W3C home > Mailing lists > Public > public-tracking@w3.org > June 2012

Security permitted use breakout text

From: Heather West <heatherwest@google.com>
Date: Thu, 21 Jun 2012 16:19:23 -0700
Message-ID: <CA+Z3oOaXC7dqEvFaNJaMqb62XdJcmsJkLNTErp10DcxgAtWXtg@mail.gmail.com>
To: "public-tracking@w3.org Group WG" <public-tracking@w3.org>
The group worked on verbiage for the security and fraud permitted use, and
came up with strawman text:
Data MAY be collected, maintained and used for the express purpose of
detecting security risks and fraudulent activity, defending from attacks
and fraud, and maintaining integrity of the service. This includes data
reasonably necessary for enabling authentication/verification, detecting
hostile transactions and attacks, providing fraud prevention, and
maintaining system integrity.

There may be some need to define fraud in terms of deception and
illegitimate gain, as differentiated from misrpresentation and legal fraud.
We can do that in the future if that becomes necessary.

There is overlap between this and the financial use, this one seems to
cover "find the bad guy" as opposed to "what was the impact and how should
we bill appropriately."

-- 

Heather West | Google Policy | heatherwest@google.com | 202-643-6381
Received on Thursday, 21 June 2012 23:20:13 UTC

This archive was generated by hypermail 2.3.1 : Friday, 21 June 2013 10:11:31 UTC