...
Parts 1 and 2 for measuring conformance, compliance, and performance of Dynamic of Transparency and Consent
Anchor | ||||
---|---|---|---|---|
|
...
Scheme Framework v0.9.3.8
ANCR refers to an Anchored Notice & Consent Receipt, it is a record that is generated using the Transparency Performance Indicator assessment, which provides a standard measure of operational performance of the present PII Controller’s security and privacy session information.
...
Mark Lizar, WG Co-Chair, WG Editor
ContributorsContributor(s):
Sal D’Agostino, WG Co-Chair
Gigi Agassani Agassini, WG Secretary
Table of Contents |
---|
IPR Option:
...
Any derivative use of this specification must not create any dependency that limits or restricts the use, accessibility, and availability of the scheme for and/or its used use to evaluate the performance of transparency and/or the ability for the PII Principal to provide and manage consent records.
...
This specification relies on (open access to) ISO/IEC 29100 Security and privacy techniques, to provide Privacy framework and ISO/IEC 29184 Online Privacy Notice information structure, online privacy notices and consent, and the Consent Notice Receipt in the Appendix B, further specified by ANCR Mirrored Record Information Structure,3 Consent Notice Receipt Format as specified in the Kantara Initiative ANCR WG Mirrored Record information structure, extending the CISWG MVCR and Consent Receipt v1.1.4
Anchor | ||||
---|---|---|---|---|
|
License Condition:
This document has been prepared by participants of Kantara Initiative Inc. ANCR-WG. No rights are granted to prepare derivative works of this Scheme outside of the ANCR WG. Entities seeking permission to reproduce this document, in whole or in part, for other uses must contact the Kantara Initiative to determine whether an appropriate license for such use is available.
...
Anchor | ||||
---|---|---|---|---|
|
Abstract
In the context of processing personally identifiable information (PII) a PII Principal is not able to see who is processing their data, nor are they notified when their data is disclosed or scraped off the internet, with no indication of purpose. As a result the ability for all stakeholders, in particular the PII Principal, or Individual, is limited in their capacity to trust the use of digital identifying and tracking technologies.
The TPS addresses this issue by providing a standard transparency assessment scheme captures operational relationships and measures digital trust conformance and compliance record harness for assessing the performance of transparency and . In doing so it provides a basis for trust and operational accountability when PII Controllers Controller(s) process personal data.
<snip>
The ANCR mirrored record information structure defines 3 types of digital trust, and provides transparency assessment scheme for primary digital trust, (also referred to as a human centric), data control, and accountable transparency.
Primary Digital Trust –
when When the PII Principle Controls their own PII, enabling transparency over processing, like on a local device
Secondary Digital Trust
When the PII is held by a PII Controller
Exterritorialy
When PII is disclosed and controlled by a 3rd party (not a PII Processor)
Emergency services
Security Services
If the PII Principal is not able to “see” how PII (Personally Identifiable Information) is shared, disclosed, or managed it is not possible to make the choice to trust the service processing PII.
For people, consent by default requires assurances that personal data is being processed and transparency exists in a meaningful and operationally manner StandardStandardized, and operational transparency enabled by standardized schema, and record formats (Notice Receipts) are needed so that people can keep, and own, and to control personal information and private its use by “AI”. what
This requires can makemaking meaningful consent meaningful by default. To support this, and Tto create and scale trust in digital contexts a Digital Transparency Code of Conduct is introduced. The goal is to leverage, simplify, and clarify, and standardize requirements and for the use of CoE 108+ Chapter 1 Transparency Modalities, which is mirrored in the GDPR Article 12, ‘Transparent information, communication and modalities for the exercise of the rights of the data subject’.
Simply summarized
If the PII Principal is not able to understand and “see” how PII (Personally Identifiable Information) is shared, disclosed, or managed it is not possible to trust the service processing PII with any additional assurancs.
Data Control and the expectations of that control are assessed in this Scheme by making a record, called a consent notice receipt, of the transparency provided in context, From what is generally referred to as a notice notification, sign, policy, privacy policy, contract, web-page, web-page link and or icon, or any type of governing framework agreement.
Scheme Applicability
All data processing must have a record of notified processing activity.
In order toThis is a requirement to be digitally transparent. The exception is whenit is , unless required not to bethere is abylegal derogation, which is required notification, often as risk that is provided prior to consent based processing of PII. EvenIin such an instance, the processing must be transparent to the appropriate regulatory authority, according to the context of processing.This assessment scheme in this way, can be applied
stoallany services context andeverystakeholder;,PII Controller, PII Processor, PII Principal’s, the PII Co-Regulating Authority and delegates.All processing with consent already requires
a record of theprivacy notice and privacy policy link,whichin this assessment scheme, the record that is generated for assessmentin this document is referred to asis called a Notice Receipt, also known ain thes theANCR mirrored recordof consentinformation structure., and referred to as a consent record in ISO/IEC 27560 Consent record information structure.In GDPR and
Records and receipts provided in this scheme as are specified inConvention 108+, Art 31 these records are called a Record of Processing Activity (RoPA), used in this framework as proof of transparency/knowledge.. The consent receipt is effectively a digital twin, of this RoPA, which is a mirrored – linked notice and consent micro-data record, which is also held by the individual.This Record can then effectively become the authoritative consent record.
A Notice Receipt can be created by anyis created to assess in this framework stakeholder to identify a PII Controller.
An Anchored Notice and Consent Receipt can be used as a record of consent to access data subjects' rights, for example, and/or to test and assess the operational performance of PII Controllers’ digital privacy performance in digital contexts.
Part 1 of the scheme introduces 4 Transparency Performance Indicators; these are used to measure and rate the conformance of transparency. In Part 2 of the scheme (in the Appendix A) a transparency information request is sent to the controller to; a) test the controller information and, b) measure how compliant the performance of digital transparency is, to both legal expectations, and the personal privacy expectations of the PII Principal.
, n
...
The normative language for the TPI Scheme is defined by Convention 108+, the commonwealth privacy convention the GDPR (General Data Protection Regulation) 108+ was created to establish a set of principles and rules to effectively safeguard personal data and facilitate cross-border data flows
Normative terms for roles defined in national law are mapped to the roles which are defined according to an international adequacy baseline.
ISO/IEC 29100 is also normative, this security and privacy framework standard maps terms in the standard itself, for example PII Principal is mapped to the Data Subject.
The ANCR Record Framework is used to specify Transparency Performance Indicators (TPIs) and is based on the consent receipt work where roles are mapped to standards and laws.
...
Stakeholder
...
ISO/IEC 29100
...
Conv 108+
...
GDPR
...
PIPEDA
...
Data Protection Authority
...
PII Principal
...
Data Subject
...
Individual
...
PII Controller
...
Controller
...
Data Controller
...
Processor
...
Data Processor
...
Joint-Controller
...
Sub-Processor
(compliance roles, mapped to be interoperable within any data privacy framework)
Roles in this document refer to a record of relationship between the Individual and any digital service, as documented by identifiers. Primary digital trust is technically identified
...
Transparency Performance Indicator’s (TPI’s) are introduced here as an object of conformity used to capture the presentation of PII Controller (Credential) information, to measure this information to determine its completeness,, accessibility and security. Its operational data governance capacity per context can then be assessed against international adequacy baseline for compliance.
In this way TPI’s can quickly be used to determine the validity, quality, and governance of data process for digital and physical assessment contexts.
The TPI’s are employed to assess digital privawcy transparency for human context.
About the Scheme
The TPI Scheme presented here is scoped to international/internet scale digital commonwealth transparency adequacy baseline for trans-border digital consent capable records of transparency. The TPS includes:
A conformity and compliance assessment scheme, implemented in 2 parts to generate a full operational transparency report.
TPI Scheme 1 Part 1 - Conformance
Initial test to diagnose the operational capacity of privacy services in any specific context.
TPI Scheme 1 Part 2 – Compliance (found in Appendix A)
Specifies an example operational transparency compliance performance test, in which the transparency is tested by generating a privacy rights-based request, to access privacy services.
Part 1 refers to conformance with digital identifier elements of the PII Controller required to be presented to initiate a session and is the body of this document.
Part 2 is Appendix A and uses the ANCR record to audit the Adequacy of the captured controller elements as specified in the Council of Europe, Conv. 108+. Article 14, Transparency Modalities.
How Does the scheme Operate?
an ANCR (Anchored Notice and Consent Receipt) Notice Receipt Record, which is assessed as a ‘proof of notice’ (or knowledge record ) claim, conformant as a Consent Notice Receipt as a record format to perform an ISO/IEC conformant digital privacy transparency compliance assessment, against international technical and legal baselines.
The Scheme employs TPI’s to measure the operational performance of transparency and accountability This is used to determine the capacity for dynamic control of personal data, in an online service context. .
The ANCR record is produced from a TPI Assessment which captures the identity of the controller and accountable person, contact and physical address. In this way the presented digital governance and surveillance context can be assessed for compliance for transborder flows of data,
What Do TPI’s Measure
There are 4 Indicators specified in this scheme used to measure the existence and performance of the publicly required digital service information. The TPIs check digital components, and identify the governance model, authority, and security framework to assure the validity of the privacy state in an online service context. This provides privacy risk assurance for people.
Indicators are captured at the point of notice presentation to capture the required PII Controller privacy rights access point(s), and the governance framework personal data processing is being governed.
How Does the Scheme Work
The TPI’s for conformance in the capture of privacy information or services are mapped to analogue legal requirements which measure response times in days, out of technical context. TPIs all measure how dynamic privacy service information is in context, and provide a rating, from -3 to +1, in which +1 is for a Dynamic, in context transparency performance indicator. This introduces the concept of a shared active privacy state transparency, comprised of the signal that indicates if the privacy as expected in context.
...
At the time of writing this Scheme, transparency, and consent is governed predominately by commercial governance frameworks that utilize digital identity management technologies to identify people. At the same time the associated services do not identify themselves in a standard way online, which is neither compliant nor conformant, introducing critical cybersecurity risks.
Individuals are forced to give up digital privacy to access analog privacy rights and services online. All the records of digital relationships (like cookies) are managed by services. Without personal records of digital relationships Individuals are not able to access the information independent of a relying party, which is necessary to measure privacy and security transparency performance of a notice its basis for processing, including and importantly the validity of digital consent.
These risks and harms are exacerbated when PII Principals use privacy services online. PII identifiers, by default, is micro-data that is captured and collected at an attribute level (then aggregated into meta-data).
The end result, individuals must provide raw data attributes, create a profile to access services online. These “security” technologies themselves are used to scrape, profile and track data subjects presenting a systemic challenges to digital privacy for the PII Principal.
The second systemic obstacle to second party management of first party data, is that individuals do not have a copy of their own records of digital identity relationships. The lack of record standards have prevented people from being able to exercise rights outside of a service context.
A standard notice receipt and consent record address this systemic challenge, producing a proof of notice and evidence of consent, for consent tokenization (consent receipt v2).
This Transparency Performance Scheme is extensible, Part 1, is the data commons level first step to generating the digital evidence for authentic consent in online services using terms and conditions based privacy poicy frameworks..
Scheme Applicability
All data processing must have a record of notified processing activity.
In order toThis is a requirement to be digitally transparent. The exception is whenit is , unless required not to bethere is abylegal derogation, which is required notification, often as risk that is provided prior to consent based processing of PII. EvenIin such an instance, the processing must be transparent to the appropriate regulatory authority, according to the context of processing.This assessment scheme in this way, can be applied
stoallany services context andeverystakeholder;,PII Controller, PII Processor, PII Principal’s, the PII Co-Regulating Authority and delegates.All processing with consent already requires
a record of theprivacy notice and privacy policy link,whichin this assessment scheme, the record that is generated for assessmentin this document is referred to asis called a Notice Receipt, also known ain thes theANCR mirrored recordof consentinformation structure., and referred to as a consent record in ISO/IEC 27560 Consent record information structure.In GDPR and
Records and receipts provided in this scheme as are specified inConvention 108+, Art 31 these records are called a Record of Processing Activity (RoPA), used in this framework as proof of transparency/knowledge.. The consent receipt is effectively a digital twin, of this RoPA, which is a mirrored – linked notice and consent micro-data record, which is also held by the individual.This Record can then effectively become the authoritative consent record.
A Notice Receipt can be created by anyis created to assess in this framework stakeholder to identify a PII Controller.
An Anchored Notice and Consent Receipt can be used as a record of consent to access data subjects' rights, for example, and/or to test and assess the operational performance of PII Controllers’ digital privacy performance in digital contexts.
Part 1 of the scheme introduces 4 Transparency Performance Indicators; these are used to measure and rate the conformance of transparency. In Part 2 of the scheme (in the Appendix A) a transparency information request is sent to the controller to; a) test the controller information and, b) measure how compliant the performance of digital transparency is, to both legal expectations, and the personal privacy expectations of the PII Principal.
Anchor | ||||
---|---|---|---|---|
|
ISO/IEC 29100 is also normative, this security and privacy framework standard maps terms in the standard itself, for example PII Principal is mapped to the Data Subject.
The ANCR Record Framework is used to specify Transparency Performance Indicators (TPIs) and is based on the consent receipt work where roles are mapped to standards and laws.
Stakeholder | ISO/IEC 29100 | Conv 108+ | GDPR | PIPEDA | |
Data Protection Authority | |||||
PII Principal | Data Subject | Individual | |||
PII Controller | Controller | Data Controller | |||
Processor | Data Processor | ||||
Joint-Controller | |||||
Sub-Processor |
(compliance roles, mapped to be interoperable within any data privacy framework)
Roles in this document refer to a record of relationship between the Individual and any digital service, as documented by identifiers. Primary digital trust is technically identified
Anchor | ||||
---|---|---|---|---|
|
Transparency Performance Indicator’s (TPI’s) are introduced here as an object of conformity used to capture the presentation of PII Controller (Credential) information, to measure this information to determine its completeness,, accessibility and security. Its operational data governance capacity per context can then be assessed against international adequacy baseline for compliance.
In this way TPI’s can quickly be used to determine the validity, quality, and governance of data process for digital and physical assessment contexts.
The TPI’s are employed to assess digital privawcy transparency for human context.
About the Scheme
The TPI Scheme presented here is scoped to international/internet scale digital commonwealth transparency adequacy baseline for trans-border digital consent capable records of transparency. The TPS includes:
A conformity and compliance assessment scheme, implemented in 2 parts to generate a full operational transparency report.
TPI Scheme 1 Part 1 - Conformance
Initial test to diagnose the operational capacity of privacy services in any specific context.
TPI Scheme 1 Part 2 – Compliance (found in Appendix A)
Specifies an example operational transparency compliance performance test, in which the transparency is tested by generating a privacy rights-based request, to access privacy services.
Part 1 refers to conformance with digital identifier elements of the PII Controller required to be presented to initiate a session and is the body of this document.
Part 2 is Appendix A and uses the ANCR record to audit the Adequacy of the captured controller elements as specified in the Council of Europe, Conv. 108+. Article 14, Transparency Modalities.
How Does the scheme Operate?
an ANCR (Anchored Notice and Consent Receipt) Notice Receipt Record, which is assessed as a ‘proof of notice’ (or knowledge record ) claim, conformant as a Consent Notice Receipt as a record format to perform an ISO/IEC conformant digital privacy transparency compliance assessment, against international technical and legal baselines.
The Scheme employs TPI’s to measure the operational performance of transparency and accountability This is used to determine the capacity for dynamic control of personal data, in an online service context. .
The ANCR record is produced from a TPI Assessment which captures the identity of the controller and accountable person, contact and physical address. In this way the presented digital governance and surveillance context can be assessed for compliance for transborder flows of data,
What Do TPI’s Measure
There are 4 Indicators specified in this scheme used to measure the existence and performance of the publicly required digital service information. The TPIs check digital components, and identify the governance model, authority, and security framework to assure the validity of the privacy state in an online service context. This provides privacy risk assurance for people.
Indicators are captured at the point of notice presentation to capture the required PII Controller privacy rights access point(s), and the governance framework personal data processing is being governed.
How Does the Scheme Work
The TPI’s for conformance in the capture of privacy information or services are mapped to analogue legal requirements which measure response times in days, out of technical context. TPIs all measure how dynamic privacy service information is in context, and provide a rating, from -3 to +1, in which +1 is for a Dynamic, in context transparency performance indicator. This introduces the concept of a shared active privacy state transparency, comprised of the signal that indicates if the privacy as expected in context.
Anchor | ||||
---|---|---|---|---|
|
...
Digital transparency requires a record to provide a standardized standardised purpose specification so as to include who the beneficiary of data is, how they benefit, and where the benefit and value originates. This information once collected in a standard credential, record, and receipt format can be assessed in the Scheme.
...
Anchor | ||||
---|---|---|---|---|
|
4 TPI’s
The 4 Transparency Performance Indicators capture transparency and data capture practices in context and are used to test the self-asserted information for its operational usability.
...
The TPI Rating system is designed to measure dynamically the operational transparency and performance of the required security and privacy information and its usability. The scale applied penalizes penalise bad behavior behaviour more than it rewards conformance and compliance from +1 “good” to -3 “bad”. These are presented one by one and then in a table for comparison followed by an example in the next section.
...
This is a 1.0 document; we look forward to its evolution.
Anchor | ||||
---|---|---|---|---|
|
Anchor | ||||
---|---|---|---|---|
|
The following describes an assessment using the TPIs to measure Operational Transparency and assurance.
...
Transparency is required to be available in context, i.e., during the time when PII is obtained (found in Transparency Statement or Privacy Policy).8
Time period data stored.
Existence of rights/controls to access and rectify.
Existence of right to manage consent.
Existence of right to lodge a complaint with a Data Protection Authority (DPA).
Whether processing is based under a statutory, or contractual context, or whether necessary for entering a contract, if the PII is obliged, and the consequences of failure to provide this data.9
Existence of
AI, or any automated decision-making technology
Digital identity management surveillance technologies
Any profiles, or graphs generated
Meaningful information about the logic involved
Significance in overall policy or processing and decision making
Expected consequences for and to PII Principal - Data Subject
Anchor | ||||
---|---|---|---|---|
|
The TPI Rating system is designed to measure the operational performance of the information, for example if only a mailing address is provided for a privacy contact on a website, this is considered non-operable according to the context. This means that privacy access and specific information is not retrievable in the context of data collection. The TPIs measure adequacy and demonstrate non-performance by PII Controllers as a form of data co-governance.
The associated Conformity Assessment: uses the open ISO/IEC 29100 security framework for generating interoperable records and receipts of data processing activity, according to transparency in context.
Anchor | ||||
---|---|---|---|---|
|
a. TPI 1 measuring the point when the individual is notified versus when personal information/digital identifiers are collected and processed. The scheme starts by capturing the timing of notice presentation in relation to first data capture, and first contact.10
...
Combined, these TPIs provide an overall Indication of the operational state of digital privacy.
Anchor | ||||
---|---|---|---|---|
|
Rating - Instruction | TPI 1 Timing (with regards to processing) | TPI 2 Required Information | TPI 3 Accessibility | TPI 4 - Digital Security |
+1 (assured) | PII Controller credential is displayed, using a standard format with machine readable language, and linked, for example, in an http header in a browser | The Controller is discoverable prior to session (out of band) in a machine-readable format: 1.Controller Registry 2.A client-side record of processing (via a wallet or browser) | Controller identity is presented prior to data collection | Security is required prior to collection (digital wallet based)
|
0 (dynamic assurance) | PII Controller Identity or credential is provided in first notice | Credential is presented just in time (automated check and first-time notice) | Embedded as a credential and dynamically available upon access (almost just in time) | Assurance provided– e.g., certificate is specific to and matches controller and context. |
-1 (analogue assurance - online) | The Controller Identity, or screen with the Controller Identity is one screen and click away. For example, the privacy policy link in the footer of a webpage | Controller information is accessible (not presented) during collection | PII Controller Identity prominently displayed on first view – prior to processing first page of viewing | Not-specific to controller - does not match jurisdiction. |
-2 - (not mandatory in flow) |
| Controller Credential information is linked during collection | is linked not presented | Does not match OU |
-3 (non-operative) | PII Controller Identity is not accessible enough to be considered ‘provided’ | Controller information not present | Identity or credential is not accessible in context - e.g., two or more screens of view away, or privacy contact is mailing g address and non-operative in context of data collection. | It is not a valid, secure, or recognized provider. |
Anchor | ||||
---|---|---|---|---|
|
This appendix is an example of a notice record and the schema and can be used as a template for the information record, rating, and analysis.
...
FIELD NAME | FIELD DESCRIPTION | REQUIREMENT: MUST, SHALL, MAY | FIELD DATA EXAMPLE |
Notice Location | Location the notice was read/observed | MUST | http://Walmart.com (actual link) |
PII Controller Name | Name of presented business | MUST | Walmart |
Controller Address | The physical address of controller and/or accountable person | MUST | 1940 Argentina Road Mississauga, Ontario L5N 1P9 |
PII Controller Contact Type | Contact method for correspondence with PII Controller | MUST | Email, phone |
PII Controller-Correspondence Contact | General contact point | SHALL | |
Privacy Contact Type | The Contact method provided for access to privacy contact | MUST | Email, or other |
Privacy Contact Point | Location/address of Contact Point | MUST | |
Session Certificate | A certificate for monitored practice | Optional | TLS, Transparency, Policy (OID) Context |
Anchor | ||||
---|---|---|---|---|
|
These digital transparency code of conduct rules coincide with the TPIs presented and reference the international adequacy requirements for transparency required for digital identifier management. In Report on the Adequacy of Digital Identity Governance for cross border transparency and consent:
...
Provide their PII Controller Notice Credentials, before or at the time of processing personal information (TPI 1), Article 14.1
PII Controller credential information must be accessible
PII Controller credential information must be operationally capable for access to rights with evidence of notice & consent
The security context must match the controller’s jurisdiction where it is assumed PII is processed
Anchor | ||||
---|---|---|---|---|
|
Anchor | ||||
---|---|---|---|---|
|
Anchor | ||||
---|---|---|---|---|
|
...
3 Mirrored Record Information Structure, 2024, ANCR WG Kantara Initiative { ANCR: Mirrored Record : Consent Receipt V2: Consent Token Information Structure v0.7 }
4 Consent receipt v1, CISWG Kantara Initiative https://kantarainitiative.org/download/7902/
...