In embodiments in which the storage device as proposed is implemented with a memory card inserted into an electronic or computing device, such as a smartphone or a tablet, and the proposed control method is implemented by means of a driver for controlling the memory card, possibly integrated with a native software application executed on the smartphone or on the tablet, the identification and/or authentication performed by the driver can use the identification and/or the authentication implemented for the use of the smartphone or tablet as appropriate, in particular such as the identification and/or authentication elements used for accessing social networks on the smartphone or tablet.
In one or more embodiments, the memory of the storage device may be configured to define a memory area (drop zone) to which accesses are controlled according to the control method described in the present description. In these embodiments, the access rights included in the second user profile may be configured to be applicable to that memory area. In other embodiments, these access rights included in the second user profile may be configured to be confined to that memory area of the data storage device, and thus only applicable to that memory area.