Data Blackholes Highlight the Need for a User Bill of Rights