View Issue Details

IDProjectCategoryView StatusLast Update
0005442Composrcore_cnspublic2024-08-04 22:11
ReporterPatrick SchmalstigAssigned ToPatrick Schmalstig 
SeverityFeature-request 
Status closedResolutionwon't fix 
Product Version 
Fixed in Version 
Summary0005442: New notification type to let users know when staff SU'd into their account
DescriptionWe should add a new notification type that allows users to be notified when someone uses SU to gain access to their account.

Notification is enabled by default for all users via email and web notifications.

While I cannot 100% confirm, given the nature of the GDPR, I can reasonably assume this is something they would require. And even if they did not require this, I believe it is the ethical thing to do to implement such a feature for transparency; users have the right to know when staff access their account via SU especially considering actions done when under SU appear as that member.
Additional InformationBe sure to document this in the core Privacy Policy hook as well.

Also, make sure the notification clearly documents what this means and that staff do NOT have the user's account credentials (it is a feature that the highest level of staff typically can do). And that if they believe the SU access was not warranted, they should contact (site email address) immediately. The notification should also tell the member who SU'd into their account.

Also also, a JavaScript confirmation box should appear when attempting to SU as a member warning of the implications of doing so (member will be notified, and SU is a tool that should never be used without just cause / for ill purposes such as to damage the reputation of members).

Make sure this works correctly when hard-coding "keep_su" in the URL as well.
TagsType: Legal compliance / Privacy
Time estimation (hours)
Sponsorship open

Relationships

duplicate of 0005848 non-assigned Increased consideration around SU feature 
related to 0005443 resolvedPatrick Schmalstig Forced email and web notification when staff edit a member's notification settings 

Activities

Patrick Schmalstig

2023-12-19 00:37

administrator   ~0008136

Last edited: 2023-12-19 00:37

View 2 revisions

Impossible to do without creating infinite loops: get_member was designed to return the SU'd member, and we cannot rely on GLOBALS because keep_su_strict will prevent us from knowing which staff member did the SU at all. Changing any of this will bug-up sessions and member cache.

Chris Graham

2024-08-04 22:06

administrator   ~0009083

I know this is closed, but I wanted to write that I'm not a fan of this one for a couple of reasons:
1) It's always going to be the case that user data could be accessed without them knowing, so it's creating a false sense of privacy by giving a partial picture. Someone can always just look in the database, and in the real world it is going to happen because people look in databases and can't help see what they see. Staff could also always hack the code to remove the feature, so as a user I would also not necessary trust the notification as being particularly accurate.
2) I don't like the basic conception of the implementation. It's hard for me to communicate exactly why I don't like it, but it resolves around some combination of rushed staff just doing boring innocent admin stuff (like checking to see if there's a bug), combined with potentially trigger-sensitive users who respond badly to stuff they don't really understand. I think it's reasonable to try and achieve a balance because "not scaring users" and "not inconveniencing staff" are just as legitimate design considerations as "informing users about data", especially when no data was actually accessed.

I am going to create a new issue that is similar but I think more reasonable and manageable.

Issue History

Date Modified Username Field Change
2023-11-14 05:47 Patrick Schmalstig New Issue
2023-11-14 05:47 Patrick Schmalstig Status non-assigned => assigned
2023-11-14 05:47 Patrick Schmalstig Assigned To => Patrick Schmalstig
2023-11-14 05:48 Patrick Schmalstig Tag Attached: Roadmap: v11
2023-11-14 05:48 Patrick Schmalstig Tag Attached: Type: Legal compliance / Privacy
2023-11-14 05:49 Patrick Schmalstig Additional Information Updated View Revisions
2023-11-14 05:51 Patrick Schmalstig Additional Information Updated View Revisions
2023-11-14 05:53 Patrick Schmalstig Additional Information Updated View Revisions
2023-11-14 05:54 Patrick Schmalstig Additional Information Updated View Revisions
2023-11-14 05:57 Patrick Schmalstig Relationship added related to 0005443
2023-11-14 06:01 Patrick Schmalstig Additional Information Updated View Revisions
2023-11-14 06:02 Patrick Schmalstig Description Updated View Revisions
2023-11-14 06:03 Patrick Schmalstig Description Updated View Revisions
2023-11-14 06:05 Patrick Schmalstig Additional Information Updated View Revisions
2023-11-14 06:07 Patrick Schmalstig Additional Information Updated View Revisions
2023-12-19 00:37 Patrick Schmalstig Status assigned => closed
2023-12-19 00:37 Patrick Schmalstig Resolution open => won't fix
2023-12-19 00:37 Patrick Schmalstig Note Added: 0008136
2023-12-19 00:37 Patrick Schmalstig Note Edited: 0008136 View Revisions
2023-12-19 00:37 Patrick Schmalstig Tag Detached: Roadmap: v11
2024-03-30 03:37 Patrick Schmalstig Project Composr alpha bug reports => Composr
2024-03-30 03:44 Patrick Schmalstig Category General / Uncategorised => core_cns
2024-08-04 22:06 Chris Graham Note Added: 0009083
2024-08-04 22:11 Chris Graham Relationship added duplicate of 0005848