CVS WWW/2011/tracking-protection/drafts

Update of /w3ccvs/WWW/2011/tracking-protection/drafts
In directory gil:/tmp/cvs-serv31516

Modified Files:
	tracking-compliance.html 
Log Message:
consistent about referring to network interactions rather than transactions

--- /w3ccvs/WWW/2011/tracking-protection/drafts/tracking-compliance.html	2014/01/16 22:10:51	1.108
+++ /w3ccvs/WWW/2011/tracking-protection/drafts/tracking-compliance.html	2014/01/27 01:55:34	1.109
@@ -86,8 +86,8 @@
         command-line tools, native applications, and mobile apps [[!HTTP11]].
       </p></section>
       
-      <section id="network-transaction">
-      <h3>Network Transaction</h3>
+      <section id="network-interaction">
+      <h3>Network Interaction</h3>
       <p>
         A <dfn>network interaction</dfn> is a single HTTP request and its
         corresponding response(s): zero or more interim (1xx) responses and
@@ -224,7 +224,7 @@
 			<section id="graduated-response">
 				<h3>Graduated Response</h3>
 				<p>
-					A <dfn>graduated response</dfn> a methodology where the action taken is proportional to the size of the problem or risk that is trying to be mitigated. In the context of this document, the term is used to describe an increase in the collection of data about a user or transaction in response to a specific problem that a party has become aware of, such as an increase in fraudulent activity originating from a particular network or IP address range resulting in increased logging of data relating to transactions from that specific range of IP addresses as opposed to increased logging for all users in general.
+					A <dfn>graduated response</dfn> a methodology where the action taken is proportional to the size of the problem or risk that is trying to be mitigated. In the context of this document, the term is used to describe an increase in the collection of data about a user or interaction in response to a specific problem that a party has become aware of, such as an increase in fraudulent activity originating from a particular network or IP address range resulting in increased logging of data relating to interactions from that specific range of IP addresses as opposed to increased logging for all users in general.
 				</p>
 				<p class="note">
   				  Only used in security, below, and may overlap with the explanation
@@ -283,7 +283,7 @@
     <p>
       The first party MUST NOT share data about this network interaction with
       third parties who could not collect the data
-      themselves under this recommendation. Data about the transaction MAY be shared with service providers acting on behalf of the first party.
+      themselves under this recommendation. Data about the interaction MAY be shared with service providers acting on behalf of the first party.
     </p>
 		<p>
 			A first party MAY elect to follow the rules defined here for third parties.
@@ -465,7 +465,7 @@
 			 click fraud) from that IP address range. Similarly, if an attack shared 
 			 some other identifiable fingerprint, such as a combination of User Agent 
 			 and other protocol information, the party could retain logs on all 
-			 transactions matching that fingerprint until it can be determined that 
+			 interactions matching that fingerprint until it can be determined that 
 			 they are not associated with such an attack or such retention is no 
 			 longer necessary to support prosecution.</p>
 

Received on Monday, 27 January 2014 01:55:35 UTC