You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 14 Next »

Process

  1. Propose Identity Governance and Risk Standards Extensions for SSI to ISI WG
    1. Decentralized legal semantics
    2. Privacy Controller Credential 
    3. Unified Notice Control Language
  2. ISI WG review of  White Paper (for specification) ask  IS WG to approved specification


Notice & Consent for people relies on clear communication. 

Decentralized identity relies on legal semantics to instruct the scope of technical semantics.  Legal semantics for data control (that people can see and expect in person) are mirrored to provide data governance that people expect with the use of identifiers  and claims online.   Identity and traditionally data governance referring explicitly to control the flow of data in between domains and borders.

Specification work Proposed for to extend international Decentralized Semantic Governance for the DDE. 

  • Privacy Controller Credential 
  • Unified Notice Control Language for People
  • Conformity Assessment
    • People, Orgs, Regulator Transparency for DDE


Notice & Consent Task Force 

Project owner:

Mark Lizar Salvatore D'Agostino

Team members:

Ken Adler


Status

ACTIVE 





Overview  

Decentralized Data Governance for Data subject’s (data) rights.  For people to find technology trustworthy, and to be able to use digital identity to control perosonal data in a way we trust, people need transparency over the security and privacy of the use of their identity and personal data after it is provided.  They need to be able to see the privacy and security risks. In fact as a parent, this is legally required, in order to consent for them collection, use and surveillance of children's data and identifiers. 

The lack of standardized legal semantics for Digital identity and personal (Transborder) data management presents a challenge for identity management technologies and protocols.  This task force mission is to extend international identity governance standards to the SSI space with this specification for a privacy controller credential and the Unified Notice Control Language.

Decentralized Semantic Governance Stack

The Identity and Data Governance Stack of Specifications used to create this specification are designed to utilize OCA to overlay legal notice and consent schema's on to the existing ISO/IEC 29100 framework for jurisdictional privacy/surveillance notice profiles.

Then to enable identity governance interoperability by translating a local governance schema to the internationalized schema base for governance controls and privacy rights.  Then, to overly the next schema for localized identity and data governance controls, which utilized the same surveillance and privacy semantic governance framework for identity and data control interoperability.  

In this process the OCA utilizes this  stack of standards and specifications to syncratically harmonize purpose driven interoperability for meta-data and identity governance (by extending International standards)

The Stack

  1. The use of international standards framework for security, privacy and identity management  is critical for interoperability of data and identity controls internationally.
  2.  management of data  decentralized identifiers, VC's and the ISO 27710 series,Security Techniques - Information Security Management Systems -
    1. ISO/ IEC 29100 Security Techniques - Privacy Framework  (for identifier governance) 
    2. ISO/IEC 29184 Onlin,e Privacy Notice & Consent
    3. ISO/IEC 27560 Consent Record Structure (Kantara Notice & Consent Receipt specifications) 
      1. Decentralized Proof of Notice for orgs 
      2. Decentralized Proof of Processing (aka consent) for people
  3. W3C  Data Control Vocabulary ( maps  legal semantics to ontology) to harmonize decentralized legal semantics with machine readable semantics for linking identifiers and personal data. 
  4. Privacy By Design an Default: ISO 27550 (as a reference) 
    1. Used for high assurance, harmonized semantics
  5. Consent by Design for SSI - Trustworthy - Decentralized Dynamic Data Controls for data & identifier portability across legal jurisdictions and in between legal and technical domains (intra-domain, intra-state, intra-province, intra-country EEMA)
    1. Soverign use of a persons identity with the control of an identifier, its attribute, and associated claims/assertions and profile and data store
  6.  OCA Specification for Operational Semantic Notice 
    1. conformity assessment vectors for OCA schema's 
      1. legal schema overlay from localized privacy law schema 
      2. legal schema conformity assessment to ISO baseline 
      3. legal schema overlay conformity assessment to a privacy law schema 
      4. conformity assessment report on legal adequacy for privacy rights and associated infrormation controls
  7. Privacy Rights Access & Discovery Protocol for DDC's
  8. Non-Consent Processing - Transparency and Accountability Assurances

Background

  1. A key challenge, which is addressed with an International standards, is the lack of semantic harmonization for personal data control  which provides security for the portability and control of private information and is a required for people to be able to independently consent and control personal information.  This challenge, which was originally championed by  the Open Notice Initiative's Presentation and Paper @ the W3C DoNotTrack Conference in Berkeley California. 'Opening Up the Online Infrastructure' called for collaboration on the semantic standards to be developed. Ultimately realizing that intention data governance standards were needed, and international data governance policy was required to govern between jurisdictions, technical domains, and identity management systems.  It was also abundantly clear, the only legal, and human centric framework for this Internationally, is Notice & Consent.  Notice and Consent, after an exhaustive research campaign, Notice, and semantics are the only consistent legal, technical and socially required component, for all contexts dealing with personal information. 
  2.  This turned into a Kantara Specification effort in 2014 and now, last year, ISO voted to fast track this to a standard 27560, to be used with ISO 29184 to address what was know by the  phrased of the Biggest Lie on the Internet, was a focus of a movie Terms and Condition's May Apply. With an international governance rule set, people can use independently of Terms and Conditions. 
  3. With the success of this work as an international standard this Task Force aims to collaborate to support an International data governance authority framework as an open resource for master data control transparency over personal information (with standardized notice).

Specification Outline

  1. Overview of (OPN) Data Governance Authority Architecture:
    1. Intro: this data governance authority architecture provides the international legal roles for  
    2. Identity & Data Governance Legal Actors /Stakeholders
      1. Data Controller, Scheme Registration Operator Governance Authority, DGA - Registrar 
    3. Privacy Risk Assurance Levels 1-4
      1. Policy Controller, Privacy Controller, Data/Identity Governance Authority Operator (DGAO)
        1. Controller: Tier  0 Risk Assurance - Not Registered 
        2. Policy Controller ( or just Controller) - Tier 1 Assurance - Self Asserted Binding  -No Privacy Risk Assurance - Discoverable
        3. Privacy Controller (or  Data Controller) - Tier 2 Assurance - Signed Binding for Legal Compliance - Mitigated Risk Assurance
        4. Data Governance Authority Operator - Tier 3 - Assurance - High Risk Assurance 
        5. Registrar - Tier 4 - Registrar Infrastructure - 
          1. Low Risk Personal Data Processing - 
            1. only personal information of Controller, and Company Operators
  2. Privacy Controller Credential Specification: (notices to mitigate risk) 
    1. Overview:  a Privacy Controller Credential is comprised of a bound relationship identifiers for accountability and transparency: This enables data supply chain transparency:
      1. Accountability Transparency for Identity:  Accountability Art29 WP
        1. Privacy Assurance levels - risk, complaince and liability - notice to move risk
          1. Trustworthiness first requires Security = requires legal entity transparency over providence and data benefit of processing personal data e.g. each time a SSI is use for transparency to be proportionate legally.
          2. tier 1 Privacy Assurance  
            1. Accountable Person + Legal Entity Identifier
              1. Legal Status of Accountable person and Legal Entity 
              2. Wether the Accountable person is employed by Legal Entity, or 3rd Party 
                1. if 3rd Party - Privacy Controller Credential of 3rd party is required
            2. Conditions of access and use:
              1. the accountable person info should be masked unless required (not published as is required in some jurisdictions) 
          3. tier 2 : Privacy Assurance 
            1. legally registered controller . e.g UK ICO Controller Registry (legally compliant) 
              1. stronger transparency and public accountability (1998) 
              2. Controller Credential references registry
          4. Teir 3:Privacy Assurance
            1. requires controller credentials for:
              1. beneficial owners of legal entity, benificiaries of the process personal data, business models (for 
            2. Processors registered first as a controller and the with a Privacy Controller Credential - a witnessed contract for processing. 
      2. Legal entity + accountable person binding
  3. Use Case(s) 
    1. Digital Immunisation Passport
    2. Legal Justifications for processing
      1. Surveillance of identifiers  
      2. Holder, Verifier & Issuer 
    3. The #efwg-good-health-pass-tf is being stood up as a new ToIP ecosystem. There are a number of focus groups within that task force that might be of interest to ISWG members for drafting contributions. Here is a list of those focus groups.Ecosystem Foundry WG
      ---- Good Health Pass TF
      -------- Data Principles + Framing Narrative FG
      -------- Consistent User Experience FG
      -------- Paper-Based Credentials FG
      -------- Standard Data Models and Elements FG
      -------- Credential Formats, Signatures, and Exchange Protocols FG
      -------- Security, Privacy, and Data Protection FG
      -------- Trust Registries FG
      -------- Rules Engines FG  <-- #iswg-notice-and-consent-tf
      -------- Identity Binding FG
      -------- Trust Framework Recommendations FG (edited) 

Unified Notice Control Language for Semantic Harmonization 

UNCL:

Uses the definitions and terms specified in the ISO 29100 framework, Consent Receipt v1.2, for specifying key roles for data control, transparency and accountability.  This international framework is the basis for extending semantic data governance to decentralized data economy.  In this economy, the Privacy Controller Credential extended the Privacy Controller Public Profile for verified claims, decentralized identifiers, and Self Soverign applications.  For this purpose, this specification is used to provide the best practices for the data controller to generate a verifiable credential, the considerations in using this as a  legal credential for standardized data processing.  

The Privacy Controller, the accountable, authorizing stakeholder for data processing is the key audience for this specification and language. 

Key Problem> 

At this time, a high risk, high sensitivity data processing activity, has the responsibility to be transparent over the legal entities responsible for processing personal data, the beneficiaries of the data processing activity, in addition to any othe processors.  This includes partners and data processing service providers, like Google or identity management service provider.  

This privacy controller profile, printed out in long form would  have multiple legal entities and Privacy Controller Credentials required, this would include all of their mailing addresses (by law) and , public contact point/addresses, and the details of any jurisdictional representative for privacy and data protection.

This specification, aims to tease out the language used for specifying  these elements, which are legally required to be Public so that they can be represented with a single distributed identifier to simplify each  DDE interaction. 

Privacy Risk Assurance ;

  • refers to trustworthy transparency 
    • e.g does this organization use of standardized legal semantics for notice and consent to ease understanding

Requirements Privacy Controller Credential Specification (in Open Consent Groups' OPN Architecture)

Providence  chain starts with the person who is accountable bound to a legal entity. 

Legal Entity Accountability Levels according to Tiers of Privacy Risk

Tier 0 - No-Risk Indicated :  Self Asserted Binding  with a privacy policy - providing minimum Privacy Risk Assurance (trustworthy Transparency)

  • A non registered Broadcast listing 

Tier 1 - Policy Controller - Low Risk - doesn't process personal data electronically, does not collect or process personal information, and for any personal identifier, this is minimized and secure, has internal security for data of employee's

Tier 2 -  Privacy (data) Controller - Does process personal data for commercial benefit and use

Tier 3 - Very High Risk - invisible public surveillance, surveillance of children /vulnerable people etc   Beneficial owners (required) 

Tier 4 - Controller Operator - Provides Registration services for Privacy Controller Credentials, Mitigates Privacy Risk with codes of conduct and certifications that accredit codes of practice.  Controller can then register to these codes of conduct and practice 


Use's of The PCC Credential  -  a single identifier for a Privacy Controller, which links to all LEI's for beneficial ownership. 

  • Simplify Transparency 
  • Improve performance 
  • Sign Receipts to create tokens
  • Provides 
    • Privacy - Transparency over legal entities, accountable people and beneficial - 
    • Legal Entity Identifier Purpose and Sources
      • to identify the legal entity of the privacy controller 
      • beneficial owner of the legal entity 
  • Accountable Person Role
    • to identify the accountable person / role that is bound to the legal entity identifier (aka) organization. 
      • could be an employee
      • owner / director / officer 
      • data proaction officer 
      • 3rd. Party Company Representative 
        • accountable role - (for another 3rd Party) acting representative 
  • Privacy Controller 
    • under what authority 
    • under what legal justification 


ISO 29100 Privacy Stakeholders


Privacy Stakeholders

ISO Definition


Regulator / 

PII Principal

PII Controller

PII Processor

3rd Party



Privacy Controller Credential Roles 


Data Governance Authority Operator Role  Certification Providers on Regulator Approved Codes of Conduct  - very limited PII - data controller personal information and a linked reference to a data subjects identifier -

Data Governance Registrar`

    

StakeholderPrivacy Controller Credential : Creating Credentials for a use CaseDescription 





Issuer 


Holder


Verifier 


Gov ToiP Role

UseCase Example 

Roles

Actors Privacy Stakeholders 

  • controller, processor, subject, 3rd Parties


Provides the schema - hospital issuer Privacy Controller 

Person - Requesting Information from - patient/traveller holderData Subject 

3rd Party - border control Verifier Data Processor / 3rd Party  


  • looking to make a process for what Legal Privacy Stakeholder has the Credential Role
    • Steps to assign Stakeholder Roles
      • Test for checking if its a processors or a 3rd party? 




Legal Semantic Element 

semantic description

functional usage

fields Required


controller 


    
controller_identity








controller address registered



controller address (mailing)








controller contactextend consent termination for a control point



Delegated Role :




Delegated 

Regulator

Ombudsman
PII Principal

Guardian
PII Controller

Joint-Controller
PII Processor

Sub-Processor
3rd Party

turtles 

References for use for creating a Unified (generic) Data Control Vocabulary for OCA

Standard/Specifications

Title

Description 

Resource Status

ISO 29100

Information technology — Security techniques — Privacy framework

ISO/IEC 29100:2011 provides a privacy framework which

  • specifies a common privacy terminology;
  • defines the actors and their roles in processing personally identifiable information (PII);
  • describes privacy safeguarding considerations; and
  • provides references to known privacy principles for information technology.
Status - Is publicly available - https://www.freestandardsdownload.com/iso-iec-29100-2011.html
ISO/IEC 29184:2020Online privacy notice and consent
(just published - not available to public - we are working on publishing a report/appendix for use with this group )
W3C DPV  0.01Data Privacy Vocabulary
  • legal ontology for technically breaking down and mapping legal ontology to a data legal ontology - 
  • the Notice +  CR V1.2 and W3C DPV, also use a common set of purpose categories. and the Kantara CR v1.1 for purpose specification
  • (note shared by initial FIHR approach - now much more evolved) 

Topic List

Topic Title 



Risks

Mapping Governance Matching with ToiP Governance 



References

Reference Implementations

Implementer




Human Colossus 


OpenConsent


I_Grant


OPN: Open Notice  (+ Consent) Receipt Schema: Starters Guide to Unified Data Control Schema

Lizar, M. & Pandit, H.J., OPN: Open Notice Receipt Schema, 14th International Conference on Semantic Systems (SEMANTiCS 2019), Karlsruhe, Germany, 2019 [Published http://www.tara.tcd.ie/handle/2262/91576 [accessed July 1, 2020]


Field Name

Field Label

Format

Description 

Required/Optional

Schema Version

version

string

The version of specification used to which the receipt conforms. To refer to this version of the specification, the string "v1" or the IRI "https://w3id.org/OPN/v1" should be used.

Required

OPN Privacy Profile URI

profile

string

Link to the controller's profile in the OPN registry. 

Required

Type of Notice Receipt

Notice Receipt

string 

Label Notice Receipt 

Required

Receipt ID

id

string

A unique number for each Notice Receipt. SHOULD use UUID-4 [RFC 4122].

Required

Timestamp

timestamp

integer

Date and time of when the notice was generated and provided. The JSON value MUST be expressed as the number of seconds since 1970-01-01 00:00:00 GMT (Unix epoch).

Required

Signing Key

key

string

The Controller’s profile public key. Used to sign notice icons, receipts and policies for higher assurance.

Optional

Language

language

string

Language in which the consent was obtained. MUST use ISO 639-1:2002 [ISO 639] if this field is used. Default is 'EN'.

Optional

Controller Identity

controllerID

string

The identity (legal name) of the controller.

Required

Legal Jurisdiction

jurisdiction

string

The jurisdiction(s) applicable to this notice

Required

Controller Contact

controllerContact

string

Contact name of the Controller. Contact could be a telephone number or an email address or a twitter handle.

Required

Link to Notice

notice

string

Link to the notice the receipt is for 

Optional

Link to Policy

policy

string

Link to the policies relevant to this notice e.g. privacy policy active at the time notice was provided

Required

Context

context

string

Method of notice  presentation, sign, website pop-up etc

Optional

Receipt Type

The human understandable label for a record or receipt for data processing.  This is used to extend the schema with  profile for the type of legal processing - and is Used to identify data privacy rights and controls 

OCA schema specification: https://docs.google.com/spreadsheets/d/1KOdq8Yy3OXmuELyh7tpHMlhyMZPSZ3Ib/edit#gid=68769926

  • No labels