Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Process

  1. Propose Identity Governance and Risk Standards Extensions for SSI to ISI WG
    1. Decentralized legal semantics
    2. Privacy Controller Credential 
    3. Unified Notice Control Language
  2. ISI WG review of  White Paper (for specification) ask  IS WG to approved specification


Notice & Consent for people relies on clear communication. 

Decentralized identity relies on legal semantics to instruct the scope of technical semantics.  Legal semantics for data control (that people can see and expect in person) are mirrored to provide data governance that people expect with the use of identifiers  and claims online.   Identity and traditionally data governance referring explicitly to control the flow of data in between domains and borders.

Specification work Proposed for to extend international Decentralized Semantic Governance for the DDE. 

  • Privacy Controller Credential 
  • Unified Notice Control Language for People
  • Conformity Assessment
    • People, Orgs, Regulator Transparency for DDE


Notice & Consent Task Force 

Project owner:

Mark Lizar Salvatore D'Agostino

Team members:

Ken Adler


Status

ACTIVE 





...

  1. The use of international standards framework for security, privacy and identity management  is critical for interoperability of data and identity controls internationally.
  2.  management of data  decentralized identifiers, VC's and the ISO 27710 series,Security Techniques - Information Security Management Systems -
    1. ISO/ IEC 29100 Security Techniques - Privacy Framework  (for identifier governance) 
    2. ISO/IEC 29184 Online Onlin,e Privacy Notice & Consent
    3. ISO/IEC 27560 Consent Record Structure (Kantara Notice & Consent Receipt specifications) 
      1. Decentralized Proof of Notice for orgs 
      2. Decentralized Proof of Processing (aka consent) for people
  3. W3C  Data Control Vocabulary ( maps  legal semantics to ontology) to harmonize decentralized legal semantics with machine readable semantics for linking identifiers and personal data. 
  4. Privacy By Design an Default: ISO 27550 (as a reference) 
    1. Used for high assurance, harmonized semantics

Background

  1. Consent by Design for SSI - Trustworthy - Decentralized Dynamic Data Controls for data & identifier portability across legal jurisdictions and in between legal and technical domains (intra-domain, intra-state, intra-province, intra-country EEMA)
    1. Soverign use of a persons identity with the control of an identifier, its attribute, and associated claims/assertions and profile and data store
  2.  OCA Specification for Operational Semantic Notice 
    1. conformity assessment vectors for OCA schema's 
      1. legal schema overlay from localized privacy law schema 
      2. legal schema conformity assessment to ISO baseline 
      3. legal schema overlay conformity assessment to a privacy law schema 
      4. conformity assessment report on legal adequacy for privacy rights and associated infrormation controls
  3. Privacy Rights Access & Discovery Protocol for DDC's
  4. Non-Consent Processing - Transparency and Accountability Assurances

Background

  1. A key challenge, which is addressed with an International standards, is the lack of semantic harmonization for personal data control  which provides security for the portability and control of private information and is a required for people to be able to independently consent and control personal information.  This challenge, which was originally championed by  the Open Notice Initiative's Presentation and Paper @ the W3C DoNotTrack Conference in Berkeley California. 'Opening Up the Online Infrastructure' called for collaboration on the semantic standards to be developed. Ultimately realizing that intention data governance standards were needed, and international data governance policy was required to govern between jurisdictions, A key challenge, which is addressed with an International standards, is the lack of semantic harmonization for personal data control  which provides security for the portability and control of private information and is a required for people to be able to independently consent and control personal information.  This challenge, which was originally championed by  the Open Notice Initiative's Presentation and Paper @ the W3C DoNotTrack Conference in Berkeley California. 'Opening Up the Online Infrastructure' called for collaboration on the semantic standards to be developed. Ultimately realizing that intention data governance standards were needed, and international data governance policy was required to govern between jurisdictions, technical domains, and identity management systems.  It was also abundantly clear, the only legal, and human centric framework for this Internationally, is Notice & Consent.  Notice and Consent, after an exhaustive research campaign, Notice, and semantics are the only consistent legal, technical and socially required component, for all contexts dealing with personal information. 
  2.  This turned into a Kantara Specification effort in 2014 and now, last year, ISO voted to fast track this to a standard 27560, to be used with ISO 29184 to address what was know by the  phrased of the Biggest Lie on the Internet, was a focus of a movie Terms and Condition's May Apply. With an international governance rule set, people can use independently of Terms and Conditions
  3. With the success of this work as an international standard this Task Force aims to collaborate to support an International data governance authority framework as an open resource for master data control transparency over personal information (with standardized notice).

Specification Outline

  1. With the success of this work as an international standard this Task Force aims to collaborate to support an International data governance authority framework as an open resource for master data control transparency over personal information (with standardized notice).

Specification Outline

  1. Overview of (OPN) Data Governance Authority Architecture:
    1. Intro: this data governance authority architecture provides the international legal roles for  
    2. Identity & Data Governance Legal Actors /Stakeholders
      1. Data Controller, Scheme Registration Operator Governance Authority, DGA - Registrar 
    3. Privacy Risk Assurance Levels 1-4
      1. Policy Controller, Privacy Controller, Data/Identity Governance Authority Operator (DGAO)
        1. Controller: Tier  0 Risk Assurance - Not Registered 
        2. Policy Controller ( or just Controller) - Tier 1 Assurance - Self Asserted Binding  -No Privacy Risk Assurance - Discoverable
        3. Privacy Controller (or  Data Controller) - Tier 2 Assurance - Signed Binding for Legal Compliance - Mitigated Risk Assurance
        4. Data Governance Authority Operator - Tier 3 - Assurance - High Risk Assurance 
        5. Registrar - Tier 4 - Registrar Infrastructure - 
          1. Low Risk Personal Data Processing - 
            1. only personal information of Controller, and Company Operators
  2. Privacy Controller Credential Specification: (notices to mitigate risk) 
    1. Overview:  a Privacy Controller Credential is comprised of a bound relationship identifiers for accountability and transparency: This enables data supply chain transparency:
      1. Accountability Transparency for Identity:  Accountability Art29 WP
        1. Privacy Assurance levels - risk, complaince and liability - notice to move risk
          1. Trustworthiness first requires Security = requires legal entity transparency over providence and data benefit of processing personal data e.g. each time a SSI is use for transparency to be proportionate legally.
          2. tier 1 Privacy Assurance  
            1. Accountable Person + Legal Entity Identifier
              1. Legal Status of Accountable person and Legal Entity 
              2. Wether the Accountable person is employed by Legal Entity, or 3rd Party 
                1. if 3rd Party - Privacy Controller Credential of 3rd party is required
            2. Conditions of access and use:
              1. the accountable person info should be masked unless required (not published as is required in some jurisdictions) 
          3. tier 2 : Privacy Assurance 
            1. legally registered controller . e.g UK ICO Controller Registry (legally compliant) 
              1. stronger transparency and public accountability (1998) 
              2. Controller Credential references registry
          4. Teir 3:Privacy Assurance
            1. requires controller credentials for:
              1. beneficial owners of legal entity, benificiaries of the process personal data, business models (for 
            2. Processors registered first as a controller and the with a Privacy Controller Credential - a witnessed contract for processing. 
      2. Legal entity + accountable person binding
  3. Overview of (OPN) Data Governance Authority Architecture:
    1. Intro: this data governance authority architecture provides the international legal roles for  
    2. Identity & Data Governance Legal Actors /Stakeholders
      1. Data Controller, Scheme Registration Operator Governance Authority, DGA - Registrar 
    3. Privacy Risk Assurance Levels 1-4
      1. Policy Controller, Privacy Controller, Data/Identity Governance Authority Operator (DGAO)
        1. Controller: Tier  0 Risk Assurance - Not Registered 
        2. Policy Controller ( or just Controller) - Tier 1 Assurance - Self Asserted Binding  -No Privacy Risk Assurance - Discoverable
        3. Privacy Controller (or  Data Controller) - Tier 2 Assurance - Signed Binding for Legal Compliance - Mitigated Risk Assurance
        4. Data Governance Authority Operator - Tier 3 - Assurance - High Risk Assurance 
        5. Registrar - Tier 4 - Registrar Infrastructure - 
          1. Low Risk Personal Data Processing - 
            1. only personal information of Controller, and Company Operators
  4. Privacy Controller Credential Specification
    1. Overview:  a Privacy Controller Credential is comprised of a bound relationship identifiers for accountability and transparency: This enables data supply chain transparency
      1. Accountable Person + Legal Entity Identifier
        1. Legal Status of Accountable person and Legal Entity 
        2. Wether the Accountable person is employed by Legal Entity, or 3rd Party 
          1. if 3rd Party - Privacy Controller Credential of 3rd party is required
      2. Conditions of access and use:the accountable person info should be masked unless required (not published as is required in some jurisdictions) 
  5. Use Case(s) 
    1. Digital Immunisation Passport
    2. Legal Justifications for processing
      1. Surveillance of identifiers  
      2. Holder, Verifier & Issuer 
    3. The #efwg-good-health-pass-tf is being stood up as a new ToIP ecosystem. There are a number of focus groups within that task force that might be of interest to ISWG members for drafting contributions. Here is a list of those focus groups.Ecosystem Foundry WG
      ---- Good Health Pass TF
      -------- Data Principles + Framing Narrative FG
      -------- Consistent User Experience FG
      -------- Paper-Based Credentials FG
      -------- Standard Data Models and Elements FG
      -------- Credential Formats, Signatures, and Exchange Protocols FG
      -------- Security, Privacy, and Data Protection FG
      -------- Trust Registries FG
      -------- Rules Engines FG  <-- #iswg-notice-and-consent-tf
      -------- Identity Binding FG
      -------- Trust Framework Recommendations FG (edited) 

...