Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Tim Loyd

Other

IPR Statement

Proposed Agenda

...

 

...

Time

...

 

...

 

...

Actions

...

15

...

Admin

...

Motions

  • by weekly calls discussing an assurance program for digital consent in commonwealth - a register of registrars.

...

 

...

15

...

Discussing the development of a commonwealth scale assurance program. Need to specify terms to begin with -

...

definitions,

  • Commonwealth

  • Data Trust

  • Notary - Data Trust Records and its Governance (micro-data)

    • Framework Security

...

10

...

ANCR - Explore a Program Committee startup tasks

Make A SPIDER GRAPH - to compare multi-benefit - dimensions

...

different trust frameworks laid down on that diagram

...

landscape picture of benefits for Tanpsanrecy & Trust Assurance vs Digital Trust Assurance Framework,

...

https://www.storytellingwithdata.com/blog/2021/8/31/what-is-a-spider-chart

...

 

...

20

...

Discuss the demand side of the AuthC- Trustframeworkl

...

  • Demand Side - who would provide a demand for such a program ?

...

 

...

 

...

Trust Framework

...

  • industry engagement - on the demand side

    • review age assurance industry as a case study

...

 

...

 

...

For April 12th

...

  • develop program proposal

  • provide support for controllers, - shortest distance to implement a consent receipt

  • be clear of the benefits

...

 

Article 33

Security of processing

  1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including, inter alia, as appropriate:

  1. (a)  the pseudonymisation and encryption of personal data;

  2. (b)  the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;

  3. (c)  the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;

  4. (d)  a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.

  1. In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.

  1. The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union law.

  1. Adherence to an approved certification mechanism as referred to in Article 42 of Regulation (EU) 2016/679 may be used as an element by which to demonstrate compliance with the requirements set out in paragraph 1 of this Article.

...

and Discussion

Other Business -Work to be done, Edits Required for new WG proposal for Registrar assurance program contribution -

  • Remaining in the ANR WG - In the TPS Scheme - Edit -

  • 4 Levels of Notarial Transparency Assurance,

  • 0 - is the use of a un-assured controller notice record - enhancing current privacy policy and notice display and presentation

    • can be notarised by a cyber-notary

  1. Registrar Controller Process

    1. Controller Credential - is enrolled, registered and current - with authoritative government source of data

  2. Controller DPO- Delegated Credential -

  3. Notary Credential - Scope of Disclosure based

  4. Registrar Credential - Scope of Controller Enrolment Assurance

Transaprency Code of Conduct - Controller Credential - Approved by CNIL - Open usable for digtial consent exchange in the Commons,

  • Requirement by legal -

    • Transparency code of conduct - directs the specification of the credential - (shared Commons governance model)

  • Method TPS Scheme

  • Quality of knowledge and consent

  • “International Trans-Border”

Time

 

 

Actions

15

Admin

Motions

 

15

10

 

20

 

 

 

 

 

Actions

  •  Specification Work items
    •  in the program
  • PII Controller Credential,

    • 3 vectors of data trust/ privacy risk

    • Transparency Code of Practice,

      • Using the The Controller Credential

    • Glossary

  • Consent Receipt V2, Consent Token Flow - Exchange -

    • Notice & Transparency Requirements

      • Consent semantics and ettiquette. (Consent vs. Conceipt) its not consent to, or consent for, it is consent from.

  • AuthC

    • Reference Implementations and AuthC TPI’s

      • Reference design" from these standards-specs efforts - this would open us up to the benefits of iterative/spiral development benefits

    • Signalling

  •  Roadmap
  •  TPI Doc
  •  Charter
  •  License Action

...