Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

(Draft specification in progress) 

This specification for a controller credential is required to operationalize the electronic notice and eConsent framework.   This specification distinguishes between what is referred to as consent by services online, with eConsent, which is a digital version of consent for use by digital identity systems to enable self-sovereign identity governance to scale from the physical world to the digital world. 

Today what is called consent online is a capture of a consent preference as permission with the use of a contract or licensee agreement (terms of use).  And is regulated with a privacy policy for this contract. 

In this electronic architecture data governance policy is implemented with privacy law and then made scalable with contracts and terms and conditions.  This is made possible by updating standardizing the required privacy controller information and its presentation, to include the accountable person and how the credential is linked, presented, recorded, shared, logged and stored.  

Mission: " a public utility register for human centric transparency, identifier control and trust" 

The controller credential is for implementing decentralized identity control transparency.  Public utility for  data governance used for automating personal data control transparency. 

Implementing true SSI with electronic notice and consent - using international governance frameworks for hyperlocal transparency and data control

Process in progress:

  1. Updated March 24
  2. Notice Controller Credential Specification
  3. Papers (in progress)
    1. Decentralized Data Governance 
    2. identity interoperability

Notice & Consent Task Force 

Project owner:

Mark Lizar 

Editors

Surveillance Controller EditorSalvatore DAgostino

OCA Schema Editor: 


Status

ACTIVE 




Notice Controller Credential add's additional fields to an existing consent record formant for notice and consent builds on the Kantara ANCR, Consent Receipt Record format, to provide a digital controller credential,


Introduction

In privacy regulations transparency is a key requirement.   transparency is most often represented by the requirements for notice and specifying a legal justification and purpose for processing. These represent the analogue legal requirements. Modern privacy law has additional requirements in which transparency over rights and identity based controls should be proportionate to the technology and risk.   Current digital identity notice and consent mechanisms are governed by terms, conditions and contracts and are most often defined by system permissions rather than the purpose of use.  As a result analogue / human consent and control does not scale online to govern and control digital identifiers. 

This is a significant security challenge for decentralized identity as lack of transparency over who controls and benefits from the digital identifier is a) not standardized and b) not provided until after digital identifiers are created and used to permission access and controls to an eco-system. 

To scale transparency and data controls online, digital data controller information (and identitifiers) are required to automate rights based controls are to autonomously provide a  stateful privacy signal.  Required so that people can understand, access and effectively operationalize privacy for interoperability.   Without standardized digital transparency and privacy controls,  decentralized identifier control is not possible.   

This additional controller 'digital trust' information is used to generate an electronic two factor notice (2FN) for eConsent.  

Governance & Risk

3 Vectors of Governance 

  1. Personal Data Control (Gov) - (lower risk) uses micro-credentials 
    1. the individual controls the source of data and verification 
    2. attribute by attribute control 
    3. Logging the access to the attribute for processing 
  2. Co-Regulation : multi-party governed - 
    1. Data trusts, where the individual + regulator and service co-regulate
    2. Logging the access to the processing 
  3. Data Protection : Self-Regulated -
    1. the service provider regulates the processing of personal data
    2. Signed, verified and open code, with shared logging

3 Tiers of  Controller Assurance

0 - Self Asserted Identifier 

  1. Public verifiable 
  2. Digitally verifiable & Legal (service delegation)
  3. Operator Controller - Certified and legal 

for decentralized identity, transparency is a key requirement. As identifiers are personal, used to track, surveil and profile its not only important to know who controls  personal information, but it's required for consent, a critical component of security and a pre-requisite for digital privacy.  Most notices, notifications, T&C's don't use standards to provide the transparency over who control's personal information.  

This is the focus of the Kantara ANCR Record, which is the prefix to consent receiptsInternational standards are used to address limitation  to internet scale data governance in national standards frameworks

This controller credential utilizes a reference architecture that began with 1980 OECD Guidelines, and has been worked on for international /internet scalable data governance.  This work has driven regulatory reform and convergence internationally. GDPR refer framework for digital. 

This controller credential specification extends this international governance standard to the Trust over IP Governance Framework and is used to generate purpose specific micro-credentials for the governance of digital information with SSI's.   This enables the use of this reference architecture to scale analogue notice and consent to electronic eNotice and eConsent for digital exchanges and interoperability.  

Reference Architecture

  • 0PN  Transparency WG: Decentralized Data Governance
    • eNotice and eConsent identity & data governance information structure  
  • ISO/IEC 29100
    • ISO/IEC 29100:2011 provides a privacy framework which. specifies a common privacy terminology; defines the actors and their roles in processing personally identifiable information (PII); describes privacy safeguarding considerations; and. provides references to known privacy principles for information technology.
    • ISO/IEC 29184 Online Privacy Notice & Consent 
    • ISO/IEC 29184 27560 WD 5 Consent record information structure 
  • ISO 27002 Series : WG 5 SC27
    • ISO 27001 sets forth the compliance requirements needed to become certified. In contrast, ISO 27002 is a set of guidelines that are designed to help you introduce and implement ISMS best practices.
  • CoE 108+
    • International GDPR - 
      • data governance framework which provides the international enforcement policy baseline suitable for internet scale data control, identity transparency governance and consent
  • W3C Data Privacy Vocabulary 
    • V.5
  • KantaraANCR WG: eNotice and eConsent identity governance information structure  
    • ANCR Notice Record

Addressing The Challenge: Security Risk, Vulnerability  and Governance  Transparency Gap for SSI, as decentralized identifiers need a framework for transparency and control that can demonstrate international legal adequacy.  

The controller credential can be generated by any stakeholder, and is use to generate eNotice and eConsent records and receipts, that are defined here as micro-credentials.

Terms & Definitions

The terms and definitions presented and defined here are in addition to the references, this cover the field names specified for the controller. 

  • specific to this spec, (in the annex - mapping semantics between frameworks )
  •   

Specification Overview 

This specification builds upon the Kantara ANCR Record specification (and Consent Reciept)(ref) to build a notice controller credential for recording the controller and contract specifying all of the PII Controller's information in a noticeeNotice record

The ANCR Record provides Consent Types to anchor the record a trust record and an individual's understanding of the relationship.  Specifically, root of trust record for the individual, which the individual owns and controls In a personal data store and profile. 

The Record and Receipt specification uses ISO/IEC 29100 Security and Privacy techniques ref (free ISO specification) terms and definitions to identify the legal stakeholders(ref) and their roles in the processing and control of personal information.    Using international standards for creation of  record and receipts publicly a regulated data controller credential and for its utility in generating eNotice records and eConsent receipts

ISO/IEC 29184 - Online Privacy Notice and Consent Controls  - 

The field data for the records and receipts are specified from numerous sources, in particular the W3C Data Privacy Vocabulary, for 

Fields Added to ANCR Record to Create Verifiable Credential

ANCR Record spec - is here (enter link)

...

  1. Controller Type[Ctype]:  
    1. Notice Controller,  
    2. PII notice controller,  
    3. PII controller,    
    4. PII surveillance controller , (info not provided by PII Principle) 
    5. [Ctype] controller operator, 
  2. Accountable Person Type

Security Considerations

how to specify the 

To address the security gap, the controller credential is presented in a privacy or security notice, prior to surveillance.

The individual can use this controller credential to provide consent for a specific purpose, as well as specifying the source of data, by providing a consent receipt, signed to be a micro-credential. 

There are a series of steps which need to take place to establish two types of trust 

Type 1: Transparency Trustframework - 

Human security, discovers or generates a controller credential to create human trust anchor record and credential (dial tone)independent of the Controller/Service provider. 

Type 2: Technical Trust 

Assessment

ANCR Record provides a PII Controller Digital privacy transparency KPI, be assessing a notice for digital and physical controller identification and privacy access information, as required for the operational use and management of digital identifiers. 

The Controller Credential assessment tests this credential for its transparency performance. 

Security Considerations

The use of blinding identity taxonomy for personal identifiers includes the Accountable person identifiers, which are required to be published and available in accordance to local legislation. 

The identifiers used in the controller credential are specified according to regulation and implemented with standards in order to be subject to regulation and regulatory considerations, 

Mitigation Risk

Using standard framework for transparency of control with data control defaults 

 Examples

  1. Security, 


Controller Credential 

Micro-Credential 

defined as a credential specified to a specific purpose

Use Case

Assessment of transparency and performance of a micro-credential to mitigate risks with SSI

 Examples

...

.

...

 

...


Glossary

...

Controller Credential 

...


Privacy Stakeholders - ISO 29100

Privacy Stakeholders

ISO Definition


Regulator / 
Privacy Regulator for individuals 
PII Principal

PII Controller

Joint PII Controller

PII Processor

3rd Party
another person, or police, 


Annex: Privacy Stakeholder Mapping to Functional ToiP Roles

Continuing of the ANCR Record Assessment to identify the controller credential,

...




Delegated 

Regulator

Ombudsman
PII Principal

Guardian/Parent/School
PII Controller

Joint-Controller
PII Processor

Sub-Processor
3rd Party

turtles 


References for Controller Credential, Infrastructure and Legal Framework

Standard/Specifications

Title

Description 

Resource Status

ISO 29100

Information technology — Security techniques — Privacy framework

ISO/IEC 29100:2011 provides a privacy framework which

  • specifies a common privacy terminology;
  • defines the actors and their roles in processing personally identifiable information (PII);
  • describes privacy safeguarding considerations; and
  • provides references to known privacy principles for information technology.
Status - Is publicly available - https://www.freestandardsdownload.com/iso-iec-29100-2011.html
ISO/IEC 29184:2020Online privacy notice and consent
(just published - not available to public - we are working on publishing a report/appendix for use with this group )
W3C DPV  0.01Data Privacy Vocabulary
  • legal ontology for technically breaking down and mapping legal ontology to a data legal ontology - 
  • the Notice +  CR V1.2 and W3C DPV, also use a common set of purpose categories. and the Kantara CR v1.1 for purpose specification
  • (note shared by initial FIHR approach - now much more evolved) 

Reference: OPN: Open Notice  (+ Consent) Receipt Schema: Starters Guide to Unified Data Control Schema

Lizar, M. & Pandit, H.J., OPN: Open Notice Receipt Schema, 14th International Conference on Semantic Systems (SEMANTiCS 2019), Karlsruhe, Germany, 2019 [Published http://www.tara.tcd.ie/handle/2262/91576 [accessed July 1, 2020]

...