Data Controller Options

From MgmtWiki
Revision as of 10:49, 14 February 2021 by Tom (talk | contribs) (Context)

Jump to: navigation, search

Full Title or Meme

A description of a few of the ways that a Data Controller might give the required level of control to the user of their information.

Context

  • The GDPR started an effort by legal jurisdictions authority to limit the misuse of User Private Information that is spreading around the world.
  • Several "Member States" of the EU have defined the GDPR terms, for example Ireland.<ref>Irish Data Protection Commission, Are you a "data
  • The User Object that contains all of the attributes, behaviors and transactions that the Data Controller persists about the user is accessible to the user, are available to the user with a few exceptions that are specifically called out in laws or regulations. For the purposes of this wiki, the subject identifier of the user object references the real-word user.

Obligations

  • The user is given increasingly control of their information as a reaction to the misuse of that informatin to track and annoy that user.

Use Cases

As there are many reasons for a web site to collect User Information so too there are many different design patterns that apply to the way those sites collect it. A few of those patterns are described here as User Experiences which are called user journeys or use cases.

User Object created first

This use case covers the case where the life of the user object maintained on the site is likely to be of extended duration, say more than a decade or two. Examples are school or medical records where the lifetime of the data is at least as long as the user that owns that identity described in the User Object.

  1. Site describes to the user what the are and what they do with any User Information that the collect.
  2. User is asked to select a user name, which could be an existing email or phone number, if the user understands the limitations of that choice.

User Identity

The totality of the user identity lives in the real world. This section applies to the attributes from the user identity that are requested for inclusion in the User Object.

User Autentication

References

Other Materiel