...
Tim Loyd
Other
IPR Statement
Proposed Agenda
...
...
Time
...
...
...
Actions
...
15
...
Admin
...
Motions
by weekly calls discussing an assurance program for digital consent in commonwealth - a register of registrars.
...
...
15
...
Discussing the development of a commonwealth scale assurance program. Need to specify terms to begin with -
...
definitions,
Commonwealth
Data Trust
Notary - Data Trust Records and its Governance (micro-data)
Framework Security
...
10
...
ANCR - Explore a Program Committee startup tasks
Make A SPIDER GRAPH - to compare multi-benefit - dimensions
...
different trust frameworks laid down on that diagram
...
landscape picture of benefits for Tanpsanrecy & Trust Assurance vs Digital Trust Assurance Framework,
...
https://www.storytellingwithdata.com/blog/2021/8/31/what-is-a-spider-chart
...
...
20
...
Discuss the demand side of the AuthC- Trustframeworkl
...
Demand Side - who would provide a demand for such a program ?
...
...
...
Trust Framework
...
industry engagement - on the demand side
review age assurance industry as a case study
...
...
...
For April 12th
...
develop program proposal
provide support for controllers, - shortest distance to implement a consent receipt
be clear of the benefits
...
Article 33
Security of processing
Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including, inter alia, as appropriate:
(a) the pseudonymisation and encryption of personal data;
(b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
(c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;
(d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.
The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union law.
Adherence to an approved certification mechanism as referred to in Article 42 of Regulation (EU) 2016/679 may be used as an element by which to demonstrate compliance with the requirements set out in paragraph 1 of this Article.
...
and Discussion
Other Business -Work to be done, Edits Required for new WG proposal for Registrar assurance program contribution -
Remaining in the ANR WG - In the TPS Scheme - Edit -
4 Levels of Notarial Transparency Assurance,
0 - is the use of a un-assured controller notice record - enhancing current privacy policy and notice display and presentation
can be notarised by a cyber-notary
Registrar Controller Process
Controller Credential - is enrolled, registered and current - with authoritative government source of data
Controller DPO- Delegated Credential -
Notary Credential - Scope of Disclosure based
Registrar Credential - Scope of Controller Enrolment Assurance
Transaprency Code of Conduct - Controller Credential - Approved by CNIL - Open usable for digtial consent exchange in the Commons,
Requirement by legal -
Transparency code of conduct - directs the specification of the credential - (shared Commons governance model)
Method TPS Scheme
Quality of knowledge and consent
“International Trans-Border”
Time |
|
| Actions |
---|---|---|---|
15 | Admin | Motions |
|
15 | |||
10 |
| ||
20 |
| ||
|
| ||
|
|
Actions
- Specification Work items
- in the program
PII Controller Credential,
3 vectors of data trust/ privacy risk
Transparency Code of Practice,
Using the The Controller Credential
Glossary
Consent Receipt V2, Consent Token Flow - Exchange -
Notice & Transparency Requirements
Consent semantics and ettiquette. (Consent vs. Conceipt) its not consent to, or consent for, it is consent from.
AuthC
Reference Implementations and AuthC TPI’s
Reference design" from these standards-specs efforts - this would open us up to the benefits of iterative/spiral development benefits
Signalling
- Roadmap
- TPI Doc
- Charter
- License Action
...