User Information: Use known techniques to keep sensitive user information safe that can be used to identify the user or identify that user may have a disability.Warn users of any known risk.
Priority Level
A
A
harm: Loss of or damage to a person's right, property, or physical or mental well-being. Where it is unclear if something is a damage we consider a test to be that over 80% of random people asked would consider it to be a damage as defined above.
identify the user: Personally identifiable user information is information that may by itself or in conjunction with other information be used to discover the identity of, locate, or contact a specific person
Suggested priciple is 2,
and we suggest changing guideline 2.3 from
to
Don’t store personal information that could be used to harm a user without being very careful to minimise any risk to the user.
Examples: storing information, which suggests a user user has Dementia, may make a target for scams; or storing information, which suggests a user has an intellectual disability, may make a target for predators.
A predatory company could send requests for money, saying “you haven’t made your donation” despite the user having made one.
It is vital that users stay safe.
Another consideration is that many users have weak executive functioning, and are thus less likely to identify risks correctly.
Issue papers: Online
Also see
Acceptable outcomes:
No to Step 1
OR
Yes to all three steps.
Advisory techniques
See also
https://www.owasp.org/index.php/Client_Side_Testing
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule_-_Keep_Sensitive_Data_Out_of_the_URL
we could (if needed ) make this AA and make the following A :
Use known techniques to keep sensitive user information safe that can be used to identify that user may have a disability.Warn users of any known risk.