Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Mark Lizar
Anna Slomovic
Jeff Stollman
Iain Henderson
Gilad Rosner - University of Nottingham
One other? Mickey Tevelow

Staff:
Dervla O'Reilly
Anna Ticktin

Started with an Introduction to the PAC by Anna for the Group with some clarity questions

Preparing Discussion about the IAW - P3 F2F.

...

- Discuss the conflict of intime in-time consent with SAML2 and how this doesnt doesn't effect the development of PAC

- Discuss how the assessment may work upon implementation?  Deliver an assessment report to FICAM.

- Is there different assessment criteria for different levels of assurance?

...

We intend to make an active issues list for future PAC efforts and a lessons learned activity for FICAM

*************************** Drafted P3-PAC Vision and Milestones ********************

PAC The vision of the Kantara Initiative is to ensure secure, identity-based online interactions while preventing misuse of identification so that Kantara trust framework services are privacy protecting and natively native trustworthy activities. This vision is translated in to the P3 focus on the development of best assessment practices in identity oriented privacy frameworks that safe guard privacy and develop greater trust in  online services.
 
Privacy is a core principle of Kantara work, the Privacy and Public Policy Work Group was created to ensure that Kantara contributes to better privacy outcomes for users, data custodians and other stakeholders, by defining privacy-related principles and good practice applicable to a broad range of prevalent technology platforms.
 
The development of Privacy Assessment Criteria is a core and critical focus in the development of trust framework as Assessment Criteria ensures a standard of transparency and privacy in the authorisation, authentication and use of digital identifiers and attributes.
 
In the Kantara trust framework having trusted process in which Credential Service provides can ensure that identification is technically secure and low risk for Enterprise, and government, is reflected in the levels of assurance provided by the IAF.   The process by which these technical process are made socially trust worthy for the identity subject is fundamentally achieved through the development of privacy assessment criteria and the standards(Privacy Framework) that this technical infrastructure is held too.
 
PAC Milestones:
 
2011

...

- Develop and maintain a: Active issues list for general PAC development, Active Issues for Relying Party Assessments (not included in FICAM PAC)
- Lessons learned and FICAM assessment report

2012
2. Development of a Generalised Generalized PAC for Jurisdictional Privacy Profiles
 
2012/2013
3. Development of International Privacy Profiles for Canada, EU, New Zealand.