From 5dab0a611f50066917a7569c6dc5dd1363c67eda Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=E2=9C=AA=CE=9EY=20STANFORD?= Date: Wed, 28 Feb 2024 10:26:48 -0700 Subject: [PATCH] Fix missing oxford commas. (#408) Co-authored-by: Robin Berjon Co-authored-by: Jeffrey Yasskin --- index.html | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/index.html b/index.html index cae64b36..daf47d93 100644 --- a/index.html +++ b/index.html @@ -663,7 +663,7 @@ recognizable or obvious to a user within a particular interaction. Visiting a website may involve the actors that contribute to operating that site, but also actors with network access, which may include: Internet service providers; other network operators; local institutions providing -a network connection including schools, libraries or universities; government intelligence services; +a network connection including schools, libraries, or universities; government intelligence services; malicious hackers who have gained access to the network or the systems of any of the other actors. High-level threats including [=surveillance=] may be pursued by these actors. Pervasive monitoring, a form of large-scale, indiscriminate surveillance, is a known attack on the privacy of users of the @@ -793,9 +793,9 @@ no way of knowing that a person is vulnerable. Some individuals may be more vulnerable to privacy risks or harm as a result of -collection, misuse, loss or theft of personal data because: +collection, misuse, loss, or theft of personal data because: -* of their attributes, interests, opinions or behaviour; +* of their attributes, interests, opinions, or behaviour; * of the situation or setting (e.g. where there is information asymmetry or other power imbalances); * they lack the capacity to fully assess the risks; @@ -807,12 +807,12 @@ Additional privacy protections may be needed for personal data of vulnerable people or [sensitive information](#hl-sensitive-information) which could cause -someone to become vulnerable if their personal data is collected, used or -shared (e.g. blocking tracking elements, sensor data or information about +someone to become vulnerable if their personal data is collected, used, or +shared (e.g. blocking tracking elements, sensor data, or information about installed software or connected devices). While sometimes others can help vulnerable people assess privacy risks and -make decisions about privacy (such as parents, [=guardians=] and peers), everyone +make decisions about privacy (such as parents, [=guardians=], and peers), everyone has their own right to privacy. ### Guardians {#guardians} @@ -929,7 +929,7 @@ captured in the same picture would prefer their participation not to be disclosed. Another example of such issues are sites that enable people to upload their contacts: the person performing the upload might be more open to disclosing their social networks than the people they are connected to -are. Such issues do not necessarily admit simple, straightforward solutions but they need to be +are. Such issues do not necessarily admit simple, straightforward solutions, but they need to be carefully considered by people building websites. ### Transparency and Research {#transparency-for-research}