SC Shortname: User Information


SC text

User Information: Use known techniques to keep sensitive user information safe that can be used to identify the user or identify that user may have a disability.Warn users of any known risk.


Priority Level

A

 

Suggestion for Priority Level (A/AA/AAA)

A

Related Glossary additions or changes

harm: Loss of or damage to a person's right, property, or physical or mental well-being. Where it is unclear if something is a damage we consider a test to be that over 80% of random people asked would consider it to be a damage as defined above.

identify the user: Personally identifiable user information is information that may by itself or in conjunction with other information be used to discover the identity of, locate, or contact a specific person

What Principle and Guideline the SC falls within.

Suggested priciple is 2,

and we suggest changing guideline 2.3 from

to

 

 

 

Description and Benefits

 

Don’t store personal information that could be used to harm a user without being very careful to minimise any risk to the user.


Examples: storing information, which suggests a user user has Dementia, may make a target for scams; or storing information, which suggests a user has an intellectual disability, may make a target for predators.

A predatory company could send requests for money, saying “you haven’t made your donation” despite the user having made one.


It is vital that users stay safe.

Another consideration is that many users have weak executive functioning, and are thus less likely to identify risks correctly.



The benefit of this SC is to keep users safe while online.

 

 

Related Resources (optional)

Issue papers: Online

Also see

 

 

 

Testability


Acceptable  outcomes:

No to Step 1
OR
Yes to all three steps.

 

 

Techniques

  1. For personalization information: Use functional requirements for personalization that do not suggest  users have disablities.
  2. Use approved security techniques, in your jurisdiction, for sensitive data.
  3. Obtain approval by the Helsinki Committee for Human Rights, which is a an ethics committee used by the European Union.
  4. Failure technique to be added: associating a user to a code that is used mainly for people with cognitive disabilities.

Advisory techniques

See also

 

https://www.owasp.org/index.php/Client_Side_Testing

https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)

https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule_-_Keep_Sensitive_Data_Out_of_the_URL

 

 

working groups notes (optional)

we could (if needed ) make this AA and make the following A :

Use known techniques to keep sensitive user information safe that can be used to identify that user may have a disability.Warn users of any known risk.