Sponsored Content
The Lounge What is on Your Mind? UNIX.COM General Data Privacy Regulations (GDPR) Compliance - For Member Comments Post 303018568 by Neo on Sunday 10th of June 2018 04:17:05 PM
Old 06-10-2018
Quote:
Originally Posted by RudiC
Should we, in the general text, insert a sentence that we "on demand edit a post that is deemed by the poster to contain sensitive data" or similar?
"deemed by the poster and the moderation team" ...

If we state "deemed by the poster" then they could demand anything to be deleted, even things which are not privacy related.

The bottom line is that we already state, as I recall, that posting is a public action.

The GDRP data, in general, is related to information which the user has not posted for public consumption and viewing (email address, sex, date of birth, etc).

When someone posts in a forum or makes a comment on a news article on some news website, they understand by posting that they are making public comments and that data that posted is not in the public domain and belongs to the web site.
This User Gave Thanks to Neo For This Post:
 

7 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

General Unix Questions !!

1. How do we know what is my machine name and what is its IP address? (in Solaris) 2. If i want to know the amount of physical CPUs a Unix Box possesses (LINUX and/or Solaris) then what command i have to look. (5 Replies)
Discussion started by: dreams5617
5 Replies

2. Shell Programming and Scripting

General UNIX Query

Hi all, I am having putty in my system.But I dont have access to any UNIX Servers.Is there any default or common UNIX Server so that anyone can access and be familiar with UNIX and Shell scripting. I want to work and practice in UNIX..Thats why I am asking this question. Kindly give me... (2 Replies)
Discussion started by: dave_nithis
2 Replies

3. UNIX for Dummies Questions & Answers

Few general unix qns..URGENT!!

hey guys, I have a few general qns on unix, so I'd appreciate quick responses. 1. How do u read a file line by line and display its contents using KSH? 2. How to kill a process using only the name? 3. How to create an empty file with 1MB memory size? 4. How to append some content to an... (2 Replies)
Discussion started by: sasuke_uchiha
2 Replies

4. Programming

Using General Data Structure Library (GDSL)

Dear All, I would appreciate if some one could please post a few examples using GDSL library. The library provides general data structure operations. I am having confusion using list data structure regarding arguments. Would appreciate your kind response. with regards, Usman (2 Replies)
Discussion started by: usman_minhas
2 Replies

5. Post Here to Contact Site Administrators and Moderators

Privacy Policy for The UNIX and Linux Forums

Privacy Policy for The UNIX and Linux Forums If you require any more information or have any questions about our privacy policy, please feel free to contact us by email or post your question as a reply to this thread. At The UNIX and Linux Forums, the privacy of our visitors is of extreme... (0 Replies)
Discussion started by: Neo
0 Replies

6. UNIX for Dummies Questions & Answers

General Unix Error Logging?

Yesterday evening my server appeared to fall over. I couldn't copy (scp) files to it, and I couldn't SSH to it either. Every time I tried, it just gave me this message: Read from remote host <IP ADDRESS>: Connection reset by peer Connection to <IP ADDRESS> closed. I got in this morning, and... (4 Replies)
Discussion started by: Dave Stockdale
4 Replies

7. UNIX for Dummies Questions & Answers

Privacy In a UNIX Server Environment

I am dealing with a privacy issue that I am unable to solve. Essentially, there is a .sas file saved on a UNIX Server. I am interested in changing permissions etc so that: 1. The .sas file can only be altered by the owner. 2. The contents of the .sas file can not be viewed (there is sensitive... (3 Replies)
Discussion started by: adtuck
3 Replies
GIT-UPLOAD-ARCHIVE(1)						    Git Manual						     GIT-UPLOAD-ARCHIVE(1)

NAME
git-upload-archive - Send archive back to git-archive SYNOPSIS
git upload-archive <directory> DESCRIPTION
Invoked by git archive --remote and sends a generated archive to the other end over the Git protocol. This command is usually not invoked directly by the end user. The UI for the protocol is on the git archive side, and the program pair is meant to be used to get an archive from a remote repository. SECURITY
In order to protect the privacy of objects that have been removed from history but may not yet have been pruned, git-upload-archive avoids serving archives for commits and trees that are not reachable from the repository's refs. However, because calculating object reachability is computationally expensive, git-upload-archive implements a stricter but easier-to-check set of rules: 1. Clients may request a commit or tree that is pointed to directly by a ref. E.g., git archive --remote=origin v1.0. 2. Clients may request a sub-tree within a commit or tree using the ref:path syntax. E.g., git archive --remote=origin v1.0:Documentation. 3. Clients may not use other sha1 expressions, even if the end result is reachable. E.g., neither a relative commit like master^ nor a literal sha1 like abcd1234 is allowed, even if the result is reachable from the refs. Note that rule 3 disallows many cases that do not have any privacy implications. These rules are subject to change in future versions of git, and the server accessed by git archive --remote may or may not follow these exact rules. If the config option uploadArchive.allowUnreachable is true, these rules are ignored, and clients may use arbitrary sha1 expressions. This is useful if you do not care about the privacy of unreachable objects, or if your object database is already publicly available for access via non-smart-http. OPTIONS
<directory> The repository to get a tar archive from. GIT
Part of the git(1) suite Git 2.17.1 10/05/2018 GIT-UPLOAD-ARCHIVE(1)
All times are GMT -4. The time now is 11:24 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy