Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 33 Next »

Sunday.May 24, 2020

This PrivMas-Eve we had an informal AdvCIS Notice & Consent Call  to talk bout the latest work eagerly awaiting the ISO Consent Record standard at Kantara.

 We took a social physicist approach to planing the vent and invited people to wear masks and mask their name.  

Note: we don't show faces in this video, so people can be themselves, and wear masks.  This behaviour, along with the typical technical hiccup's, leave some gaps in the recording and some funny mask moment, when trying to figure out who to make the presenter for the next presented session.  (definitely more relaxed way to interact) 


The video and the presentations are below the Agenda - the video call covers a range of very important PrivMas Topics. 

  • Welcome to Kantara PrivMas Call  Gift List 
    • Anti-Consentiment
    • The Meaning of PrivMas (Gov-Interop with Social Physics) 
    • Separation of Powers
    • A New Governance 
    • Common Accord
    • Blinding Identity
    • ToiP - Making Governance Interoperable
    • AI Consent Receipt - Demo 
    •  Dynamic Consent for Emergency Health Responders
    • Cross Jurisdiction Transfer Data Exchange with Explicit Consent - applied to International -  Electronic Health Exchange Record - Demo


Surveillance Notice : The PrivMas call will be recorded,  attendee's are invited to change their name and turn off video - and wear a mask - and self protect against privacy or security risk

Kantara - PrivMas - Materials


Presenter Title of PresentationMaterials Notes/Tweets References    
Colin Wallis Kantara PrivMas2020 Special  Video of the PrivMas Call 

Colin Wallis (Unlicensed)  Kick's off the Kantara PrivMas with international #PrivMas Gifts 

Video Link to the Call - is here (its big at the moment) 
Doc SearlsAnti-Consentiment

The R Button https://cyber.harvard.edu/projectvrm/R-button

https://blogs.harvard.edu/vrm/2012/04/15/lets-fix-the-car-rental-business/

Former user (Deleted) Why #PrivMas  needs to kill contract of adhesion -  its not human consent

https://www.linuxjournal.com/content/cookies-go-other-way

Is the operator the 4th party? 

http://blogs.harvard.edu/vrm/2009/04/12/vrm-and-the-four-party-system/

Mark LizarPrivMas -Intro

Refer to the history of the legal standards and the background of this work in the OECD Transboarder Flows Background.   Referencing the - 2003 ISTPA Presentation 

The history of OpenNotice & Biggest Lie:  MyData, My Control, My Consent  - the growth of my data focused communities and efforts. 

Mark Lizar (Unlicensed) #PrivMas History

This presentation.is the 2003 ISTPA Presentation by John Sabo from Computer Associates, which serves a great backgrounder to legal standards that these technical standards are being built to  

https://www.oasis-open.org/people/distinguished-contributor/john-sabo

Mathais De Bievre & Olivier Dion

aNew Governance Project for the EU Data Governance Architecture 

 European Commission Data Strategy- An infrastructure for decentralised consent (inherent to design) data  infrastructure for permissions. 

Addressing the lock-in of big-data platforms 

Forming a New Governance in the MyData Community - with interoperability amongst data operator. 

  • Human Centric Governance 
  • MyData Declaration 
  • Separation of Powers 
  • Cross Sector and Domain 
 aNG -the upstart EU Network -enjoys PrivMas at Kantara - with Separation of powers  and the power of  Skills & Mobility use cases' 
Joss LangfordMyData Operator
  • The MyData Operator 
    • updates 
    • Proto-Operators 
    • Professional Association in Development

MyData Operator - PrivMas at it's best -  global best practices 
Jim HazzardCommon Accord

https://hardjono.mit.edu/sites/default/files/documents/CommonAccord_Provenance_11182015.pdf

http://www.commonaccord.org/index.php?action=list&file=G/GA4GH/

https://github.com/CommonAccord/Cmacc-Org/tree/master/Doc/G/GA4GH

accountability - e.g. http://www.commonaccord.org/index.php?action=doc&file=G/GA4GH/Accountability-Policy/Form/0.md

Common Accord, a #PriMas gift for a New Governance 
Muhammad WaqasAlexa - AI Consent Receipts Live Demo of an consent receipt sent via email - where the email must be read before the consent moves from implied consent to explicit consent.   Implied to let Alexa offer a service and explicit for access to data - later in the flow - 

Paul Knowles

From the Human Colossus Foundation for scaling data governance -" A home for synergy"
Tom Jones A Call To Action for Consent Identity Protocol Presented a Dynamic architecture for real–time emergency response data access - as a consensus 

Xiaohu BRUE: UMA For Cross Domain Explicit Consent (for HealthCare) 

I¿m hungry. That soup looks awesome! - BlockChain-UMA Specific Soup

Demonstrating international health care use case where UMA is used to enable cross Jurisdictions Electronic Health Exchange - with explicit consent as the framework for the exchange.  



Sal D'Agostino Identity Surveillance TechnologyBigger Brother -https://www.nybooks.com/articles/2020/04/09/bigger-brother-surveillance-capitalism/ - a SoShanna Zubov Review -  And a PrivMas gift - active transparency over Surveillance Capitalism 

Salvatore D'Agostino Closes #PrivMas Eve - with a Toast and tale of Bigger Brother - to close


 Interop Gov Role-Play For Video Conferencing Calls

(A use case for facilitating decentralised governance experience) 


 An idea for future PrivMas Fun - Attendee’s can (Optionally) participate in co-creating a trustworthy-social masking protocol.  (If you choose - as forced role-play is bad gov)

Using the features that People can turn off. video and wear a mask/disguise as well as change their screen name to a psudonymn.

Objective - 

The aim of the game is for people to experience what difference governance frameworks would be like if implemented the way the think.  There is a good guy mask, a bad girl mask, a rainbow mask and an imposter mask.  The aim is use gov framework names as psudonyms and use the governance frameworks to see if you can work out who is the imposter. 

To Participate

Everyone can only invite one guest and you can make up a name for your caller ID (on the Video call) by using the suggested identity governance naming convention. that is intended to make transparent the governance framework perspectives you feel like representing on the call or even at different time in the call.  (Also, you can exaggerate the name of you favourite governances flavour with a pre expression to futher exaggerate the naming)  

For Example, 

ISI Members: as hosts -should pick an ISI gov flavour name :  ISI-N&C Gov,  ISI-Intent Gov, etc  (as this is prescribed by the role of hosts) 
Framework & Protocol Reps: UMA Gov, Skilz Gov, Nxt-ISO-Gov, Me2B Gov, WoT Gov, and interestingly  - aNG - doesnt need a naming convention - (these examples are not prescriptive)
Likewise - pls ask your guests to affiliate to whatever Gov label you choose to participate under, e.g.  Guest of Gov Name. And for those wishing to be un-afiliated - please name yourself Doc or Joyce to play

Purpose
(More trust and assurance guidance for participation in gov frameworks to mimick or perform to human expections).This is why we have moderators, and security protocols to kick people out etc, so that the risks can be mitigated

The Game Play

The risks mitigated in the call are captured through masking  identity in different ways to reduce privacy and security risk of the person, intended to be extremely flexible.  Generally, people can identify each other through topic and voice, but the idea is to let people join the call, so no one really knows who each person is to begin with.  And with all the Video Turned off..  as people present, and talk, they can turn on video, and people can communicate via chat.

1 person has to be known and the moderator - another person can be designated the security person for the call.  If there is a real (or staged) call disruption - the moderator and the security person has a separation of powers, and need to keep a log of the secret chat where the security person has the decision making power to kick people off the call, but the moderator has the technical control to do so. 

Each person's guest can act as a proxy - so their could really be unknown people on the call - which is why its good for a work group/community rather than a public event.    

Success 

Is not to find the imposter but to create a feeling of trustworthiness with the governance assurance frameworks and perhaps specification governance tools or tech that is employed /applied by the group




  • No labels