diff --git a/epub33/core/index.html b/epub33/core/index.html index bba8a6b05..47c659f34 100644 --- a/epub33/core/index.html +++ b/epub33/core/index.html @@ -9423,10 +9423,21 @@

Recommendations

creators should also allow users to opt out of tracking, when feasible, and provide users the ability to manage and delete any data that is collected about them.

-

Content authors also need to consider the inadvertent collection of information about users. Linking - to content on a publisher's web site, or remotely hosting resources on their servers, can lead to +

EPUB creators also need to consider the inadvertent collection of information about users. Linking to + content on a publisher's web site, or remotely hosting resources on their servers, can lead to profiling users, especially if unique tracking identifiers are added to the URLs.

+

When collecting and storing user information within an EPUB publication (e.g., through the use of cookies and web + storage [[?html]]), EPUB creators need to consider to potential for data theft by other EPUB + publications on a reading system. Although [[epub-rs-33]] introduces a unique origin requirement for EPUB publications, + which limits the potential for attacks, there is still a risk that reading systems will allow EPUB + publications access to shared persistent storage (e.g., older reading systems that have not been + updated and non-conforming newer reading systems). Consequently, EPUB creators SHOULD NOT store + sensitive user data in persistent storage. If EPUB creators must store sensitive data, they SHOULD + encrypt the data to prevent trivial access to it in the case of an exploit.

+

When publishers and vendors must use digital rights management schemes, they should prefer schemes that do not utilize or transmit information about the user or their content to external parties to perform encryption or decryption.

@@ -11503,6 +11514,9 @@

Change log

>Working Group's issue tracker.