytemporary and/or through established via other-user-owned or installedapplications, such as by embedded or remote implementation via a widelyused social media site application or website.

In embodiments, client terminal 247 and server 50 can each beimplemented on a computing device. Such a computing device includes, butis not limited to, a personal computer, mobile device such as a mobilephone, workstation, embedded system, game console, television, set-topbox, or any other computing device that can support web browsing. Such acomputing device may include, but is not limited to, a device having aprocessor and memory for executing and storing instructions. Such acomputing device may include software, firmware, and hardware. Thecomputing device may also have multiple processors and multiple sharedor separate memory components. Software may include one or moreapplications and an operating system. Hardware can include, but is notlimited to, a processor, memory and graphical user interface display. Anoptional input device, such as a mouse or touch screen, may be used.

Software Modules

FIG. 2 illustrates content manager 200, according to embodiments.Content manager 200 may include one or more modules 1, 3, 5, and 7. Theterm “module” as used herein shall mean software, such as instructionsor code, but not hardware, such as a semiconductor hardwired logiccircuit in a processor.

Content manager 200 enables embodiments to delete (or otherwise preventdisplay of) server 50 and/or database 600 content selections. Inembodiments, content manager 200 can be implemented in server 50 (e.g.,as a server side component). In other embodiments, content manager 200can be implemented in browser 10. In yet other embodiments, contentmanager 200 can be implemented in both server 50 and browser 10. Asshown in FIG. 2, content manager 200 may or may not include, accessmodule 1, deletion indicia collection module 3, deletion module 5, andcalculation module 7.

In embodiments, access module 1 optionally includes displaying orbroadcasting a request for credentials to access a social network siteuser account 11. It then may include accessing and/or collecting datarepresenting the account or accounts such as credentials 13. It may alsoinclude transmitting or receiving instructions to create a communicationlink between the relevant social network owned, controlled and/oroperated servers and/or social network site owned, controlled oroperated databases on which a social network site stores user data onone hand, and a terminal used to access the site on the other hand, inaccordance with an embodiment herein disclosed 15. It may also includecommunication and data transfer to access both objects uploaded to thesocial network site by a user and/or friends, or one or more usersassociated by the site to the account user 17.

In embodiments, the displaying, broadcasting and or transmittinginstructions to obtain or access user account credentials may be madefrom any one or more of an account user operated and/or controlledterminal, a third party operated and/or controlled terminal, and asocial network site operated and controlled terminal or server(s).

As used herein, display or displaying are respectively a type ofbroadcast or a type of broadcasting, and broadcast and broadcasting eachinclude any digital data signal transduction into one or morereadily-understandable-by-human form, and which may be limited tobroadcast by only one device or more than one device.

In embodiments, indicia collection module 3 includes display orbroadcast of indicia or data that seek entry of what type of criteriaare to be used to determine what account object data are to be deleted19. It may then include collecting or searching for object data thatmeet the criteria selected 21. It may then determine whether all suchdata are collected by verifying through a secondary search on awebserver portal such as Google® and comparing the collected data withwhat is found in the secondary search 23. If not, the request for whattype of data is to be deleted 19 and the search and collection 21 areperformed again. Once no additional secondary (or subsequent) searchobject data are found or identified, the results of the items in termsof their type identity, upload and/or storage-date marking, size, and/ortotal number of items, may be calculated and/or stored in a datastructure, such as in a table in a store at the terminal (or local tothe data and/or under the control of the social network site operators)25.

In embodiments, deletion (or display prevention) module 5 may includepreparing instructions to delete (or prevent display of) data including,but not necessarily limited to, all text objects defined according tothe deletion (or display prevention) criteria 27, all photographicobjects defined according to the deletion criteria 29 and all videoobjects defined according to the deletion criteria 31. Module 5 maydetermine if all objects previously and optionally stored in, forexample, a terminal data structure table are identified in thetransmitted instructions 33, and if not, another request for the desireddeletion criteria is solicited 19 to confirm what objects are to bedeleted, followed by reprocessing. If all stored objects types oridentities are accounted for, deletion module 5 may e.g., then transmitthe requests to delete, and display that requests to delete the objectshave been transmitted 56, or continue to further optionally to calculatewhat objects to delete in accordance with the specific requirements ofthe social network site to delete at least one copy of the selectedobjects

In embodiments, the selection criteria may also and/or alternatelyinclude (any one or more of) whether whoever operates or controlsanother user account or computer of the social network site computernetwork has, had, or might in the future have, a certain relationshipstatus. A certain relationship may or may not include, but is notlimited to, friendship, courtship, and business, between the socialnetwork site account holder and an associated (or unassociated) socialsite network account holder. These criteria may be implemented bycausing one or more of server(s) 50 to execute instructions that preventthe display of a user's account object data on one or more computersoperated or controlled by a specific (or group of) person(s) with whomthe user is/was/or will be in a special relationship. This result may beaccomplished for example by instructions defining who has (via useraccount) and who does not (via user account) have permissions to viewsome or all of a user's object data.

Numerous other selection criteria are envisioned, and may also include,but are not limited to, e.g., whether the one or more other socialnetwork site computer network computer(s) is controlled or operated by auser or users presently having, or at any time having, one or more ofthe following status: any particular type of relational status, aparticular name, a personal ID, a user with whom the terminal user hashad lapses in times (or data volume) between communication(s),co-workers in a same organization or at a same workplace, or any otheraspect of a user's profile, such as but not limited to hair color,residential location, nationality, whether the user likes one or more ofthe same interests or activities another user, age, gender, if inschool, if under 18, if in a close friendship with a third-party user,whether the user e.g., smokes (or engages in any other type of activity)or e.g., discusses smoking (or discusses any other type of activity ortopic). Other criteria may or may not include, but is not limited to,popularity of user data (a company or personal user may wish to deleteor selectively show on a user-by-user basis, unpopular or popularcontent data), demographics (a company or personal user may wish toadjust its target audience, perhaps based on popularity), any locationassociated with the user object data, any users associated with the userobject data.

In embodiments, calculation module 7 may include specific calculationsin accordance with specific API and other requirements particular toeach social network site computer network, which may vary over time,vary from object to object, vary from object type to object type, varyfrom O/S to O/S, and/or vary from account user to account user. Thesecalculations may include, for example, separate determinations for text35, photographs 37, and videos 39. The required calculation(s) (such asa particular set of instructions) may be available only internally tothe operators of the social network site, to account users, and/or tothe public at large, for example.

In embodiments, calculation module 7 may for example cause aterminal(s), upon failure to remove one or more data object(s), toreport the failure to one or more update computer(s) (either operatedand/or controlled by or not operated and/or controlled by those whooperate and/or control the social network site), e.g., but not limitedto one or more of Google® Analytics server(s). These failure results maybe one or more of digitally corrected by widely broadcasting update(s)(e.g., pushing out a revised version of instructions) such as tonon-limiting content manager 300 below. User notification(s) of theupdate(s) may or may not occur in either foreground or backgroundembodiments.

In particular embodiments, where a social network site computer networkserver or database data undergo change(s), e.g., in one or more datastructures, thereby causing failure(s), instructions from one or moreterminal(s) cause broadcasting of report of the failure to one or moreof (1) other use terminal(s) and (2) the one or more update computer(s),either (a) on the social network site computer network or (b)interfacing with one or more computers that are one or more of never,previously, currently, and subsequently, on the social network computernetwork. In embodiments, update instructions transmitted by the one ormore update computer(s) may be broadcast via, e.g., but not limited to,Google® Play and Apple® App Store.

For example, in one or more of both foreground and background mode(s),when a calculating module or other module(s) encounter(s) one or morechange to Facebook®'s website that prevents execution of data deletionor other instruction, one or more error description(s) of the problem(s)is/are transmitted to one or more update server.

Such description(s) may include, but need not include nor be limited toinclude, transmission of metadata such as regarding date, time,application version number for a particular terminal O/S (e.g., Androidor iOS) and/or level or type of service.

For example, instructions to perform a task of one or more module fromthe terminal(s) have corresponding specific instructions that may or maynot vary from, that may or may not depend on, and/or that may or may notbe based on, one or more metadata characteristic(s), such as the O/S orother characteristics of each terminal or set of terminals found in acurrent or prior report associated with that terminal(s). Thesevariances and characteristics for example may or may not include, when aterminal transmits instructions requesting action at Facebook® servers,those instructions/request(s) may be based on an expectation that therequest should contain certain pieces of information to have an intendedeffect.

In particular non-limiting embodiments, instructions may or may notinclude determining whether the expected one or more piece(s) ofinformation are present in the instructions. If so, then instructionsproceed. If not, at least one error report is calculated and/ortransmitted from the terminal(s) that fail to send (directly orindirectly) successful instructions, to the update computer(s).

In embodiments, if determining whether the expected one or more piece(s)of information are not present in the instructions, at least one errorreport is calculated and/or transmitted from a computer(s) other thanthe terminal(s) that fail to send (directly or indirectly) successfulinstructions (e.g., from computer(s) on which one or more of text,terminal model and/or O/S-specific features of error report, etc., arestored), to the update computer(s). Where many common sets of terminalinstructions—for example, regarding massive numbers of data objectsdeleted according to instructions from the same or like-featured phoneor O/S-specific web application—confront the same basic failures for thesame basic reasons; having such designated first party, second party orthird party servers will help allow scaling.

In embodiments, instructions, e.g. to connect to or select data from ageneral or specific data structure of Facebook®'s server or database,that do not receive a response or otherwise fail (after analysing aresponse to request access or data), cause further instructions totransmit an error report. In embodiments, problem description(s) and/orreports may be in part or in whole, pre-defined and pre-stored based onany one or more of (but not limited to), pre-defined message(s)describing the problem, filename(s) containing the instruction(s) thatled to the error(s), and the line number(s) in the filename containingthe instruction(s) that led to the error(s). If an error arises, thenthe module(s) may or may not proceed.

In foreground or background mode embodiments, the terminal(s) maypresent a terminal user(s) with the message “This app is currentlyunavailable.” In alternate foreground or background mode embodiments,terminal(s) may or may not ignore some errors and reschedule the taskfor a later time, until one or module instructions are patched before anext run (see below).

In embodiments, when an update computer(s) (e.g., Google® Analytics)receives an error report from a user terminal(s), the update computer(s)sends the report(s) to another terminal(s) (optionally one or more ofnever, previously, currently and subsequently) on the social networksite computer network, indicating the error(s) and/or source of theerror(s). This error report(s) is then used to identify one or more ofthe precise module instruction(s) that fail to work. One or more modulemay or may not be updated by one or more module that recalculateinstructions to create patch or new module instructions, which aredistributed to user terminal(s), e.g. as a new version available (e.g.,but not limited to, via Google® Play for Android or Apple® App Store).

In embodiments, a terminal's O/S will periodically check for app updates(e.g., via Google® Play or Apple® App Store) and may automaticallydownload and install such updates. Hence, by creating and distributingnew module version(s) to user terminal(s), terminal(s) includeup-to-date versions of modules. It follows that many terminal users willnever know that modules encountered a problem, because module(s) will beautomatically or manually fixed before a user notices any failure.

In embodiments, one or more modules include at least one reportingmechanism instructions to manage statistics, e.g., a module reports howmany statuses have been deleted, to Google® Analytics.

In alternate or additional embodiments, a terminal operating systemautomatically discovers the revised instructions transmitted due to thefailure(s) and update the instructions on the terminal.

After (or as soon as) calculating module 7 instructions for one or moreof connecting to, accessing or selecting data at, and deleting datafrom, a social network site server/database, are calculated andtransmitted, a secondary search is made on the social network site,either immediately or at a time appropriate to account for any timedelay caused by a particular social network site in deleting objects, toverify whether each object is deleted 41. If not, the process beginsagain with any aspect of indicia collection module 3. If so, a messageto broadcast to the user to indicate any expected time delay, asnecessary 9.

Once complete deletion is independently verified, a message is displayedor otherwise broadcast to indicate successful object deletion 56. Inalternate embodiments, partial success, and for example, object byobject reporting may be broadcast to a user.

In embodiments, any one or more of the modules above or other modules inaccordance with other embodiments, may alternately be replaced byindividual means for performing one or more functions of the modules,steps, and individual features disclosed herein.

In embodiments, execution of the instructions at server(s) 50 ordatabase 600, any of which can be located anywhere in the world, mayoccur according to, e.g., the times at which such requests are sent,according to the bandwidth and transmission speed of the network pathwayto server(s) 50 and then database 600, and according to the distance(s)to and between a terminal on one hand, and server(s) 50 and database 600on the other, for example, and according to the maximum number ofparallel requests that a terminal is capable of sending at the sametime. As a result the speed at which instructions are ultimatelyexecuted can vary greatly, from even nanoseconds, to minutes, or even tohours or days and longer.

In embodiments, transmissions of instructions may be instantaneous via,e.g., but not limited to, sending multiple requests in parallel, whereineach set of requests is sent after a regular or irregular time interval.The number of parallel requests may be any integer in the followingprogression from 0 to 1 or up to 1000s in parallel (i.e., 1, 2, 3, 4, 5,6, 7, . . . 25 . . . 100 . . . 200, 201, . . . up to 10000 or more).

In embodiments, one or more random number generator(s) may or may not beused to determine when to transmit instructions and the number ofcommands to send in parallel at a particular time (as limited in wholeor in part by the terminal from which the instructions are sent).

In embodiments, instructions sent to server(s) 50 and database 600 maybe calculated to obscure the fingerprint of a terminal that is beingused. In addition, or alternately, instructions may be calculated tovary the speed and number of requests to delete (or otherwise preventdisplay of) data sent by the terminal or received by server(s) 50 anddatabase 600, such as by randomizing the speed of the time at whichpermission prevention is effectuated, or randomizing the speed at whichsequential data deletion occurs.

In embodiments, instructions sent to server(s) 50 and database 600 maybe calculated to overcome attempts to block mass or speedy deletion (orprevention of legible or other display) by, e.g., prompting a user tofill out a CAPTHA (or other human-indentifying proof submissionrequirement).

In embodiments, instructions sent to server(s) 50 and database 600 maybe calculated to overcome attempts to examine an amount of data deletedfrom or operated on, for a particular user account. For example, ininstances where a social network site computer network provides an APIthat allows automation for some functions, but not for user personaldata deletion, this feature counters a de facto violation of a user'sdesire to maintain personal data privacy and thereby promotes personaldata information security.

In embodiments, objects are deleted (or otherwise prevented from beingdisplayed) based on how long ago they are posted to an account. Theterminal displays an adjustable object retention selection period. Forinstance, it can be variously extended as recently as one day, and asfar back in time as 10 or even 20 years, though any time in years,months, days may be selected. Selection and setting of the retentiontime affects what objects are deleted, such that all objects or allobjects of a certain type are subjected to deletion when an instructionto delete objects is transmitted to the at least one remote or localservers or storage devices on which the objects are stored.

Non-limiting examples of object data that may be deleted include accountuser status text, videos, photographs, and URLs originally self-uploadedby an account user to an individual user account (which may or may notbe reported to other user accounts), and account user-identifying tagsthat are associated with photographic or video content. Non-limitingspecific examples are one or more of photographs and/or accompanyingtext object(s); videos and/or accompanying text object(s); URLs and/oraccompanying text object(s); self-posted comments and other usercomments on status text objects, videos, photographs, and URLs.

In embodiments, after objects are deleted instructions may betransmitted to search for the deleted object(s) either individually,immediately after its deletion is instructed, or only after all objectsin the selected subset are deleted. In accordance with whether an objectis found, a notification is displayed or broadcast, accounting for eachundeleted and/or deleted object is, either collectively or individually(on an object-by-object basis).

FIG. 3 illustrates method 300, which is an exemplary overall operationof content manager 200, according to embodiments in one or more terminal(or alternately in one or more server, or in any combination thereof).The following workflow can, for example, be instantiated solely orcollectively by any combination of instructions from one or more of anapp GUI, and the terminal's O/S (as a background process). Inembodiments, categories of object data to be deleted are loaded from astorage device (step 1), if previously stored. (At first or subsequentinstallation of content manager 200 the steps of method 300, usernameand password or other social network site credentials may be previouslyobtained and stored in the terminal or a remote store, for examplebefore a terminal is disconnected and reconnected to the social networksite computer network). Whether deletion categories are marked orselected is determined (step 3). If not, the terminal displays orotherwise broadcasts that no items are marked for deletion (step 5).Then, the terminal receives input of data that indicate or select whatcategories of data are to be deleted. (step 7), and such categories areagain loaded or otherwise accessed.

If the deletion categories (and/or non-default retention period) aresuccessfully accessed, whether a network connection is established isdetermined (step 9). If no network connected is established, theterminal displays or otherwise broadcasts that the network isunavailable (step 11) and optionally continues to determine whether thenetwork connection is established, until it is established.

After (or as soon as) a network connection is established, method 300determines whether a user subscription is current and available (step13). If not, then the terminal displays or otherwise broadcasts that thesubscription is not current (step 15) and the method waits to proceeduntil the subscription is up-to-date in payment and having validstanding and or updates.

If the application subscription is current and valid, the methoddetermines if errors are to be handled (step 17) and if so the terminaldisplays or otherwise broadcasts instructions to re-enter relevantmissing or incorrect information (step 19). These and other errordetermination(s) may alternately be performed at any one or more earlieror later stage(s), be variously repeated, and/or be split into varioustypes and performed separately or concurrently at once or at variousstages and in various orders.

In embodiments, error handling may alternately or additionally include,optionally at any terminal user's option, reporting to a serverinformation such as metadata about batch or specific object data relatedfailed connections or tasks regarding any one or more of the steps (orfeatures of steps) undertaken by method 300.

In embodiments, though not required in the same sequence as method 300,access to a social network site user account is initiated (step 21),either by acquiring social network site access (such as, but not limitedto, login user name and password) credentials at a GUI or by accessingpreloaded or pre-stored access credentials from a store (located in theterminal or from an external device such as a remote store).

Method 300 then determines whether the credentials are defined, i.e. arestored as a set of user credentials associated with content manager 200or the subscription (step 23). If not, the terminal displays orotherwise broadcasts that no credentials are found, entered or exist(step 25). If so, the retention period defined by the user and stored inthe terminal or elsewhere are loaded, or a default retention period isloaded if no user-supplied value is stored, accessed or retrieved (step27)

In embodiments, social network site access credentials are transmittedto servers or databases on which access permission may be granted, toauthenticate and establish digital communication connection with thesocial network site server(s) (step 29). This step (and/or other steps)may be performed directly from one terminal to a server or indirectlyfrom a terminal to several other terminals or servers. In embodiments,method 300 sends requests that search for items not dated within thedesignated retention period (step 31). In embodiments, found objectsthat fall outside of the retention period are deleted from the store,such as database 600, on which they are stored (step 33).

Steps 29, 31, and 33 differ depending on each social network siteaccessed and managed. In an exemplary method regarding a Facebook®account, a headless browser performs step 29. Then, the method searchesfor the designated or selected objects using either Facebook®'s API orheadless browsing. Finally, headless browsing is used to delete itemsidentified in the search. The precise way in which objects are deletedwill depend upon the object type, e.g., deletion of a user namephotograph tag will differ from status update texts on Facebook®.

In embodiments, method 300 includes causing the terminal to display orotherwise broadcast results of the prior steps (step 35).

In embodiments, the sequence of the above steps may be altered assuitable to achieve any one or more of the functionality and effectsindicated herein. For example, collection of access information such aslogin credentials may occur intermittently between instructions beingsent to server 50 (or database 600 if via a LAN).

In embodiments, various steps and various combinations of features ofsteps of content manager 200 may be running in the same or differentsequences, either in the foreground or background. If, for example,running in the foreground, all feedback is provided directly to a uservia the content manager's 200 GUI as data are deleted, for example on anobject-by-object basis. When content manager 200 is running in thebackground, all feedback is provided via a phone or PC O/S, for exampleafter all data within a manually set expiration date are deleted.

In embodiments, more (or less) detailed feedback may be provided in theforeground mode, because a GUI provides a relatively higher (orlower)-bandwidth channel By comparison, feedback may be more limited (orless limited) in background mode, because an O/S provides a relativelylower (or higher)-bandwidth information channel (e.g., limiting displayof results and updates to one to a few lines of text).

System and Digital Communications Network Hardware

Another aspect of the disclosure is a computer system. Referring to FIG.4 and according to at least one embodiment, the techniques describedherein are implemented by one or more special-purpose computing devices.The special-purpose computing devices may be hard-wired to perform thetechniques, or may include digital electronic devices such as one ormore application-specific integrated circuits (ASICs) or fieldprogrammable gate arrays (FPGAs) that are persistently programmed toperform the techniques, or may include one or more general purposehardware processors programmed to perform the techniques pursuant toprogram instructions in firmware, memory, other storage, or acombination. Such special-purpose computing devices may also combinecustom hard-wired logic, ASICs, or FPGAs with custom programming toaccomplish the techniques. The special-purpose computing devices may bedesktop computer systems, portable computer systems, handheld devices,networking devices or any other device that incorporates hard-wiredand/or program logic to implement the techniques.

For example, FIG. 4 is a block diagram that illustrates a computersystem 500 upon which an embodiment may be implemented. Computer system500 includes a bus 502 or other communication mechanism forcommunicating information, and a hardware processor 504 coupled with bus502 for processing information. Hardware processor 504 may be, forexample, a general purpose microprocessor.

Computer system 500 also includes a main memory 506, such as a randomaccess memory (RAM) or other dynamic storage device, coupled to bus 502for storing information and instructions to be executed by processor504. Main memory 506 also may be used for storing temporary variables orother intermediate information during execution of instructions to beexecuted by processor 504. Such instructions, when stored innon-transitory storage media accessible to processor 504, rendercomputer system 500 into a special-purpose machine that is customized toperform the operations specified in the instructions.

Computer system 500 further includes a read only memory (ROM) 508 orother static storage device coupled to bus 502 for storing staticinformation and instructions for processor 504. A storage device 510,such as a magnetic disk or optical disk, is provided and coupled to bus502 for storing information and instructions.

Computer system 500 may be coupled via bus 502 to a display 512, such asa cathode ray tube (CRT), for displaying information to a computer user.An input device 514, including alphanumeric and other keys, is coupledto bus 502 for communicating information and command selections toprocessor 504. Another type of user input device is cursor control 516,such as a mouse, a trackball, or cursor direction keys for communicatingdirection information and command selections to processor 504 and forcontrolling cursor movement on display 512. This input device typicallyhas two degrees of freedom in two axes, a first axis (e.g., x) and asecond axis (e.g., y), that allows the device to specify positions in aplane.

Computer system 500 may implement the techniques described herein usingcustomized hard-wired logic, one or more ASICs or FPGAs, firmware and/orprogram logic which in combination with the computer system causes orprograms computer system 500 to be a special-purpose machine. Accordingto at least one embodiment, the techniques herein are performed bycomputer system 500 in response to processor 504 executing one or moresequences of one or more instructions contained in main memory 506. Suchinstructions may be read into main memory 506 from another storagemedium, such as storage device 510. Execution of the sequences ofinstructions contained in main memory 506 causes processor 504 toperform the process operations described herein. In alternativeembodiments, hard-wired circuitry may be used in place of or incombination with software instructions.

The terms “storage media” and “storage device” as used herein refer toany non-transitory media that store data and/or instructions that causea machine to operate in a specific fashion. Such storage media maycomprise non-volatile media and/or volatile media. Non-volatile mediaincludes, for example, optical or magnetic disks, such as storage device510. Volatile media includes dynamic memory, such as main memory 506.Common forms of storage media include, for example, a floppy disk, aflexible disk, hard disk, solid state drive, magnetic tape, or any othermagnetic data storage medium, a CD-ROM, any other optical data storagemedium, any physical medium with patterns of holes, a RAM, a PROM, andEPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge.

Storage media and storage device are distinct from but may be used inconjunction with transmission media. Transmission media participates intransferring information between storage media/devices. For example,transmission media includes coaxial cables, copper wire and fiberoptics, including the wires that comprise bus 502. Transmission mediacan also take the form of acoustic or light waves, such as thosegenerated during radio-wave and infra-red data communications.

Various forms of media may be involved in carrying one or more sequencesof one or more instructions to processor 504 for execution. For example,the instructions may initially be carried on a magnetic disk or solidstate drive of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to computer system 500 canreceive the data on the telephone line and use an infra-red transmitterto convert the data to an infra-red signal. An infra-red detector canreceive the data carried in the infra-red signal and appropriatecircuitry can place the data on bus 502. Bus 502 carries the data tomain memory 506, from which processor 504 retrieves and executes theinstructions. The instructions received by main memory 506 mayoptionally be stored on storage device 510 either before or afterexecution by processor 504.

Computer system 500 also includes a communication interface 518 coupledto bus 502. Communication interface 518 provides a two-way datacommunication coupling to a network link 520 that is connected to alocal network 522. For example, communication interface 518 may be anintegrated services digital network (ISDN) card, cable modem, satellitemodem, or a modem to provide a data communication connection to acorresponding type of telephone line. As another example, communicationinterface 518 may be a local area network (LAN) card to provide a datacommunication connection to a compatible LAN. Wireless links may also beimplemented. In at least one such implementation, communicationinterface 518 sends and receives one or more of electrical,electromagnetic and optical signals (as with all uses of “one or more”herein implicitly including any combination of one or more of these)that carry digital data streams representing various types ofinformation.

Network link 520 typically provides data communication through one ormore networks to other data devices. For example, network link 520 mayprovide a connection through local network 522 to a host computer 524 orto data equipment operated by an Internet Service Provider (ISP) 526.ISP 526 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the“Internet” 528. Local network 522 and Internet 528 both use electrical,electromagnetic or optical signals that carry digital data streams. Thesignals through the various networks and the signals on network link 520and through communication interface 518, which carry the digital data toand from computer system 500, are example forms of transmission media.

Computer system 500 can send messages and receive data, includingprogram code, through the network(s), network link 520 and communicationinterface 518. In at least one embodiment of the Internet example, aserver 530 might transmit a requested code for an application programthrough Internet 528, ISP 526, local network 522 and communicationinterface 518.

In embodiments, the received code may be one or more of executed byprocessor 504 as it is received, and/or stored in storage device 510, orother non-volatile storage for later execution.

Now referring to FIG. 5, in at least one embodiment a device used inaccordance with this disclosure is or comprises mobile display or touchscreen input smart phone or tablet 535, which is shown displaying directuser-to-device input message text and or image(s), or remotely receivedmessage text and/or image(s) 540.

Computer-Readable Medium

Another aspect of the disclosure is one or more computer-readable media(or computer storage apparatus) having a program, which when executed byone or more processors, such part of one or more of the systemsdescribed herein, causes the one or more processors to enable, allow orcause devices to perform any one of the methods as variously comprisingany one or more of its various embodiments or sub-embodiments describedabove or otherwise covered by the appended claims.

In embodiments, the one or more computer-readable media arenon-transitory media such as, but not limited to HDD and SSD diskdrives, thumb and other flash drives, DVDs, CDs, various static anddynamic storage devices and other numerous storage media.

In embodiments, the one or more computer-readable media comprise or areone or more transitory electronic signals.

The following numbered clauses set forth various embodiments of thedisclosure:

1.At least one

-   -   (a) computer-implemented method,    -   (b) (optionally, one or more of (i) personal, (ii)        not-user-controlled, (iii) not-user-operated, (iv)        user-controlled and (v) user-operated) terminal by way of (i) at        least one processor; and at least one memory storing        instructions that, when executed by the at least one processor,        causing the at least one processor to, (ii) means or (iii)        software module(s) for performing operation(s),    -   (c) system by way of (i) at least one processor; and at least        one memory storing instructions that, when executed by the at        least one processor, causing the at least one processor to, (ii)        means or (iii) software module(s) for performing operations(s),        or    -   (d) transitory or non-transitory computer-readable medium (or        alternately also herein throughout, computer storage apparatus)        containing instructions which when executed by one or more        computers each or collectively comprising one or more processors        cause operation(s), according to any one of the preceding        clauses, the operation(s) comprising:

collecting or accessing data uniquely representative of, or uniquelyindicating, one or more digitally stored and operated social networksite user account(s) and transmitting data necessary to access andcontrol the one or more digitally stored and operated social networksite user account(s) to at least one remote (or local) computer(s);

2. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising displaying indicia, broadcasting data, ortransmitting instructions, to solicit collection of or to access datauniquely representative of, or uniquely indicating, one or moredigitally stored and operated social network site user account(s);

3. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising establishing direct or indirect communication accessand linkage between the terminal and at least one remote (or local,optionally for any and/or all instances herein) computer(s) on which arestored, or by which access is available to control (e.g., delete),stored user account object data that were input or modified during prioraccess to and control over:

-   -   the one or more social network site user account(s) or    -   associated social network site user account(s) that at some        prior time had permission to edit data in, or append data to,        the stored user account object data of the one or more social        network site user account(s),        the stored user account data of the one or more user account(s)        uniquely accessible based on access data digitally pre-assigned        only to the one or more social network site user account(s);

4. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising displaying indicia, or broadcasting data,representative of or indicating one or more predetermined criteria forselecting a strict or proper subset (or optionally, non-strict andnon-proper subset) of the stored user account object data;

5. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising collecting data, representative of, or indicating,(optionally only, as with respect to the user account object data) thesubset of the stored user account object data based on the one or more(optionally, one or more of user-defined and predetermined) criteria forselecting the subset of the stored user account object data that wereinput or modified during prior access to and control over the one ormore user account(s) or associated social network site user account(s)that at some prior time had permission to edit data in, or append datato, the user account object data of the one or more user account(s);

6. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising transmitting instructions to delete or otherwiseprevent legible display of (optionally only or optionally only for oneor more of certain types of object data such as certain types of one ormore of text, video, and photographic object data items, or only fromone or more of certain data sources, user accounts, and user accountdata profile(s)) the subset of the stored user account object data,according to the collected data representative of, or indicating, theone or more (predetermined and/or pre-stored on one or more of the atleast one remote or local computer and the terminal or terminals)criteria for selecting the subset of the stored user account objectdata, from the terminal to the at least one remote computer(s)

7. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the instructions are calculated to cause the at least one remotecomputer(s) on which are stored, or by which access is available tocontrol (e.g., delete), the stored user account object data, to,optionally in whole or in part, prevent display of (e.g., delete) theselected subset of the stored user account object data (optionally, fromat least one database on which are stored the subset of the stored useraccount object data) at every (or all, most, about 10%, about 20%, about30%, about 40%, about 50%, about 60%, about 70%, about 80%, about 90%,or about 100%, at any given time) user account terminal of the socialnetwork site computer network, based on the one or more predeterminedcriteria, the instructions including selection and deletion of at leastone copy of all stored user account object data in the subset of theuser account object data.

8. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein one or more of:

-   -   (a) the instructions are transmitted at random intervals,    -   (b) the instructions are transmitted in parallel; and    -   (c) the collecting or accessing of data representative of, or        indicating, the subset of the user account object data, is one        or more of:        -   (1) simultaneous in time with respect to each and every one            of the objects in the subset,        -   (2) performed at predetermined times based on at least one            predetermined (and/or prestored) set of digital            instructions, the at least one predetermined set being            optionally pre-determined at a time prior to or at least            before predetermination of the data representative of, or            indicating, the display, broadcast or collection of data            representative or indicating the predetermined criteria,        -   (3) simultaneous or performed at predetermined times based            on at least one predetermined set of digital instructions,            optionally pre-determined at least before the data            representative of, or indicating, the display, broadcast or            collection of data representative or indicating the            predetermined criteria;        -   (4) simultaneous or performed at predetermined time(s) based            on at least one predetermined set of digital instructions,            the single or multiple times pre-determined at least before            the data representative of, or indicating, the display,            broadcast or collection of data representative or indicating            the predetermined criteria;        -   (5) simultaneous based on at least one predetermined set of            digital instructions;        -   (6) performed at predetermined time(s) based on at least one            predetermined set of digital instructions;        -   (7) instantaneous;        -   (8) all completed before any of the instructions are            transmitted;        -   (9) repeated for at least two of the user account object            data before any of the instructions are transmitted;        -   (10) at least 10% completed before any of the instructions            are transmitted;        -   (11) at least 20% completed before any of the instructions            are transmitted;        -   (12) at least 30% completed before any of the instructions            are transmitted;        -   (13) at least 40% completed before any of the instructions            are transmitted;        -   (14) at least 50% completed before any of the instructions            are transmitted;        -   (15) at least 60% completed before any of the instructions            are transmitted;        -   (16) at least 70% completed before any of the instructions            are transmitted;        -   (17) at least 80% completed before any of the instructions            are transmitted;        -   (18) at least 90% completed before any of the instructions            are transmitted;        -   (19) in whole or in part completed followed by the            instructions being transmitted in parallel;        -   (20) in whole or in part completed followed by the            instructions being transmitted at random intervals.

9. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the at least one remote computer(s) are one or more of operatedand controlled by a user or set of users other than the user or set ofusers of the terminal.

10. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising storing the data representative of, or indicating,the one or more predetermined criteria for selecting the subset of thestored personal data.

11. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the at least one remote computer(s) at one time (optionallywhich herein is defined to account for reasonable and normal tolerancesin micro-processing speed, bus transmission (or other hardware; oroptionally subject only to limitations specific to the social networksite computer network after instructions are transmitted from theterminal) and intra-computer and/or intra-network speeds to execute allinstructions for the selected objects) receive, forward to other of theat least one remote computers or database for execution, then execute,(or optionally initiate execution of), the instructions for all theobjects in the selected subset.

12. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the (optionally, one or more of not-user-controlled,not-user-operated, user-controlled and user-operated) terminaltransmits, or initiates simultaneous or (optionally digitallypredetermined) periodic transmission over a digitally predetermined timeof, each and every instruction for all objects in the selected subset tothe at least one remote computer(s).

13. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the instructions to prevent display of (e.g., delete, nottransmit, not receive, not legibly display) the selected subset areexecuted to delete each and every object of the selected subset, at arate according to and limited only by the processing speed(s) and datatransmission speed(s) of the at least one remote computer(s) and/or inthe case of non-display, the processing speed(s) and data transmissionspeed(s) as between the at least one remote computers and other accountuser terminals.

14. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the speed or speeds at which the at least one remote computer(s)store and initiate execution of, the instructions is/are limited only bythe time(s) at which one or more of the at least one remote computersreceive (or the single time or multiple times the terminal starts toprocess, or processes, all of) the instructions for the objects in theselected subset, and the time(s) between which the at least one remotecomputers receive (or the single time or multiple times the terminalstarts to process, or processes, all of) the instructions for theobjects in the selected subset and the time(s) when the at least oneremote computers initiate (or the single time or multiple times theterminal starts or completes) execution of the instructions to deletethe objects in the selected subset.

15. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the (optionally, one or more of not-user-controlled,not-user-operated, user-controlled and user-operated) terminalperiodically transmits (or receives or executes) the instructions of thesubset, on an object-by-object or group-of-objects-by-group-of-objectsbasis, at one or more regular intervals of time, at one or moreirregular intervals of time, together at one time, or in any combinationthereof.

16. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the at least one remote computer(s) is communicatively connectedto one or more databases on which are stored the selected subset, andwherein the at least one remote computer(s) (or terminal(s)) initiateexecution of, or execute, the instructions to delete (or otherwiseprevent display of) the selected subset, in a predetermined time periodbased on instructions that are stored by the at least one remotecomputer(s) before any of the instructions to delete (or otherwiseprevent display of) the selected subset are received by the at least oneremote computer(s) (optionally, if they are received or sent from theterminal at all).

17. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the calculation is performed in whole or in part by the terminalor by a terminal that is not under the control or operation of a user orusers of the at least one remote computer(s).

18. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the calculation is performed in whole or in part by one or moreof the at least one remote computer(s) and a second set of at least oneremote computers, any or all of the at least one remote computer(s) andsecond set of at least one remote computers being located in a domesticor foreign national country.

19. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the instructions are calculated to simulate data acquisitionbased on sequential and stepwise GUI or other peripheral data collectionvia one or more of keyboard, mouse, and other peripherals connected tothe terminal, wherein peripheral data collection is generated based ondisplay or other peripheral output.

20. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein data received from one or more peripherals is simulated in orderto collect the data representative of, or indicating, the subset ofstored user account object data.

21. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein date-criteria data used in the calculation of the instructionsis deduced from scanning user account object data for one or more ofdate-embedded, date-classified and date-uploaded media objectscomprising one or more of photographic data, video data, and text data.

22. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein

-   -   the data representative of, or indicating, the one or more        predetermined criteria for selecting the subset of the stored        user account object data that were input or modified during        prior access to and control over the one or more user account(s)        or associated user social network site accounts that at some        prior time had permission to edit data in, or append data to,        the stored user account object data, and    -   date-criteria data, optionally such that date-criteria data        comprises a date such that data objects stored or uploaded to        the at least one remote computer(s) before the date are        identified for deletion or included in a set for deletion; are        used to determine the subset of the stored user account object        data.

23. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the at least one remote computer(s) is controlled by one or moreremote user(s), the one or more remote computer(s) not having access tocontrol what criteria data are collected (or what one or morepredetermined criteria are used) to calculate the subset of the useraccount object data at the terminal

24. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein at least one remote computer(s) execute(s) instructions to storeobject data uniquely associated with a different user account, whichindicate successful deletion (or display prevention) of associated useraccount object data that were stored on the at least one database, andtransmit the indicative data to other terminals associated with otheruser accounts.

25. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising displaying or broadcasting confirmation that thesubset of stored user account object data have been deleted from the atleast one remote computer(s).

26. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the subset is deleted, and optionally, the deleted subset of thestored user account object data includes all of the stored user accountobject data that were

-   -   input or modified during prior access to and control over the        one or more social network site user account(s), and input or        modified via access and control over associated social network        site user account(s) that at some prior time had permission to        edit data in, or append data to, the stored user account object        data of the one or more social network site user account(s); and    -   stored on the database(s)        at least as early as or before, a specific date, which is (the        specific date being, in whole or in part) the one or more        predetermined criteria.

27. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the terminal initiates simultaneous or (optionally digitallypredetermined) periodic execution over a digitally predetermined timeof, each and every instruction for all objects in the selected subset tothe at least one remote computer(s).

28. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein when the terminal indirectly or directly transmits at least oneinstruction to the at least one remote (or local) computer(s) and the atleast one instruction fails, one or more of:

-   -   the terminal indirectly or directly transmits (1) at least one        error report, or (2) information on which the at least one error        report is based,    -   at least one update computer (optionally on or not on the social        network site computer network) receives at least one error        report (directly or indirectly) from the terminal or another        computer,    -   the update computer(s) sends instructions or information based        on the error report(s) directly or indirectly to another        terminal(s) that are one or more of previously, currently and        subsequently on the social network site computer network,        indicating error(s) and/or source of error(s), and    -   a recalculation module (on any one or more of the terminal,        another terminal, or on another computer) updates one or more of        the modules (implicitly or explicitly) disclosed herein, by        recalculating instructions, optionally to create new module        instructions, which are distributed directly or indirectly to        the terminal;    -   the terminal receives recalculated or updated instructions,        optionally used to create new module(s) instructions.

29. A method, terminal, system, or computer readable media according toany one of the preceding clauses, comprising any one or more of:

-   -   a software module arranged to access, collect, and/or store one        or more credentials data, deletion criteria data, and deletion        timing data, each relating to the terminal or one or more social        network site user account(s);    -   transceiving module arranged to receive deletion criteria data,        either directly or indirectly to transmit the collected deletion        criteria data (or optionally or alternately data representative        of the collected deletion criteria data) to at least one        computer (geographically local or geographically) remote from        the terminal, the at least one remote computer having social        network site user account object data stored thereon (or        providing access to one or more databases on which the account        object data are stored);    -   one or more of a store arranged to store and a display or user        communication module arranged to display or broadcast results,        including one or more of error indicia and completion indicia;    -   a second user communication module comprising a display module        and/or a broadcast module arranged to display confirmation that        object data have been deleted from the at least one remote        computer.

30. A method, terminal, system, or computer readable media according toany one of the preceding clauses, comprising any one or more of:

-   -   a first means arranged to collect or access data uniquely        representative of, or uniquely indicating, the one or more        social network site user account(s) and transmitting data        necessary to access and control the one or more digitally stored        and operated social network site user account(s) to at least one        remote computer(s);    -   a second means arranged to establish direct or indirect        communication access and linkage between the terminal and the at        least one remote computer(s) on which are stored, or by which        access is available to delete, stored user account object data        that were input or modified during prior access to and control        over:        -   the one or more social network site user account(s) or        -   associated social network site user account(s) that at some            prior time had permission to edit data in, or append data            to, the stored user account object data of the one or more            social network site user account(s), the stored user account            data of the one or more user account(s) uniquely accessible            based on access data digitally pre-assigned only to the one            or more social network site user account(s);    -   a third means arranged to display indicia, or broadcast data,        representative of or indicating one or more predetermined        criteria for selecting a subset of the stored user account        object data;    -   a forth means arranged to collect data representative of, or        indicating, the subset of the stored user account object data        based on the one or more predetermined criteria for selecting        the subset of the stored user account object data that were        input or modified during prior access to and control over the        one or more user account(s) or associated social network site        user account(s) that at some prior time had permission to edit        data in, or append data to, the user account object data of the        one or more user account(s); and    -   a fifth means arranged to transmit instructions to delete only        the subset of the stored user account object data, according to        the collected data representative of, or indicating, the one or        more predetermined criteria for selecting the subset of the        stored user account object data, from the terminal to the at        least one remote computer(s);    -   wherein the instructions are calculated to cause the at least        one remote computer(s) on which are stored, or by which access        is available to delete, the stored user account object data, to,        in whole (or optionally in part), delete the selected subset of        the stored user account object data from at least one database        on which are stored the subset of the stored user account object        data, based on the one or more predetermined criteria, the        instructions including selection and deletion of at least one        copy of all stored user account object data in the subset of the        user account object data.

31. A system according to any one of the preceding clauses or belowclaims, wherein the collecting of data representative of, or indicating,the subset of the user account object data, is simultaneous or performedat predetermined times based on at least one predetermined set ofdigital instructions, optionally pre-determined at least before the datarepresentative of, or indicting, the display, broadcast or collection ofdata representative or indicating the predetermined criteria.

32. A system according to any one of the preceding clauses or belowclaims, further comprising storing the data representative of, orindicating, the one or more predetermined criteria for selecting thesubset of the stored personal data.

33. A system according to any one of the preceding clauses or belowclaims, wherein the instructions are calculated to simulate dataacquisition based on sequential and stepwise GUI or other peripheraldata collection via one or more of keyboard, mouse, and otherperipherals connected to the terminal, wherein peripheral datacollection is generated based on display or other peripheral output.

34. A system according to any one of the preceding clauses or belowclaims, wherein the deleted subset of the stored user account objectdata includes all of the stored user account object data that were

-   -   input or modified during prior access to and control over the        one or more social network site user account(s) and input or        modified via and access and control over associated social        network site user account(s) that at some prior time had        permission to edit data in, or append data to, the stored user        account object data of the one or more social network site user        account(s); and    -   stored on the database(s) at least as early as,        before a specific date, which is the one or more predetermined        criteria.

35. A system according to any one of the preceding clauses or belowclaims, wherein if or when the terminal indirectly or directly transmitsat least one instruction to the at least one remote or local computer(s)and the at least one instruction fails, one or more of:

-   -   the terminal indirectly or directly transmits (1) at least one        error report, or (2) information on which the at least one error        report is based,    -   at least one update computer on or not on the social network        site computer network receives at least one error report        directly or indirectly from the terminal or another computer,    -   the update computer(s) sends instructions or information based        on the error report(s) directly or indirectly to another        terminal(s) that are one or more of previously, currently and        subsequently on the social network site computer network,        indicating error(s) and/or source of error(s), and    -   a recalculation module (on any one or more of the terminal,        another terminal, or on another computer) updates one or more        module(s), by recalculating instructions, optionally to create        new module instructions, which are distributed directly or        indirectly to the terminal;    -   the terminal receives recalculated or updated instructions,        optionally used to create new module(s) instructions.

36. A computer storage apparatus according to any one of the precedingclauses or below claims, wherein the collecting of data representativeof, or indicating, the subset of the user account object data, issimultaneous or performed at predetermined times based on at least onepredetermined set of digital instructions, optionally pre-determined atleast before the data representative of, or indicting, the display,broadcast or collection of data representative or indicating thepredetermined criteria.

37. A computer storage apparatus according to any one of the precedingclauses or below claims, further comprising storing the datarepresentative of, or indicating, the one or more predetermined criteriafor selecting the subset of the stored personal data.

38. A computer storage apparatus according to any one of the precedingclauses or below claims, wherein the instructions are calculated tosimulate data acquisition based on sequential and stepwise GUI or otherperipheral data collection via one or more of keyboard, mouse, and otherperipherals connected to the terminal, wherein peripheral datacollection is generated based on display or other peripheral output.

39. A computer storage apparatus according to any one of the precedingclauses or below claims, wherein the deleted subset of the stored useraccount object data includes all of the stored user account object datathat were

-   -   input or modified during prior access to and control over the        one or more social network site user account(s) and input or        modified via and access and control over associated social        network site user account(s) that at some prior time had        permission to edit data in, or append data to, the stored user        account object data of the one or more social network site user        account(s); and    -   stored on the database(s) at least as early as,        before a specific date, which is the one or more predetermined        criteria.

40. A computer storage apparatus according to any one of the precedingclauses or below claims, wherein if or when the terminal indirectly ordirectly transmits at least one instruction to the at least one remote(or local) computer(s) and the at least one instruction fails, one ormore of:

-   -   the terminal indirectly or directly transmits (1) at least one        error report, or (2) information on which the at least one error        report is based,    -   at least one update computer on or not on the social network        site computer network receives at least one error report        directly or indirectly from the terminal or another computer,    -   the update computer(s) sends instructions or information based        on the error report(s) directly or indirectly to another        terminal(s) that are one or more of previously, currently and        subsequently on the social network site computer network,        indicating error(s) and/or source of error(s), and    -   a recalculation module (on any one or more of the terminal,        another terminal, or on another computer) updates one or more        module(s), by recalculating instructions, optionally to create        new module instructions, which are distributed directly or        indirectly to the terminal;    -   the terminal receives recalculated or updated instructions,        optionally used to create new module(s) instructions.

Embodiments can work with software, hardware, and/or operating systemimplementations other than those described herein. Any software,hardware, and operating system implementations suitable for performingthe functions described herein can be used. Embodiments are applicableto both a client and to a server or a combination of both.

While it is apparent that the illustrative embodiments of the disclosureherein fulfil one or more objectives or inventive solutions, it isappreciated that numerous modifications and other embodiments may bedevised by those skilled in the art. Additionally, feature(s) and/orelement(s) from any embodiment may be used singly or in combination withother embodiment(s). Therefore, it will be understood that the appendedclaims are intended to cover all such modifications and embodiments thatwould come within the spirit and scope of the present disclosure.

The above embodiments are to be understood as illustrative examples ofthe disclosure. Further embodiments of the disclosure are envisaged. Itis to be understood that any feature described in relation to any one orone set of embodiments may be used alone, or in combination with otherfeatures described, and may also be used in combination with one or morefeatures of any other of the embodiments, or any combination of anyother of the embodiments. Furthermore, equivalents and modifications notdescribed above may also be employed without departing from the scope ofthe disclosure, which is defined in the accompanying claims.

What is claimed:
 1. A method of one or more of (a) selectively reducingdata available to, or processed by one or more computers communicativelyconnected to, a digitally stored and operated social network site, (b)improving data security and (c) increasing operational efficiency of theone or more computers communicatively connected to the digitally storedand operated social network site, at a terminal in a digitalcommunications network, comprising: displaying indicia, broadcastingdata, or transmitting instructions, to solicit collection of or toaccess data uniquely representative of, or uniquely indicating, one ormore digitally stored and operated social network site user account(s);collecting or accessing data uniquely representative of, or uniquelyindicating, the one or more social network site user account(s) andtransmitting data necessary to access and control the one or moredigitally stored and operated social network site user account(s) to atleast one remote computer(s); establishing direct or indirectcommunication access and linkage between the terminal and the at leastone remote computer(s) on which are stored, or by which access isavailable to control stored user account object data that were input ormodified during prior access to and control over: the one or more socialnetwork site user account(s) or associated social network site useraccount(s) that at some prior time had permission to edit data in, orappend data to, the stored user account object data of the one or moresocial network site user account(s), the stored user account data of theone or more user account(s) uniquely accessible based on access datadigitally pre-assigned only to the one or more social network site useraccount(s); displaying indicia, or broadcasting data, representative ofor indicating one or more predetermined criteria for selecting a propersubset of the stored user account object data; collecting datarepresentative of, or indicating, the subset of the stored user accountobject data based on the one or more predetermined criteria forselecting the subset of the stored user account object data that wereinput or modified during prior access to and control over the one ormore user account(s) or associated social network site user account(s)that at some prior time had permission to edit data in, or append datato, the user account object data of the one or more user account(s); andtransmitting instructions to prevent display of only the subset of thestored user account object data, according to the collected datarepresentative of, or indicating, the one or more predetermined criteriafor selecting the subset of the stored user account object data, fromthe terminal to the at least one remote computer(s); wherein theinstructions are calculated to cause the at least one remote computer(s)on which are stored, or by which access is available to control, thestored user account object data, to, in whole or in part, preventdisplay of the selected subset of the stored user account object datafrom at least one database on which are stored the subset of the storeduser account object data, based on the one or more predeterminedcriteria, the instructions including selection and legible displayprevention of at least one copy of all stored user account object datain the subset of the user account object data.
 2. The method accordingto claim 1, wherein one or more of: (a) the instructions are transmittedat random intervals, (b) the instructions are transmitted in parallel;and (c) the collecting of data representative of, or indicating, thesubset of the user account object data, is one or more of: (1)simultaneous in time with respect to each and every one of the objectsin the subset, (2) performed at predetermined time(s) based on at leastone predetermined (and/or pre-stored) set of digital instructions, theat least one predetermined set being pre-determined at a time(s) priorto or at least before predetermination of the data representative of, orindicating, the display, broadcast or collection of data representativeor indicating the predetermined criteria, (3) simultaneous or performedat predetermined times based on at least one predetermined set ofdigital instructions, pre-determined at least before the datarepresentative of, or indicating, the display, broadcast or collectionof data representative or indicating the predetermined criteria; (4)simultaneous or performed at predetermined time(s) based on at least onepredetermined set of digital instructions, the single or multiple timespre-determined at least before the data representative of, orindicating, the display, broadcast or collection of data representativeor indicating the predetermined criteria; (5) simultaneous based on atleast one predetermined set of digital instructions; (6) performed atpredetermined time(s) based on at least one predetermined set of digitalinstructions; (7) instantaneous; (8) all completed before any of theinstructions are transmitted; (9) repeated for at least two of the useraccount object data before any of the instructions are transmitted; (10)at least 10% completed before any of the instructions are transmitted;(11) at least 20% completed before any of the instructions aretransmitted; (12) at least 30% completed before any of the instructionsare transmitted; (13) at least 40% completed before any of theinstructions are transmitted; (14) at least 50% completed before any ofthe instructions are transmitted; (15) at least 60% completed before anyof the instructions are transmitted; (16) at least 70% completed beforeany of the instructions are transmitted; (17) at least 80% completedbefore any of the instructions are transmitted; (18) at least 90%completed before any of the instructions are transmitted; (19) in wholeor in part completed followed by the instructions being transmitted inparallel; (20) in whole or in part completed followed by theinstructions being transmitted at random intervals.
 3. A methodaccording to claim 1, wherein the at least one remote computer(s) areone or more of operated and controlled by a user or set of users otherthan the user or set of users of the terminal.
 4. The method accordingto claim 1, further comprising storing the data representative of, orindicating, the one or more predetermined criteria for selecting thesubset of the stored user account object data.
 5. The method accordingto claim 1, wherein the at least one remote computer(s) at one timereceive, forward to another of the at least one remote computers forexecution, execute, or initiate execution of, the instructions for allobjects in the selected subset.
 6. The method according to claim 1,wherein the terminal transmits, or initiates simultaneous or periodictransmission over a digitally predetermined time of, each and everyinstruction for all objects in the selected subset to the at least oneremote computer(s).
 7. The method according to claim 1, wherein theinstructions to prevent the display of the selected subset are executedto prevent display of each and every object of the selected subset, at arate according to and limited only by the processing speed(s) and datatransmission speed(s) of the at least one remote computer(s).
 8. Themethod according to claim 1, wherein the speed or speeds at which the atleast one remote computer(s) store and initiate execution of, theinstructions is/are limited only by the time(s) at which the at leastone remote computers receive the instructions for objects in theselected subset, and the time(s) between which the at least one remotecomputers receive the instructions for the objects in the selectedsubset and the time(s) when the at least one remote computers initiateexecution of the instructions to delete the objects in the selectedsubset.
 9. The method according to claim 1, wherein the terminalperiodically transmits the instructions of the subset, on anobject-by-object or group-of-objects-by-group-of-objects basis, at oneor more regular intervals of time, at one or more irregular intervals oftime, together at one time, or in any combination thereof.
 10. Themethod according to claim 1, wherein the at least one remote computer(s)is communicatively connected to one or more databases on which arestored the selected subset, and wherein the at least one remotecomputer(s) initiate execution of, or execute, the instructions toprevent legible display of the selected subset, in a predetermined timeperiod based on instructions that are stored by the at least one remotecomputer(s) before any of the instructions to prevent display of theselected subset are received by the at least one remote computer(s). 11.The method according to claim 1, wherein the calculation is performed inwhole or in part by one or more of a user-operated terminal and by aterminal that is not under the control or operation of a user or usersof the at least one remote computer(s).
 12. The method according toclaim 1, wherein the calculation is performed in whole or in part by oneor more of the at least one remote computer(s) and a second set of atleast one remote computers, any or all of the at least one remotecomputer(s) and the second set of at least one remote computers beinglocated in a domestic or foreign national country.
 13. The methodaccording to claim 1, wherein the instructions are calculated tosimulate data acquisition based on sequential and stepwise GUI or otherperipheral data collection via one or more of keyboard, mouse, and otherperipherals connected to the terminal, wherein peripheral datacollection is generated based on display or other peripheral output. 14.The method according to claim 1, wherein data received from one or moreperipherals is simulated in order to collect the data representative of,or indicating, the subset of stored user account object data.
 15. Themethod according to claim 1, wherein date-criteria data used in thecalculation of the instructions is deduced from scanning user accountobject data for date-embedded, date-classified, or date-uploaded mediaobjects comprising one or more of photographic data, video data, andtext data.
 16. The method according to claim 4, wherein the datarepresentative of, or indicating, the one or more predetermined criteriafor selecting the subset of the stored user account object data thatwere input or modified during prior access to and control over the oneor more user account(s) or associated user social network site accountsthat at some prior time had permission to edit data in, or append datato, the stored user account object data, and date-criteria data; areused to determine the subset of the stored user account object data. 17.The method according to claim 1, wherein the at least one remotecomputer(s) is controlled by one or more remote user(s), the one or moreremote computer(s) not having access to control what criteria data arecollected to calculate the subset of the user account object data at theterminal.
 18. The method according to claim 1, further comprisingdisplaying or broadcasting confirmation that the subset of stored useraccount object data have been deleted from the at least one remotecomputer(s).
 19. The method according to claim 1, wherein at least oneremote computer(s) execute(s) instructions to store object data uniquelyassociated with a different user account, which indicate successfuldisplay prevention of associated user account object data that werestored on at least one database, and transmit the data to otherterminals associated with other user accounts.
 20. The method accordingto claim 1, wherein the deleted subset of the stored user account objectdata includes all of the stored user account object data that were inputor modified during prior access to and control over the one or moresocial network site user account(s) and input or modified via and accessand control over associated social network site user account(s) that atsome prior time had permission to edit data in, or append data to, thestored user account object data of the one or more social network siteuser account(s); and stored on the database(s) at least as early asorbefore, a specific date, which is the one or more predeterminedcriteria.