Data Exploitation Principle Security and Protection 1 Devices, networks, services and platforms should not betray, or be capable of betraying, their users

Principle or Recommendation

Devices, networks, services and platforms should not betray, or be capable of betraying, their users.
Data is generated on insecure and unprotected technological foundations designed for the desires of companies and governments rather than the needs of the individual or society. Data can expose sensitive information outside knowledge and control of individuals, or may be leaked without their knowledge, beyond their expectation and without legal or procedural guarantees. Technologies too often are designed to expose more data than is strictly necessary, increasingly the potential for abuse.