The laws on privacy isn’t enough when we talk from a technical and design point of view of information applications because not all data and neither the cookies are essential.
As user and beta test in some online platforms I took care of this point particularly from the technic point of view.
Always placing the blame solely on users the question it isn’t the right direction and neither to block the access to the service because we haven’t accept cookies for marketing pourpose it isn’t correct.
The aspect from technician, also in the beta, is more complex.
Particularly in some professional ambits almost we are daily immersed in the technologies and we cohabit, in many cases, also in the night.
The technology in many cases interact with the technologies nearby and it’s necessary of interoperability. This point doesn’t mean that it’s necessary to pass all but it’s enough the essential personal data and the permission of user in connection to the registration to the service.
For the access we talk of technical coookies of use so to consent this interoperability. More than the conservation in these cases it’s important that the data passage is authorized from the user really registered and it’s secure from technological point of view, further, it have to be always the possibility to remove the authorization of the access for security motivations.
There are many important aspects either technically or from beta side, one of these it’s the usability and the clearness of the informtaion on some components that they regard just the acceptance and the usage of necessary and technical cookies.
If I switch from one platform to another using the mail used to register for the service it looks obvious that it has to be guaranted the security which goes beyond the two simply services of mail and platform of service.
When we look at this point we talk of privacy by design, or rather a design of components and platforms that it takes in consideration the privacy as integrate part of programming already from the design phase, that phase called alpha and then it prosecutes in beta phase until the final release of the application and interoperability trought the platforms.
Another aspect it’s the security question of 2FA and 3FA belonging to third parties that they are integrate in that process. The question doesn’t regard only the clearness of the technical cookie policy but also the data transfer and the resolution of technical issues belonged to the app and technical services of third parties and not tied directly the platforms of service.
In these cases it’s necessary take the responsability of an eventually unjustified block of third parties and search for a recovery mode of credentialities without third applications that they are in many cases cracked.

Comments