Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To provide a protocol and framework based on notice and consent that supports the use of records and receipts for decentralized authorization independent of identifier technology. To provide a specification for an anchor receipt for notice of purppose and context ) and proof of that notice that supports this decentralized governance and authorization (Auth C) by the principal and the controller/operator.

...

  1. Publish a white paper that presents the flow of the Auth C protocol and the dual receipt structure.
  2. Publish a Notice Receipt Specification to address the technical gaps in the current specification and that includes include inputs from recent standards, and other technical, and legal developments.
    1. Update the initial consent receipt specification by specifying the explicit consent record fields for legal proof(s) of notice and proof of consent.
    2. In the update take advantage of ISO 29184 and other relevant technical standards, laws and policy developments.
    3. Address technical gaps in the initial consent receipt specification, with new specifications, e.g.  a data privacy vocabulary
      1. A glossary.
    4. Innovate in accordance with Kantara Operating Procedures and promote a consent notice receipt (a receipt that is a notice of consent) as an international tool for human, legal and decentralized identity governance and interoperability.


(4) DRAFT TECHNICAL SPECIFICATIONS: List Working Titles of draft Technical Specifications to be produced (if any), projected completion dates, and the Standards Setting Organization(s) to which they will be submitted upon approval by the Membership.

...

Regulators looking for technical controls to implement legal requirements that scale.

For human beings, as the implementation of the notice and consent receipts provide an alternative/complement to terms and of services and privacy policies, and provides something that can be understood by people. This is in contrast to the current abuser experience, namely that privacy policies and terms of service address privacy concerns and provide safeguards of personal information.

...