Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Decentralized Data Governance for Data subject’s (data) rights.  For people to find technology trustworthy, and to be able to use digital identity to control perosonal data in a way we trust, people need transparency over the security and privacy of the use of their identity and personal data after it is provided.  They need to be able to see the privacy and security risks. In fact as a parent, this is legally required, in order to consent for them collection, use and surveillance of children's data and identifiers. 

The lack of standardized legal semantics for Digital identity and personal (Transborder) data management presents a challenge for identity management technologies and protocols.  This task force mission is to extend international identity governance standards to the SSI space with this specification for a privacy controller credential and the Unified Notice Control Language.

...

In this process the OCA utilizes this  stack of standards and specifications to syncratically harmonize purpose driven interoperability for meta-data and identity governance (by extending International standards)

The Stack

  1. The use of international standards framework for security, privacy and identity management  is critical for interoperability of data and identity controls internationally.
  2.  management of data  decentralized identifiers, VC's and the ISO 27710 series,Security Techniques - Information Security Management Systems -
    1. ISO/ IEC 29100 Security Techniques - Privacy Framework  (for identifier governance) 
    2. ISO/IEC 29184 Online Privacy Notice & Consent
    3. ISO/IEC 27560 Consent Record Structure (Kantara Notice & Consent Receipt specifications) 
      1. Decentralized Proof of Notice for orgs 
      2. Decentralized Proof of Processing (aka consent) for people
  3. W3C  Data Control Vocabulary ( maps  legal semantics to ontology) to harmonize decentralized legal semantics with machine readable semantics for linking identifiers and personal data. 
  4. Privacy By Design an Default
    1. Used for high assurance, harmonized semantics

...

  1. Overview of (OPN) Data Governance Authority Architecture:
    1. IntroThis : this data governance authority architecture provides the international legal roles for  
    2. Identity & Data Governance Legally Specified Legal Actors /Stakeholders
      1. Policy Controller, Privacy (Data ) Controller, Scheme Registration Operator Governance Authority, DGA - Registrar 
    3. Privacy Risk Assurance Levels 1-4
      1. Policy Controller, Privacy Controller, Data/Identity Governance Authority Operator (DGAO)
        1. Controller: Tier  0 Risk Assurance - Not Registered 
        2. Policy Controller ( or just Controller) - Tier 1 Assurance - Self Asserted Binding  -No Privacy Risk Assurance - Discoverable
        3. Privacy Controller (or  Data Controller) - Tier 2 Assurance - Signed Binding for Legal Compliance - Mitigated Risk Assurance
        4. Data Governance Authority Operator - Tier 3 - Assurance - High Risk Assurance 
        5. Registrar - Tier 4 - Registrar Infrastructure - 
          1. Low Risk Personal Data Processing - 
            1. only personal information of Controller, and Company Operators
  2. Privacy Controller Credential Specification
    1. Overview:  a Privacy Controller Credential is comprised of a bound relationship identifiers for accountability and transparency: This enables data supply chain transparency
      1. Accountable Person + Legal Entity Identifier
        1. Legal Status of Accountable person and Legal Entity 
        2. Wether the Accountable person is employed by Legal Entity, or 3rd Party 
          1. if 3rd Party - Privacy Controller Credential of 3rd party is required
      2. Conditions of access and use:
        1. the accountable person info should be masked unless required (not published as is required in some jurisdictions) 
  3. Use Case(s) 
    1. Digital Immunisation Passport
    2. Legal Justifications for processing
      1. Surveillance of identifiers  
      2. Holder, Verifier & Issuer 
    3. The #efwg-good-health-pass-tf is being stood up as a new ToIP ecosystem. There are a number of focus groups within that task force that might be of interest to ISWG members for drafting contributions. Here is a list of those focus groups.Ecosystem Foundry WG
      ---- Good Health Pass TF
      -------- Data Principles + Framing Narrative FG
      -------- Consistent User Experience FG
      -------- Paper-Based Credentials FG
      -------- Standard Data Models and Elements FG
      -------- Credential Formats, Signatures, and Exchange Protocols FG
      -------- Security, Privacy, and Data Protection FG
      -------- Trust Registries FG
      -------- Rules Engines FG  <-- #iswg-notice-and-consent-tf
      -------- Identity Binding FG
      -------- Trust Framework Recommendations FG (edited) 

Unified Notice Control Language for Semantic Harmonization 

...