Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Grammar fixes including fixing missing oxford comas. #408

Merged
merged 3 commits into from
Feb 28, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -663,7 +663,7 @@
recognizable or obvious to a user within a particular interaction. Visiting a website may involve
the actors that contribute to operating that site, but also actors with network access,
which may include: Internet service providers; other network operators; local institutions providing
a network connection including schools, libraries or universities; government intelligence services;
a network connection including schools, libraries, or universities; government intelligence services;
malicious hackers who have gained access to the network or the systems of any of the other actors.
High-level threats including [=surveillance=] may be pursued by these actors. Pervasive monitoring,
a form of large-scale, indiscriminate surveillance, is a known attack on the privacy of users of the
Expand Down Expand Up @@ -793,9 +793,9 @@
no way of knowing that a person is vulnerable.

Some individuals may be more vulnerable to privacy risks or harm as a result of
collection, misuse, loss or theft of personal data because:
collection, misuse, loss, or theft of personal data because:

* of their attributes, interests, opinions or behaviour;
* of their attributes, interests, opinions, or behaviour;
* of the situation or setting (e.g. where there is information asymmetry or other
power imbalances);
* they lack the capacity to fully assess the risks;
Expand All @@ -807,12 +807,12 @@

Additional privacy protections may be needed for personal data of vulnerable
people or [sensitive information](#hl-sensitive-information) which could cause
someone to become vulnerable if their personal data is collected, used or
shared (e.g. blocking tracking elements, sensor data or information about
someone to become vulnerable if their personal data is collected, used, or
shared (e.g. blocking tracking elements, sensor data, or information about
installed software or connected devices).

While sometimes others can help vulnerable people assess privacy risks and
make decisions about privacy (such as parents, [=guardians=] and peers), everyone
make decisions about privacy (such as parents, [=guardians=], and peers), everyone
has their own right to privacy.

### Guardians {#guardians}
Expand Down Expand Up @@ -929,7 +929,7 @@
captured in the same picture would prefer their participation not to be disclosed. Another example
of such issues are sites that enable people to upload their contacts: the person performing the
upload might be more open to disclosing their social networks than the people they are connected to
are. Such issues do not necessarily admit simple, straightforward solutions but they need to be
are. Such issues do not necessarily admit simple, straightforward solutions, but they need to be
carefully considered by people building websites.

### Transparency and Research {#transparency-for-research}
Expand Down
Loading