Privacy selection based on social groups

ABSTRACT

A method of setting privacy level values for a user. The method includes receiving a designation of a relative privacy level for the user and receiving a selection of a group of other users for the user. Plural sets of privacy level values are associated with the group of other users. The method also includes setting privacy level values for the user based on the designation of the relative privacy level and the plural sets of privacy level values associated with the selected group of other users.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation application of U.S. patentapplication Ser. No. 13/559,549 entitled “PRIVACY SELECTION BASED ONSOCIAL GROUPS,” filed on Jul. 26, 2012, the contents of which are herebyincorporated by reference in their entirety for all purposes.

BACKGROUND

The present disclosure generally relates to setting privacy levels basedon social groups.

User interfaces for setting privacy levels can be complex. A user mayhave to set multiple different privacy level values, for exampleregarding sharing personal information such as name, address, phonenumbers, and email addresses, sharing other profile information, andsharing photographs or videos with other users. Some interfaces permitan overall designation of a general level of privacy, for exampleranging from “high” to “low.” However, the meanings of these generallevels may not correspond to user expectations.

SUMMARY

In one innovative aspect, the disclosed subject matter can be embodiedin a method that includes receiving a designation of a relative privacylevel for the user and receiving a selection of a group of other usersfor the user. Plural sets of privacy level values are associated withthe group of other users. The method also includes setting privacy levelvalues for the user based on the designation of the relative privacylevel and the plural sets of privacy level values associated with theselected group of other users.

In another innovative aspect, the disclosed subject matter can beembodied in a system that includes one or more processors and amachine-readable medium including instructions stored therein. Whenexecuted by the one or more processors, the instructions cause theprocessors to perform operations that include receiving a designation ofa relative privacy level for the user and receiving a selection of agroup of other users for the user. Plural sets of privacy level valuesare associated with the group of other users. The operations alsoinclude verifying that the group of other users includes at least apredetermined number of the other users, and in a case that the group ofother users includes at least the predetermined number of the otherusers, setting privacy level values for the user based on thedesignation of the relative privacy level and the plural sets of privacylevel values associated with the selected group of other users.

In a further innovative aspect, the disclosed subject matter can beembodied in a machine-readable medium including instructions storedtherein, which when executed by a machine, cause the machine to performoperations that include receiving a designation of a relative privacylevel for the user and receiving a selection of a group of other usersfor the user. Plural sets of privacy level values are associated withthe group of other users. The operations also include setting privacylevel values for the user to be at least as private as the relativeprivacy level applied to the plural sets of privacy level valuesassociated with the selected group of other users.

In various aspects, the designation of the relative privacy level can bea percentage value or a relative description, the selection of the groupof the other users can include selection from various sized groups ofthe other users, and the various sized groups of the other users caninclude one or more of friends, friends of friends, users within apolitical entity, cultural groups, experts, or all other users for whomthe associated privacy level values are available.

In some aspects, the various methods and operations of the subjecttechnology can also include presenting, for display to the user, aninterface that includes a first element that includes options for thedesignation of the relative privacy level and a second element thatincludes options for the selection of the group of other users. Forexample, the first element can include a slide bar, and the secondelement can include a list of selectable groups of the other users.Aspects of the subject technology can also include receiving a selectionof the privacy level values for the user to be set.

It is understood that other configurations of the subject technologywill become readily apparent to those skilled in the art from thefollowing detailed description, wherein various configurations of thesubject technology are shown and described by way of illustration. Aswill be realized, the subject technology is capable of other anddifferent configurations and its several details are capable ofmodification in various other respects, all without departing from thescope of the subject technology. Accordingly, the drawings and detaileddescription are to be regarded as illustrative in nature and not asrestrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example interface for setting privacy level valuesaccording to some aspects of the disclosure.

FIG. 2 illustrates an example interface for modifying individual privacylevels according to some aspects of the disclosure.

FIG. 3 is a flowchart of a sample method for setting privacy levelvalues according to some aspects of the disclosure.

FIG. 4 illustrates an example of an architecture for setting privacylevel values according to some aspects of the disclosure.

FIG. 5 is a block diagram illustrating examples of a client and a serverfrom the architecture of FIG. 4 according to certain aspects of thedisclosure.

FIG. 6 conceptually illustrates an example of an electronic system withwhich some aspects of the subject technology can be implemented.

DETAILED DESCRIPTION

In the following detailed description, numerous specific details are setforth to provide a full understanding of the present disclosure. It willbe apparent, however, to one ordinarily skilled in the art that theembodiments of the present disclosure may be practiced without some ofthese specific details. In other instances, certain structures andtechniques have not been shown in detail so as not to obscure thedisclosure.

Although certain examples provided herein describe a user's information(e.g., privacy level values) being stored in memory, the user can deletethe user information from memory and/or opt out of having the userinformation stored in memory. In example aspects, the user can adjustappropriate privacy settings to selectively limit the types of userinformation stored in memory, or select the memory in which the userinformation is stored (e.g., locally on the user's device as opposed toremotely a server). In example aspects, the user information does notinclude and/or share the specific identification of the user (e.g., theuser's name) unless otherwise specifically provided or directed by theuser.

User interfaces for setting privacy levels can be complex. A user mayhave to set multiple different privacy level values, for exampleregarding sharing personal information such as name, address, phonenumbers, and email addresses, sharing other profile information, andsharing photographs or videos with other users. Some interfaces permitan overall designation of a general level of privacy, for exampleranging from “high” to “low.” However, the meanings of these generallevels may not correspond to user expectations, especially whendifferent users' varying expectations are considered.

The present technology attempts to address the foregoing issues througha computer-implemented methods and systems for setting privacy levelvalues for a user. The subject technology provides for receiving adesignation of a relative privacy level for the user, receiving aselection of a group of other users for the user, with plural sets ofprivacy level values associated with the group of other users, andsetting the privacy level values for the user based on the designationof the relative privacy level and the plural sets of privacy levelvalues associated with the selected group of other users.

A relative privacy level can be designated by a user in the form of apercentage value or a relative description. Examples of the relativedescription include high, medium, low, most private, more private,private, less private, and least private. The selection of the group ofother users can be from various sized groups of the other users, forexample friends, friends of friends, users within a political entity,users within a social circle, or all other users for whom privacy levelvalues are available. In some aspects, the selection can be from presetgroups of users or from users grouped through individual selection bythe user, for example from the user's contacts or user groups.

Each individual privacy level can be set relative to the individualprivacy levels of a designated group taken as a whole. For example, if auser selects a relative privacy level of “80%” and designates “friendsof friends” as the group of other users, then the individual privacylevels for the user can be set to (at least) the 80th percentile of“privateness” for each privacy level within that selected group. If cellphone number visibility is set by 13% of “friends of friends” to bevisible to “everyone,” 82% to be visible to “only friends,” and 5% to beavailable to “only the user,” then the 80th percentile of privatenessfor the cell phone visibility privacy level would be visibility to “onlyfriends.” Likewise, if address visibility is set by 10% of “friends offriends” to be visible to “nobody” and 90% to be visible to “everyone,”then the 80th percentile for the address visibility privacy level wouldbe visibility to “everyone.” As a result, the user's cell phone numbervisibility privacy level would be set to “friends of friends,” and theuser's address visibility privacy level would be set to “everyone.”

Alternatively, each individual privacy level can set relative to one ofthe group of other users' complete set of individual privates levelvalues, with that user selected based on the designated relative privacylevel. For example, if a user selects a relative privacy level of 75%and designates a group with 10 members as the group of other users, thenthe individual privacy levels for the user can be set to the privacylevels for the seventh or eighth most private user in the group. Rankingthe users in the group can be performed by averaging the individualprivacy level values for each user and comparing the averages, applyinga weighted average that gives more weight to certain privacy levels andcomparing the weighted averages, or using any other statistical ormathematical technique. If privacy levels are represented by numericvalues, then the user's individual privacy levels can be set to themedian, mean, or some other mathematical combination of the privacylevels for some number of the group of other users ranked as havingprivacy levels near the selected relative privacy level. Othertechniques for combining the selection of a relative privacy level andthe designation of the group of other users can also be used todetermine privacy levels for a user.

FIG. 1 illustrates an example interface for setting privacy level valuesaccording to some aspects of the disclosure. Interface 100 permits auser to designate a relative privacy level and a group of other users.Slide bar 110 is provided for designation of the relative privacy leveland a list of selectable various sized groups of the other users. Slidebar 110 is labeled with relative descriptions (e.g., “HIGH,” “MEDIUM,”and “LOW”) of privacy levels and also a percentage value (e.g., “87%”)for the position of the slide on the slide bar. In other aspects, theslide can be labeled with percentages, with different relativedescriptions (e.g., ranging from “most private” to “least private”), orin some other manner, and the designation of the position of the slidebar can be shown in different ways or not at all. In addition, therelative privacy level can be set using any interface that permitsdesignation of a relative term, value, or indicator.

Interface 100 also provides area 120 for selection of a group of otherusers. Area 200 is shown with selectable buttons for selection of one ofthe displayed groups. The groups in FIG. 1 have various sizes andinclude friends, friends of friends, users within a political entity(e.g., “MY CITY”), a cultural group, experts, and all other users forwhom the associated privacy level values are available. In some aspects,the groups of users that are presented for selection can be restrictedto those having at least a minimum number of members, for example 10,25, 100, or 1,000 members. So restricting the groups of users can helpensure that a variety of privacy value settings are available to theuser according to aspects of the disclosure. Furthermore, the subjecttechnology is not limited to the groups of users shown in FIG. 1. Some,all, or none of these groups can be presented to a user for selection,and other groups can be presented as well. Likewise, the subjecttechnology is not limited to the selection mechanism shown in FIG. 1.Any mechanism can be provided for selection of one of the presentedgroups.

Once a user is satisfied with their designation of a relative privacylevel and selection of a group of users, the user can set their privacylevels by clicking on activation button 130. Any other activationmechanism can be provided for activating the process of setting theuser's privacy levels based on the user's choices.

Individual privacy levels also can be modified by a user, for exampleafter privacy levels have been set using an interface such as the oneshown in FIG. 1. FIG. 2 illustrates example interface 200 for modifyingindividual privacy levels according to some aspects of the disclosure.Interface 200 shows individual privacy setting labels and levels for auser in area 210, for example as set based on user input to interface100 in FIG. 1. Various different types of privacy level values areshown, for example values set as a percentage, values set as a number(i.e., “BBB”), and values set as yes/no answers (i.e., “Y/N”). The usercan modify these levels individually according to aspects of thedisclosure. The privacy values that can be set or modified according tothe subject technology are not limited to the types shown in FIG. 2. Insome aspects, some of the privacy setting labels and levels can beselected for further modification of the associated values usingrelative privacy level selections as described in this disclosure.Selection buttons 220 and activation button 230 are shown in FIG. 2 forinitiating this operation. Upon activation button 230 being clicked, aninterface such as the one shown in FIG. 1 can be provided for furthermodifying the privacy level values for the selected ones of the labelsand levels.

FIG. 3 is a flowchart of a sample method for setting privacy levelvalues according to some aspects of the disclosure. A designation of arelative privacy level is received in step 310. A selection of a groupof other users is received in step 320. In some aspects, only groups ofusers with a least a minimum number of members made available to a userfor selection. Both steps 310 and 320 can be performed through agraphical interface such as the one shown in FIG. 1, which can bedisplay on a user's client device based on data from a server device.These steps also can be performed through other interfaces presented onother computing devices.

Privacy level values for a user are set in step 330 based on thedesignation of the relative privacy level and the plural sets of privacylevel values associated with the selected group of other users. In someaspects, the relative privacy level and group designation can be appliedglobally to all of a user's privacy level values. In other aspects, therelative level and group can be applied to set groups of privacy levelvalues (e.g., all values dealing with contact information, all valuesrelated to photos, or the like) or to set individual privacy levelvalues. Portions of these aspects can be combined, for example in theform of overriding previously set values or in the form of settingsaffecting smaller groups of values overriding settings affecting largergroups of values.

FIG. 4 illustrates an example of architecture 400 used to set privacylevel values for a user according to certain aspects of the disclosure.The architecture 400 includes servers 430 and clients 410 connected overa network 450. One of the many servers 430 is configured to hostinstructions and data, including without limitation instructions forsetting privacy level values for a user using privacy level values forgroups of users according to aspects of the disclosure. Alternatively,multiple servers 430 can host these data and instructions (or portionsthereof) for purposes of load balancing, or one of the many clients canexecute the instruction without the assistance of a server.

Clients 410 and servers 430 can be any computing devices havingprocessing hardware, memory, and communications capability necessary toperform some or all of the operations disclosed herein. Clients 410 towhich servers 430 are connected over the network 450 can be, forexample, desktop computers, mobile computers, tablet computers (e.g.,including e-book readers), mobile devices (e.g., a smartphones orpersonal digital assistants), set top boxes (e.g., for a television withone or more processors coupled thereto and/or embedded therein), videogame consoles, or any other devices having memory, processing hardware,and communications capabilities for setting privacy level values for auser according to certain aspects of this disclosure.

The network 450 can include, for example, any one or more of a personalarea network (PAN), a local area network (LAN), a campus area network(CAN), a metropolitan area network (MAN), a wide area network (WAN), abroadband network (BBN), a peer-to-peer network, an ad-hoc network, amobile phone network, the Internet, and the like. Further, the networkcan include, but is not limited to, any one or more network topologiessuch as a bus network, a star network, a ring network, a mesh network, astar-bus network, tree or hierarchical network, and the like.

FIG. 5 is a block diagram 500 illustrating examples of client 410 andserver 430 in architecture 400 of FIG. 4 according to certain aspects ofthe disclosure. Client 410 and server 430 are connected over the network450 via respective communications modules 512 and 532. Communicationsmodules 512 and 532 are configured to interface with network 450 to sendand receive information, such as data, requests, responses, andcommands, to other devices on the network. Communications modules 512and 532 can be, for example, wireless transceivers, modems or Ethernetcards.

Both client 410 and server 430 can include processing hardware and someform of memory. In FIG. 5, client 410 includes processor 514 and memory516, and server 430 includes processor 534 and memory 536. Memory 516and 536 can be volatile or non-volatile memory. Client 410 also caninclude input device 517 and output device 518 for accepting input fromand providing output to a user. Server 430 also can include such inputand output devices.

FIG. 6 conceptually illustrates an example of an electronic system withwhich some aspects of the subject technology can be implemented.Electronic system 600 can be a computer, phone, PDA, or any other sortof electronic device, including but not limited to client 410 and server430. Electronic system 600 can also be embedded in another device, forexample, and without limitation, a mobile telephone, a personal digitalassistant (PDA), a mobile audio player, a Global Positioning System(GPS) receiver, a video game console, a television set top box, a clientsuch as client 410, and/or a server such as server 430.

Such an electronic system can include various types of computer readablemedia and interfaces for various other types of computer readable media.Electronic system 600 includes a bus 608, processing unit(s) 612, asystem memory 604, a read-only memory (ROM) 610, a permanent storagedevice 602, an input device interface 614, an output device interface606, and a network interface 616.

Bus 608 collectively represents all system, peripheral, and chipsetbuses that communicatively connect the numerous internal devices ofelectronic system 600. For instance, bus 608 communicatively connectsprocessing unit(s) 612 with ROM 610, system memory 604, and permanentstorage device 602.

From these various memory units, processing unit(s) 612 retrievesinstructions to execute and data to process in order to execute theprocesses of the subject disclosure. The processing unit(s) can be asingle processor or a multi-core processor in different implementations.

ROM 610 stores static data and instructions that are needed byprocessing unit(s) 612 and other modules of the electronic system.Permanent storage device 602, on the other hand, is a read-and-writememory device. This device is a non-volatile memory unit that storesinstructions and data even when electronic system 600 is off. Someimplementations of the subject disclosure use a mass-storage device(such as a magnetic or optical disk and its corresponding disk drive) aspermanent storage device 602.

Other implementations use a removable storage device (such as a floppydisk, flash drive, and its corresponding disk drive) as permanentstorage device 602. Like permanent storage device 602, system memory 604is a read-and-write memory device. However, unlike storage device 602,system memory 604 is a volatile read-and-write memory, such a randomaccess memory. System memory 604 stores some of the instructions anddata that the processor needs at runtime. In some implementations, theprocesses of the subject disclosure are stored in system memory 604,permanent storage device 602, and/or ROM 610. For example, the variousmemory units can include instructions for setting privacy level valuesfor a user. From these various memory units, processing unit(s) 612retrieves instructions to execute and data to process in order toexecute the processes of some implementations.

Bus 608 also connects to input and output device interfaces 614 and 606.Input device interface 614 enables the user to communicate informationand select commands to the electronic system. Input devices used withinput device interface 614 include, for example, alphanumeric keyboardsand pointing devices (also called “cursor control devices”). Outputdevice interfaces 606 enables, for example, the display of imagesgenerated by the electronic system 600. Output devices used with outputdevice interface 606 include, for example, printers and display devices,such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Someimplementations include devices such as a touchscreen that functions asboth input and output devices.

Finally, as shown in FIG. 6, bus 608 also couples electronic system 600to a network (not shown) through a network interface 616. In thismanner, the computer can be a part of a network of computers such asnetwork 450. Any or all components of electronic system 600 can be usedin conjunction with the subject disclosure.

The operations described above can be implemented in digital electroniccircuitry, in computer software, firmware or hardware. The techniquescan be implemented using one or more computer program products.Programmable processors and computers can be included in or packaged asmobile devices. The processes and logic flows can be performed by one ormore programmable processors and by one or more programmable logiccircuitry. General and special purpose computing devices and storagedevices can be interconnected through communication networks.

Some implementations include electronic components, such asmicroprocessors, storage and memory that store computer programinstructions in a machine-readable or computer-readable medium(alternatively referred to as computer-readable storage media,machine-readable media, or machine-readable storage media). Someexamples of such computer-readable media include RAM, ROM, read-onlycompact discs (CD-ROM), recordable compact discs (CD-R), rewritablecompact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM,dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g.,DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SDcards, micro-SD cards, etc.), magnetic and/or solid state hard drives,read-only and recordable Blu-Ray® discs, ultra density optical discs,any other optical or magnetic media, and floppy disks. Thecomputer-readable media can store a computer program that is executableby at least one processing unit and includes sets of instructions forperforming various operations. Examples of computer programs or computercode include machine code, such as is produced by a compiler, and filesincluding higher-level code that are executed by a computer, anelectronic component, or a microprocessor using an interpreter.

While the above discussion primarily refers to microprocessor ormulti-core processors that execute software, some implementations areperformed by one or more integrated circuits, such as applicationspecific integrated circuits (ASICs) or field programmable gate arrays(FPGAs). In some implementations, such integrated circuits executeinstructions that are stored on the circuit itself.

As used in this specification and any claims of this application, theterms “computer”, “server”, “processor”, and “memory” all refer toelectronic or other technological devices. These terms exclude people orgroups of people. For the purposes of the specification, the termsdisplay or displaying means displaying on an electronic device. As usedin this specification and any claims of this application, the terms“computer readable medium” and “computer readable media” are entirelyrestricted to tangible, physical objects that store information in aform that is readable by a computer. These terms exclude any wirelesssignals, wired download signals, and any other ephemeral signals.

To provide for interaction with a user, implementations of the subjectmatter described in this specification can be implemented on a computerhaving a display device, e.g., a CRT (cathode ray tube) or LCD (liquidcrystal display) monitor, for displaying information to the user and akeyboard and a pointing device, e.g., a mouse or a trackball, by whichthe user can provide input to the computer. Other kinds of devices canbe used to provide for interaction with a user as well; for example,feedback provided to the user can be any form of sensory feedback, e.g.,visual feedback, auditory feedback, or tactile feedback; and input fromthe user can be received in any form, including acoustic, speech, ortactile input. In addition, a computer can interact with a user bysending documents to and receiving documents from a device that is usedby the user; for example, by sending web pages to a web browser on auser's client device in response to requests received from the webbrowser.

Embodiments of the subject matter described in this specification can beimplemented in a computing system that includes a back end component,e.g., as a data server, or that includes a middleware component, e.g.,an application server, or that includes a front end component, e.g., aclient computer having a graphical user interface or a Web browserthrough which a user can interact with an implementation of the subjectmatter described in this specification, or any combination of one ormore such back end, middleware, or front end components. The componentsof the system can be interconnected by any form or medium of digitaldata communication, e.g., a communication network. The communicationnetwork (e.g., communication network 650) can include, for example, anyone or more of a personal area network (PAN), a local area network(LAN), a campus area network (CAN), a metropolitan area network (MAN), awide area network (WAN), a broadband network (BBN), the Internet, andthe like. Further, the network can include, but is not limited to, anyone or more network topologies such as a bus network, a star network, aring network, a mesh network, a star-bus network, tree or hierarchicalnetwork, and the like. The communications modules can be, for example,modems or Ethernet cards.

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other. In someembodiments, a server transmits data (e.g., an HTML page) to a clientdevice (e.g., for purposes of displaying data to and receiving userinput from a user interacting with the client device). Data generated atthe client device (e.g., a result of the user interaction) can bereceived from the client device at the server.

It is understood that any specific order or hierarchy of steps in theprocesses disclosed is an illustration of exemplary approaches. Basedupon design preferences, it is understood that the specific order orhierarchy of steps in the processes may be rearranged, or that allillustrated steps be performed. Some of the steps may be performedsimultaneously. For example, in certain circumstances, multitasking andparallel processing may be advantageous. Moreover, the separation ofvarious system components in the embodiments described above should notbe understood as requiring such separation in all embodiments, and itshould be understood that the described program components and systemscan generally be integrated together in a single software product orpackaged into multiple software products.

The previous description is provided to enable any person skilled in theart to practice the various aspects described herein. Variousmodifications to these aspects will be readily apparent to those skilledin the art, and the generic principles defined herein may be applied toother aspects. Thus, the claims are not intended to be limited to theaspects shown herein, but are to be accorded the full scope consistentwith the language of the claims, wherein reference to an element in thesingular is not intended to mean “one and only one” unless specificallyso stated, but rather “one or more.” Unless specifically statedotherwise, the term “some” refers to one or more. Pronouns in themasculine (e.g., his) include the feminine and neuter gender (e.g., herand its) and vice versa. Headings and subheadings, if any, are used forconvenience only and do not limit the subject disclosure.

A phrase such as an “aspect” does not imply that such aspect isessential to the subject technology or that such aspect applies to allconfigurations of the subject technology. A disclosure relating to anaspect may apply to all configurations, or one or more configurations. Aphrase such as an aspect may refer to one or more aspects and viceversa. A phrase such as a “configuration” does not imply that suchconfiguration is essential to the subject technology or that suchconfiguration applies to all configurations of the subject technology. Adisclosure relating to a configuration may apply to all configurations,or one or more configurations. A phrase such as a configuration mayrefer to one or more configurations and vice versa.

All structural and functional equivalents to the elements of the variousaspects described throughout this disclosure that are known or latercome to be known to those of ordinary skill in the art are expresslyincorporated herein by reference and are intended to be encompassed bythe claims. Moreover, nothing disclosed herein is intended to bededicated to the public regardless of whether such disclosure isexplicitly recited in the claims.

What is claimed is:
 1. A method comprising: receiving a designation of arelative privacy level for a user; receiving a selection of a group ofother users for the user, wherein the other users within the selectedgroup have individual privacy level values, wherein the relative privacylevel for the user corresponds to a user-specified level, relative tothe individual privacy level values of the selected group, at which toset privacy level values for the user, and wherein each privacy levelvalue for the user corresponds to a respective one of the individualprivacy level values of the selected group; and setting, using one ormore processors and for each privacy level value for the user, theprivacy level value for the user based on the designation of therelative privacy level and the respective individual privacy level valueof the selected group of other users.
 2. The method of claim 1, whereinthe designation of the relative privacy level comprises a percentagevalue.
 3. The method of claim 1, wherein the designation of the relativeprivacy level comprises a relative description.
 4. The method of claim1, wherein the selection of the group of the other users comprises aselection from various sized groups of the other users.
 5. The method ofclaim 1, further comprising presenting, for display to the user, aninterface that includes a first element that includes options for thedesignation of the relative privacy level and a second element thatincludes options for the selection of the group of other users.
 6. Themethod of claim 5, wherein the first element comprises a slide bar, andthe second element comprises a list of selectable groups of the otherusers.
 7. The method of claim 1, further comprising presenting, fordisplay to the user, an interface that includes indications of theprivacy level values for the user.
 8. The method of claim 7, furthercomprising receiving individual modification of the privacy level valuesfor the user.
 9. The method of claim 7, further comprising receiving aselection of the privacy level values for the user to be set based onthe designation of the relative privacy level and the individual privacylevel values of the selected group of other users.
 10. A systemcomprising: one or more processors; and a machine-readable mediumcomprising instructions stored therein, which when executed by the oneor more processors, cause the one or more processors to performoperations comprising: receiving a designation of a relative privacylevel for a user; receiving a selection of a group of other users forthe user, the group of other users having at least a predeterminednumber of users, wherein the other users within the selected group haveindividual privacy level values, wherein the relative privacy level forthe user corresponds to a user-specified level, relative to theindividual privacy level values of the selected group, at which to setprivacy level values for the user, and wherein each privacy level valuefor the user corresponds to a respective one of the individual privacylevel values of the selected group; and setting, for each privacy levelvalue for the user, the privacy level value for the user based on thedesignation of the relative privacy level and the respective individualprivacy level value of the selected group of other users.
 11. The systemof claim 10, wherein the designation of the relative privacy levelcomprises a percentage value.
 12. The system of claim 10, wherein thedesignation of the relative privacy level comprises a relativedescription.
 13. The system of claim 10, wherein the selection of thegroup of the other users comprises a selection from various sized groupsof the other users.
 14. The system of claim 10, wherein the operationsfurther comprise presenting, for display to the user, an interface thatincludes a first element that includes options for the designation ofthe relative privacy level and a second element that includes optionsfor the selection of the group of other users.
 15. The system of claim14, wherein the first element comprises a slide bar, and the secondelement comprises a list of selectable groups of the other users. 16.The system of claim 10, wherein the operations further comprisepresenting, for display to the user, an interface that includesindications of the privacy level values for the user.
 17. The system ofclaim 16, wherein the operations further comprise receiving individualmodification of the privacy level values for the user.
 18. The system ofclaim 16, wherein the operations further comprise receiving a selectionof the privacy level values for the user to be set based on thedesignation of the relative privacy level and the individual privacylevel values of the selected group of other users.
 19. A non-transitorymachine-readable medium comprising instructions stored therein, whichwhen executed by a machine, cause the machine to perform operationscomprising: receiving a designation of a relative privacy level for auser; receiving a selection of a group of other users for the user,wherein the other users within the selected group have individualprivacy level values, and wherein the relative privacy level for theuser corresponds to a user-specified level, relative to the individualprivacy level values of the selected group, at which to set privacylevel values for the user; ranking the other users within the selectedgroup based on the respective individual privacy level values for theother users; and setting the privacy level values for the user based onthe designation of the relative privacy level and on the individualprivacy level values of the selected group of other users as ranked. 20.The non-transitory machine-readable medium of claim 19, wherein thedesignation of the relative privacy level comprises a percentage value.