Skip to content

Commit

Permalink
Fix missing oxford commas. (#408)
Browse files Browse the repository at this point in the history
Co-authored-by: Robin Berjon <[email protected]>
Co-authored-by: Jeffrey Yasskin <[email protected]>
  • Loading branch information
3 people authored Feb 28, 2024
1 parent 01c866b commit 5dab0a6
Showing 1 changed file with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -663,7 +663,7 @@
recognizable or obvious to a user within a particular interaction. Visiting a website may involve
the actors that contribute to operating that site, but also actors with network access,
which may include: Internet service providers; other network operators; local institutions providing
a network connection including schools, libraries or universities; government intelligence services;
a network connection including schools, libraries, or universities; government intelligence services;
malicious hackers who have gained access to the network or the systems of any of the other actors.
High-level threats including [=surveillance=] may be pursued by these actors. Pervasive monitoring,
a form of large-scale, indiscriminate surveillance, is a known attack on the privacy of users of the
Expand Down Expand Up @@ -793,9 +793,9 @@
no way of knowing that a person is vulnerable.

Some individuals may be more vulnerable to privacy risks or harm as a result of
collection, misuse, loss or theft of personal data because:
collection, misuse, loss, or theft of personal data because:

* of their attributes, interests, opinions or behaviour;
* of their attributes, interests, opinions, or behaviour;
* of the situation or setting (e.g. where there is information asymmetry or other
power imbalances);
* they lack the capacity to fully assess the risks;
Expand All @@ -807,12 +807,12 @@

Additional privacy protections may be needed for personal data of vulnerable
people or [sensitive information](#hl-sensitive-information) which could cause
someone to become vulnerable if their personal data is collected, used or
shared (e.g. blocking tracking elements, sensor data or information about
someone to become vulnerable if their personal data is collected, used, or
shared (e.g. blocking tracking elements, sensor data, or information about
installed software or connected devices).

While sometimes others can help vulnerable people assess privacy risks and
make decisions about privacy (such as parents, [=guardians=] and peers), everyone
make decisions about privacy (such as parents, [=guardians=], and peers), everyone
has their own right to privacy.

### Guardians {#guardians}
Expand Down Expand Up @@ -929,7 +929,7 @@
captured in the same picture would prefer their participation not to be disclosed. Another example
of such issues are sites that enable people to upload their contacts: the person performing the
upload might be more open to disclosing their social networks than the people they are connected to
are. Such issues do not necessarily admit simple, straightforward solutions but they need to be
are. Such issues do not necessarily admit simple, straightforward solutions, but they need to be
carefully considered by people building websites.

### Transparency and Research {#transparency-for-research}
Expand Down

0 comments on commit 5dab0a6

Please sign in to comment.