Skip to content

Commit

Permalink
Trim data protection requirements to resolve #2330 (#2349)
Browse files Browse the repository at this point in the history
  • Loading branch information
tghosth authored Nov 7, 2024
1 parent fff1dca commit c874c76
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions 5.0/en/0x16-V8-Data-Protection.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,15 +53,15 @@ Note: Privacy regulations and laws, such as the Australian Privacy Principles AP
| # | Description | L1 | L2 | L3 | CWE |
| :---: | :--- | :---: | :---: | :---: | :---: |
| **8.3.1** | [MODIFIED, MERGED FROM 3.1.1, 13.1.3] Verify that sensitive data is only sent to the server in the HTTP message body or header fields and that the URL and query string do not contain sensitive information, such as an API key or session token. |||| 598 |
| **8.3.2** | [MODIFIED, SPLIT TO 8.3.9, LEVEL L1 > L3] Verify that users have a method to remove their data on demand. | | | | |
| **8.3.3** | [MODIFIED, LEVEL L1 > L3] Verify that the application provides guidance regarding how it collects and uses of personal data and that users have to provide opt-in consent for this use. | | | | |
| **8.3.2** | [DELETED, NOT IN SCOPE] | | | | |
| **8.3.3** | [DELETED, NOT IN SCOPE] | | | | |
| **8.3.4** | [DELETED, MERGED TO 1.8.1] | | | | |
| **8.3.5** | [MOVED TO 7.2.7] | | | | |
| **8.3.6** | [DELETED, NOT PRACTICAL] | | | | |
| **8.3.7** | [DELETED, DUPLICATE OF 1.8.2] | | | | |
| **8.3.8** | Verify that sensitive personal information is subject to data retention classification, such that old or out of date data is deleted automatically, on a schedule, or as the situation requires. | | || |
| **8.3.9** | [ADDED, SPLIT FROM 8.3.2] Verify that users have a method to export their data on demand. | | | | |
| **8.3.10** | [ADDED] Verify that sensitive information is removed from the metadata of user-submitted files unless storage is consented to by the user. | ||| 212 |
| **8.3.8** | [LEVEL L2 > L3] Verify that sensitive personal information is subject to data retention classification, such that old or out of date data is deleted automatically, on a schedule, or as the situation requires. | | || |
| **8.3.9** | [DELETED, NOT IN SCOPE] | | | | |
| **8.3.10** | [ADDED] Verify that sensitive information is removed from the metadata of user-submitted files unless storage is consented to by the user. | ||| 212 |
| **8.3.11** | [MODIFIED, MOVED FROM 10.2.2, LEVEL L2 > L1] Verify that the application does not ask for unnecessary or excessive permissions to privacy related features or sensors, such as cameras, microphones, or location. |||| 272 |

When considering data protection, a primary consideration should be around bulk extraction or modification or excessive usage. For example, many social media systems only allow users to add 100 new friends per day, but which system these requests came from is not important. A banking platform might wish to block more than 5 transactions per hour transferring more than 1000 euro of funds to external institutions. Each system's requirements are likely to be very different, so deciding on "abnormal" must consider the threat model and business risk. Important criteria are the ability to detect, deter, or preferably block such abnormal bulk actions.
Expand Down

0 comments on commit c874c76

Please sign in to comment.