W3C home > Mailing lists > Public > public-wsc-wg@w3.org > April 2007

Question re: Comments USE-Cases

From: Robert Yonaitis <ryonaitis@hisoftware.com>
Date: Tue, 3 Apr 2007 14:43:44 -0400
Message-ID: <AAD1044DDFFCC84895A899314A72FB6C952FC0@be04.exg3.exghost.com>
To: <public-wsc-wg@w3.org>
   Hello All:
It appears that my posts are going through to the list now and to celebrate this fact I will ask a question. I have been reviewing the document  http://www.w3.org/TR/wsc-usecases/   Section six (6) says USE cases and there have been comments regarding other sections. So for my question: Should one be commenting on the full : "Web Security Experience, Indicators and Trust: Scope and Use Cases" document?  If so here is my first comment, I am not sure if this is a editing question or a goals question.

2.2 Relevance of security information

The Working Group will analyze common use cases to determine what security information a user requires to proceed safely and recommend security information that should, or should not, be presented in each case.

When we say "What security information a user requires to proceed" isn't this a bit to strong, could this not create the presumption of liability for people working on this document. Wouldn't it be better to say something more vague:
"what security information a user at least in part requires to proceed safely"
** Note I am not a lawyer, but the word requires (the way it was used) seems to strong to me.
Robert B Yonaitis
Founder and CTO
<https://exg3.exghost.com/exchweb/bin/redir.asp?URL=http://www.hisoftware.com/> http://www.hisoftware.com/ <http://www.hisoftware.com/co/yonaitis.htm> co/yonaitis.htm 

The information in this transmittal (including attachments, if any) is privileged and confidential and is intended only for the recipient(s) listed above.  Any review, use, disclosure, distribution or copying of this transmittal is prohibited except by or on behalf of the intended recipient.  If you have received this transmittal in error, please notify me immediately by reply email and destroy all copies of the transmittal.  Thank you.
Received on Tuesday, 3 April 2007 18:45:17 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 21:14:15 UTC