48 Matching Annotations
  1. Dec 2023
    1. Authorization scopes are a way to determine to what extent the client can use resources located in the provider. When the client requests the authorization it specifies in which scope they would like to be authorized. This information is then displayed to the user - resource owner - and they can decide whether or not they accept the given application to be able to act in specified scopes.
    1. It is generally a best practice to request scopes incrementally, at the time access is required, rather than up front. For example, an app that wants to support saving an event to a calendar should not request Google Calendar access until the user presses the "Add to Calendar" button; see Incremental authorization.
  2. Nov 2023
    1. At a later time, when accessing data from Google is required, you call the authorization API to ask for the consent and get access tokens for data access. This separation complies with our recommended incremental authorization best practice, in which the permissions are requested in context.
    1. Authentication establishes who someone is, and is commonly referred to as user sign-up or sign-in. Authorization is the process of granting or rejecting access to data or resources.
  3. Jan 2023
  4. Dec 2022
  5. Nov 2022
  6. Aug 2022
  7. Mar 2022
  8. Feb 2022
  9. Jan 2022
  10. Nov 2021
  11. Oct 2021
  12. Jul 2021
  13. Jun 2021
    1. Authorization is the process of verifying that the current user has permission to do something (or see something), for example, checking admin? status or looking up permission groups from the database.
  14. May 2021
  15. Dec 2020
    1. Emily. J. Miller. - FDA {@FDASpox} (2020) Convalescent plasma has shown to be beneficial for 35% of patients. This risk reduction figure - shown in chart below - is from @MayoClinic data from expanded access program that was analyzed by FDAA for the emergency use authorization announced today. Twitter. Retrieved from: https://twitter.com/FDASpox/status/1297706985039835136

  16. Nov 2020
  17. Oct 2020
  18. Sep 2020
  19. Aug 2020
  20. Jul 2020
    1. For example, a parent or guardian could be asked to make a payment of€0,01 to the controller via a banktransaction, including a brief confirmation in the description line of the transaction that the bank account holderis a holder of parental responsibility over the user. Where appropriate, an alternative method of verificationshould be provided to prevent undue discriminatory treatment of persons that do nothave a bank account.
    2. The EDPBacknowledges that there may be cases where verification is challenging (for example wherechildren providing their own consent have not yet established an ‘identity footprint’, or where parentalresponsibility is not easily checked.
    3. If the user states that he/she is below the age of digital consent then the controller can accept thisstatement without further checks, but will need to go on to obtain parental authorisation and verifythat the person providingthat consent is a holder of parental responsibility.
  21. Feb 2020
  22. Nov 2018
  23. Oct 2015
  24. Jan 2015
  25. Feb 2014
    1. Unlike in copyright law, where derivative works require authorization, new inventions can incorporate prior inventions wit hout permission — in these cases, the patents are independent of each other (the patent of one inventor does not give him or her any rights over the patent of the other inventor).

      Copyright law requires authorization for derivative works, but under patent law new inventions can incorporate prior inventions without permission.