The proposed solution advantageously also makes it possible to share data between a plurality of users or to communicate data corresponding to all types of content (presentations, photos, videos, recordings, etc.) while avoiding the use of transfer and/or online sharing services, as these services are time consuming, have volume limitations, and may not be considered as providing sufficient data security or privacy. It therefore provides an alternative that greatly reduces the risk of data theft as well as the risk of disclosing confidential data.
In one or more embodiments, the access rights included in the first user profile further authorize the deletion of data in the memory of the data storage device, and the access rights included in the second user profile further prohibit the deletion of data in the memory of the data storage device. In this case, the first and second user profiles are configured to be even more distinct (and separated by the granted permissions) from each other. This greater distinction between the two profiles makes it possible to provide a user of the first profile with rights to read, write, and delete data, while prohibiting second-profile users from deleting data in the memory of the data storage device, including data they themselves have written in the memory, which advantageously reinforces security for first-profile users, during use of the device by second-profile users. Thus, from the point of view of the first-profile users, the use of the device by second-profile users is more circumscribed and thus more secure. For example, this advantageously allows the use of a device owned by a first-profile user that is shared with other users not of the first profile, without any trust relationship existing between the first-profile user and the other users of the device.