2009/dap/privacy-practices Overview.html,1.18,1.19 FPWD.html,1.9,1.10

Update of /sources/public/2009/dap/privacy-practices
In directory hutz:/tmp/cvs-serv6803

Modified Files:
	Overview.html FPWD.html 
Log Message:
attempt to fix sectioning for toc

Index: Overview.html
===================================================================
RCS file: /sources/public/2009/dap/privacy-practices/Overview.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -d -r1.18 -r1.19
--- Overview.html	1 Aug 2011 18:26:29 -0000	1.18
+++ Overview.html	1 Aug 2011 18:48:34 -0000	1.19
@@ -79,7 +79,7 @@
           <li>Respect for User Privacy — Keep it User-Centric</li>
         </ol>
       </div>
-    </section>
+      </section>
     <section id="usercentric">
       <h2>User Centric Design</h2>
       <p>Privacy should be user centric, giving the user understanding
@@ -190,7 +190,6 @@
     <section id="data-minimization">
       <h2>Minimize collection and
       transmission of personal data</h2> 
-      <section id="minimization-considerations">
         <p>Review the data and how it is structured and used, minimizing
         the amount and detail of data required to provide a service.
         </p>
@@ -227,7 +226,6 @@
           </p>
 
         </div>
-      </section>
     </section>
     <section id="data-confidentiality">
       <h2>Maintain the confidentiality of personal data</h2> 
@@ -262,7 +260,6 @@
     </section>
     <section id="access-log">
       <h2>Control and log access</h2> 
-      <section id="access-control">
         <div class="practice">
           <p><span id="bp-audit-log"
           class="practicelab">Control and log access to data.</span></p> 
@@ -271,9 +268,8 @@
             log access.
           </p>
         </div>
-      </section>
     </section>	
-    <section id='bp-summary'></section>
+    <section id='bp-summary'></section> 
   </body>
 </html>
 

Index: FPWD.html
===================================================================
RCS file: /sources/public/2009/dap/privacy-practices/FPWD.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -d -r1.9 -r1.10
--- FPWD.html	1 Aug 2011 18:26:29 -0000	1.9
+++ FPWD.html	1 Aug 2011 18:48:34 -0000	1.10
@@ -22,7 +22,7 @@
       Working Group Note. 
       </p>
     <p>This document was published by the <a href="http://www.w3.org/2009/dap/">Device APIs and Policy Working Group</a> as a Working Draft. If you wish to make comments regarding this document, please send them to <a href="mailto:public-device-apis@w3.org">public-device-apis@w3.org</a> (<a href="mailto:public-device-apis-request@w3.org?subject=subscribe">subscribe</a>, <a href="http://lists.w3.org/Archives/Public/public-device-apis/">archives</a>). All feedback is welcome.</p><p>Publication as a Working Draft does not imply endorsement by the W3C Membership. This is a draft document and may be updated, replaced or obsoleted by other documents at any time. It is inappropriate to cite this document as other than work in progress.</p><p>This document was produced by a group operating under the <a href="http://www.w3.org/Consortium/Patent-Policy-20040205/">5 February 2004 W3C Patent Policy</a>. The group does not expect this document to become a W3C Recommendation. W3C maintains a <a href="http://www.w3.org/204/01/pp-impl/43696/status" rel="disclosure">public list of any patent disclosures</a> made in connection with the deliverables of the group; that page also includes instructions for disclosing a patent. An individual who has actual knowledge of a patent which the individual believes contains <a href="http://www.w3.org/Consortium/Patent-Policy-20040205/#def-essential">Essential Claim(s)</a> must disclose the information in accordance with <a href="http://www.w3.org/Consortium/Patent-Policy-20040205/#sec-Disclosure">section 6 of the W3C Patent Policy</a>.</p></div><div id="toc" class="section"><h2 class="introductory">Table of Contents</h2><ul class="toc"><li class="tocline"><a href="#introduction" class="tocxref"><span class="secno">1. </span>Introduction</a></li><li class="tocline"><a href="#privacybydesign" class="tocxref"><span class="secno">2. </span>Privacy By Design</a></li><li class="tocline"><a href="#usercentric" class="tocxref"><span class="secno">3. </span>User Centric Design</a></li><li class="tcline"><a href="#data-minimization" class="tocxref"><span class="secno">4. </span>Minimize collection and
-      transmission of personal data</a><ul class="toc"></ul></li><li class="tocline"><a href="#data-confidentiality" class="tocxref"><span class="secno">5. </span>Maintain the confidentiality of personal data</a></li><li class="tocline"><a href="#access-log" class="tocxref"><span class="secno">6. </span>Control and log access</a><ul class="toc"></ul></li><li class="tocline"><a href="#bp-summary" class="tocxref"><span class="secno">7. </span>Best Practices Summary</a></li><li class="tocline"><a href="#references" class="tocxref"><span class="secno">A. </span>References</a><ul class="toc"><li class="tocline"><a href="#normative-references" class="tocxref"><span class="secno">A.1 </span>Normative references</a></li><li class="tocline"><a href="#informative-references" class="tocxref"><span class="secno">A.2 </span>Informative references</a></li></ul></li></ul></div> <!-- abstract -->
+      transmission of personal data</a></li><li class="tocline"><a href="#data-confidentiality" class="tocxref"><span class="secno">5. </span>Maintain the confidentiality of personal data</a></li><li class="tocline"><a href="#access-log" class="tocxref"><span class="secno">6. </span>Control and log access</a></li><li class="tocline"><a href="#bp-summary" class="tocxref"><span class="secno">7. </span>Best Practices Summary</a></li><li class="tocline"><a href="#references" class="tocxref"><span class="secno">A. </span>References</a><ul class="toc"><li class="tocline"><a href="#normative-references" class="tocxref"><span class="secno">A.1 </span>Normative references</a></li><li class="tocline"><a href="#informative-references" class="tocxref"><span class="secno">A.2 </span>Informative references</a></li></ul></li></ul></div> <!-- abstract -->
 
     
 
@@ -66,7 +66,7 @@
           <li>Respect for User Privacy — Keep it User-Centric</li>
         </ol>
       </div>
-    </div>
+      </div>
     <div id="usercentric" class="section">
       <!--OddPage--><h2><span class="secno">3. </span>User Centric Design</h2>
       <p>Privacy should be user centric, giving the user understanding
@@ -171,7 +171,6 @@
     <div id="data-minimization" class="section">
       <!--OddPage--><h2><span class="secno">4. </span>Minimize collection and
       transmission of personal data</h2> 
-      <div id="minimization-considerations" class="section">
         <p>Review the data and how it is structured and used, minimizing
         the amount and detail of data required to provide a service.
         </p>
@@ -206,7 +205,6 @@
           </p>
 
         </div>
-      </div>
     </div>
     <div id="data-confidentiality" class="section">
       <!--OddPage--><h2><span class="secno">5. </span>Maintain the confidentiality of personal data</h2> 
@@ -239,7 +237,6 @@
     </div>
     <div id="access-log" class="section">
       <!--OddPage--><h2><span class="secno">6. </span>Control and log access</h2> 
-      <div id="access-control" class="section">
         <div class="practice">
           <p><span id="bp-audit-log" class="practicelab">Best Practice 12: Control and log access to data.</span></p> 
           <p class="practicedesc">
@@ -247,7 +244,6 @@
             log access.
           </p>
         </div>
-      </div>
     </div>	
     <div id="bp-summary" class="section"><!--OddPage--><h2><span class="secno">7. </span>Best Practices Summary</h2><ul><li><a href="#bp-privacy-by-design">Best Practice 1</a>: Follow "Privacy By Design" principles</li><li><a href="#bp-user-driven">Best Practice 2</a>: Enable the user to make informed decisions about
             sharing their personal information with a service.
@@ -277,7 +273,7 @@
         </li><li><a href="#bp-secure-storage">Best Practice 11</a>: 
         Maintain the confidentiality of user data in
         storage.
-        </li><li><a href="#bp-audit-log">Best Practice 12</a>: Control and log access to data.</li></ul></div>
+        </li><li><a href="#bp-audit-log">Best Practice 12</a>: Control and log access to data.</li></ul></div> 
   
 
 

Received on Monday, 1 August 2011 18:48:38 UTC