W3C home > Mailing lists > Public > public-cognitive-a11y-tf@w3.org > August 2015

Re: ACTION-126, part 2, anything missing from techniques & gap analysis

From: lisa.seeman <lisa.seeman@zoho.com>
Date: Sun, 23 Aug 2015 21:23:43 +0300
To: Rochford <john.rochford@umassmed.edu>
Cc: "public-cognitive-a11y-tf@w3.org" <public-cognitive-a11y-tf@w3.org>
Message-Id: <14f5bcb700e.11af2de98203340.2519816989651016396@zoho.com>
Thanks John,Lets discuss on the call tomorow

All the best

Lisa Seeman

Athena ICT Accessibility Projects 
LinkedIn, Twitter

---- On Sun, 23 Aug 2015 20:57:25 +0300  Rochford&lt;john.rochford@umassmed.edu&gt; wrote ---- 

  Hi Lisa and All,
 I was assigned "ACTION-126 - Update security paper and see if anything is missing from the techniques and gap analysis. This message is about the second part, “… see if anything is missing from the techniques and gap analysis.”
 Below, I have identified three sections of Techniques and Gap Analysis to which the issue paper on Privacy and Security should apply. The easy section to address concisely is Gap Analysis, “2.9.2 Avoid Loss of data.” I quoted it below, and added two W3C techniques listed in the Privacy and Security issue paper.
 The other two sections should be addressed by the “Proposed Solutions” section of the Privacy and Security issue paper. If the Techniques and Gap Analysis papers are intended to be all-inclusive / stand-alone docs, adding all the text from the Proposed Solutions section may make them difficult to read. If those two papers do not have to be all-inclusive, then the easy solution is simply to include links, to the Proposed Solutions section of the Privacy and Security issue paper, from the sections I identified in the Techniques and Gap Analysis papers.
 Gap Analysis (2 of 3 sections)
 1. “2.9.2 Avoid Loss of data Data needs to be held, saved and available if web pages are refreshed by accident, closed or new tabs are opened. There needs to be the ability to return to forms partially filled and the ability to save content but security issues may prevent this on some websites.”
  o  Save submitted data for reuse after a user authenticates. 
  §  See WCAG 2.0, Technique G105.
  o  Encode user data as hidden or encrypted in a re-authorization page.
  §  See WCAG 2.0, Technique G181.
 2. Under WCAG 3.3 Help users avoid and correct mistakes, Buying &amp; Selling Online (Payments)
 Techniques (1 of 3 sections)
  ·     2.6.10 Buying &amp; Selling Online (Payments)
 John Rochford
 UMass Medical School/E.K. Shriver Center
 Director, INDEX Program
 Instructor, Family Medicine &amp; Community Health
 Twitter: @ClearHelper
Received on Sunday, 23 August 2015 18:24:08 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 19:13:28 UTC