Skip to content

Commit

Permalink
Merge pull request #172 from TheDigitalStandard/2020_12_1.3.0-2
Browse files Browse the repository at this point in the history
Delete Dark-Patterns.md
  • Loading branch information
stephtngu-CR authored Dec 15, 2020
2 parents e80e329 + 9a1f060 commit ab8494a
Show file tree
Hide file tree
Showing 13 changed files with 15 additions and 62 deletions.
45 changes: 0 additions & 45 deletions Dark-Patterns.md

This file was deleted.

2 changes: 1 addition & 1 deletion evaluations/ownership/interoperability.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ criterias:
The manufacturer does not use software, copyright, or other devices to
restrict the use of products and services that would otherwise be
possible to use with your existing products (e.g., set-top boxes,
third party applications, etc.).
third-party applications, etc.).
procedures:
- |+
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ testName: Process for terms of service enforcement
criterias:
- criteriaName: >-
I know how, when, and why the company or organization unilaterally closes
user account sand/or restricts access to services.
user accounts and/or restricts access to services.
indicators:
- indicator: >-
The company or organization clearly explains what types of activities
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ criterias:
The company or organization publishes data about the number of
accounts it restricts or closes as a result of a request from private
third-parties.
third parties.
The company or organization clearly discloses that it notifies users
Expand Down
2 changes: 1 addition & 1 deletion evaluations/privacy/data-control.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ criterias:
- criteriaName: I can see and control everything the company knows about me.
indicators:
- indicator: >-
The definition of 'user information' includes information collected from third-parties.
The definition of 'user information' includes information collected from third parties.
Users can control the collection of their information.
Expand Down
2 changes: 1 addition & 1 deletion evaluations/privacy/data-retention-and-deletion.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ criterias:
indicators:
- indicator: >-
The company on its own deletes outdated and unnecessary personal
information, or renders that data to be reasonably deidentified.
information, or renders that data to be reasonably de-identified.
The company provides specific retention periods for different types of
information that are reasonably scoped to get rid of outdated and
Expand Down
9 changes: 4 additions & 5 deletions evaluations/privacy/data-sharing.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,7 @@ criterias:
- criteriaName: Data sharing is reasonably scoped and transparent.
indicators:
- indicator: |-
The company only shares information with third parties as is reasonably necessary to deliver service to
consumers.
The company only shares information with third parties as is reasonably necessary to deliver service to consumers.
The company clearly discloses what user information it shares with whom.
Expand All @@ -14,14 +13,14 @@ criterias:
The company clearly discloses whether it shares user information with government or legal authorities.
Third party domains contacted by the product are named in the privacy policy.
Third-party domains contacted by the product are named in the privacy policy.
procedures:
- |-
Investigation and analysis of publicly available documentation to
determine what the company clearly discloses.
Analyze network traffic to see what third party domains are
Analyze network traffic to see what third-party domains are
contacted by the product.
readinessFlag: '1'
readinessFlag: '1'
3 changes: 1 addition & 2 deletions evaluations/privacy/data-use.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,7 @@ criterias:
- criteriaName: Data usage is consistent with the context of the relationship with the user and is transparent.
indicators:
- indicator: |-
The company puts limits on the use of my data that are consistent with the purpose for which the data is
collected.
The company puts limits on the use of my data that are consistent with the purpose for which the data is collected.
The company explicitly discloses every way in which it uses my data.
Expand Down
2 changes: 1 addition & 1 deletion evaluations/privacy/minimal-data-collection.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ criterias:
Decline permissions not relevant to the product's functionality,
verify that product is still functional.
- indicator: >-
Manufacturer does not discriminate or other provide a lower level of
Manufacturer does not discriminate or otherwise provide a lower level of
service if a consumer exercises privacy rights or does not consent
to unnecessary secondary data collection or use.
procedures:
Expand Down
2 changes: 1 addition & 1 deletion evaluations/security/authentication.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ criterias:
procedures:
- Create an account and look for settings to enable MFA.

- indicator: For products that handle sufficiently sensitive data, users can choose to use multi-factor authentication whenever product is activated, or when a device is unreckognized.
- indicator: For products that handle sufficiently sensitive data, users can choose to use multi-factor authentication whenever product is activated, or when a device is unrecognized.
procedures:
- Create an account, enable MFA, and try using product multiple times on one device to see if MFA is required each time.
- Create an account, enable MFA, and try using product multiple times on different devices to see if MFA is required each time.
Expand Down
2 changes: 1 addition & 1 deletion evaluations/security/best-build-practices.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ criterias:
What is the branch density?
How many stack adjusts, function calls, etc are there?
How many stack adjusts, function calls, etc. are there?
How complex is the code?
Expand Down
2 changes: 1 addition & 1 deletion evaluations/security/known-exploit-resistance.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,6 @@ criterias:
Examine file system, database, and logs to determine if sensitive
information is stored in a way that could lead to compromise of user
data."
data.
readinessFlag: '2'
2 changes: 1 addition & 1 deletion evaluations/security/security-oversight.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ criterias:
The company commissions third-party security audits on its products
and services.
The company ensures that third-parties who process data on behalf of the company
The company ensures that third parties who process data on behalf of the company
implement the required technical and organizational measures to protect user data.
procedures:
- >-
Expand Down

0 comments on commit ab8494a

Please sign in to comment.