/
ANCR: PII Controller identification record v0.8

ANCR: PII Controller identification record v0.8

Editor(s)

Mark Lizar, WG Editor

Contributors

Salvatore D’Agostino, WG Chair

Gigliolla Agassini, WG Secretary

Tim Reiniger
Paul Knowles

Tim Lloyd

v. 0.8

 

 

 

 

Prelude

 

This PII Controller identification record, is the security part of the minimum viable consent receipt, which is the original work. Its now 4th generation record, it is in the appendix of 29184, it was the basis for the Kantara Consent receipt v1.1, and then ISO/IEC 27560 Consent record information structure.

 

It was first published as 0PN Schema, in semantics workshop, and is the record that is used to capture PII Controller identification information in the ANCR WG Transparency Performance Report. Wherein, the fields are referenced to an internationally interoperable legal and technical standard.

 

This specification provides mapping of the controller credential role in multiple jurisdictions, guidance on extending the record to generate a notice and consent receipt.

 

PR Option:

This ANCR WG Recommendation is open and can be used royalty-free under the ANCR WG IP license, patent and copyright (see: Reciprocal Royalty Free with Opt-out to Reasonable and Non-discriminatory (RAND) license agreement at the Kantara Initiative for its use and contribution to ISO/IEC SC 27 WG 5).

 

Any derivative use of this specification must not create any dependency that limits or restricts the use, accessibility, and availability of the specification and/or its use to measure the performance of transparency and/or the ability for the PII Principal to receive a notice receipt, or to manage or present a notice receipt as a record of and for the authoritative use of PII Principal consent.

 

Suggested Citation: (upon WG approval)

Kantara Initiative, 2024: ANCR Transparency Performance Report v 1.0

 

 

Conditions for use

 

License Condition:

This document has been prepared by participants of Kantara Initiative Inc. ANCR-WG. No rights are granted to prepare derivative works of this ANCR Scheme outside of the ANCR WG. Entities seeking permission to reproduce this document, in whole or in part, for other uses must contact the Kantara Initiative to determine whether an appropriate license for such use is available.

 

Implementation or use of this document may require licenses under third party intellectual property rights, including without limitation, patent rights. The participants and any other contributors to the specification are not and shall not be held responsible in any manner for identifying or failing to identify any or all such third-party intellectual property rights. This Specification is provided "AS IS," and no Participant in Kantara Initiative makes any warranty of any kind, express or implied, including any warranties of merchantability, non-infringement of third-party intellectual property rights, or fitness for a particular purpose. Implementers of this Transparency Performance Indicators specification are advised to review the Kantara Initiative’s website (Kantara Initiative: Trust through ID Assurance )1 for information concerning any Necessary Claims Disclosure Notices that have been received by the Kantara Initiative Board of Directors.

 

Dear reader,

Thank you for reviewing this specification in its preparation for publication and contribution. The Kantara Initiative is a global non-profit dedicated to improving secure, private and trustworthy use of digital identifier surveillance through innovation, standardisation, and good practice.

 

The Kantara Initiative, known internationally for incubating innovative governance technologies, operates Identification Trust Assurance Frameworks to assure digital identification practices are developed with community-led best practices and specifications. Its efforts are acknowledged by OECD ITAC, UNCITRAL, ISO SC27, and other consortia and governments around the world. “Nurture, Develop, Operate” captures the rhythm of Kantara in consolidating an inclusive, equitable digital economy offering value and benefit to all.

 

Every publication, in every domain, is capable of improvement. Kantara Initiative ANCR WG welcomes and values your contribution through membership, sponsorship and active participation in community driven working groups2 that drive all endeavors so that Kantara can reflect its value back to you and your organization.

Copyright: The content of this document is copyright of Kantara Initiative, Inc.
© 2025 Kantara Initiative, Inc.

Introduction

The PII Controller Identification record is specified here as its own specification, along with how it can be used to generate a notice record and consent record and receipt, in line with (proposed changes to 27560 -) for consent capable notice and consent records and receipt.

This specification recommends the use of this core identification record as the preferred stand format for this scheme, so as to interoperate with the ANCR Transparency Performance Reporting PII Controller identification record, which also requires a publically required and open identifier.

In this specification we provide security and privacy considerations for a data goverance role specific to blinding the identification of the PII Controller, linked PII Principal identification information, using the international transparency (aka notice and and consent record and receipt policy and technology framework as specified with the consent receipt v1.1 work)

Terminology

In the appendix there are the ISO/IEC Standards and standard bibliography that this Controller identification, as interoperable with by default.

Access Gateway

  • is the safety, security, surveillance, privacy and consent notice access point location and use information

 

PII Controller Notice identification record

 

This table consists of the compulsory attributes,

PII Controller refers to the interacting party

Data Controler refers to the the controller accountable for protecting personal data, which is commonly the same or equivalent to the Data Controller;

PII Controller Identification Record attribute

Controller ID Object

String

controller_id_object

_

Required

2

PII Controller Identity

object

[piiController_identity]

3. (object)

PII Controller Name

String

piiController_name

Company / organization name

MUST

PII Controller address

String

piiController_address

_

MUST

4

PII Controller contact type and info

Varchar(n)

piiController_contact_email

correspondence email

MUST

8

PII Controller SSL Certificate

BLOB

piiController_sslcertificate

A capture Website SSL

MUST

 

means of accessing privacy rights and controls

VarChar(max)

pcpL

the end point address for privacy information and service access

MUST

7

Notice and Privacy Access Point

Varchar

piiController_www

URL of website (or link to controller application)

MUST

9

Notice & Permission Access Point Types (pcpT)

Object

pcpType

Access Gateway AG_MailAddress

object

mailing address

MUST

AG-Profile

String

pcpProfile

Privacy Access Point Profile

**

AG-InPerson

String

pcpInperson

In-person access to privacy contact

**

AG-Email

Varchar

pcpEmail

PAP email

**

AG-Phone

char

pcpPhone

Privacy access phone

**

AG-PIP- URI

Varchar

pcpPip_uri

privacy info access point, URI

**

AG-Sform

Varchar

pcpForm

secure environment pii capture form form URI

**

AG-bot

String

pcpBot

privacy bot, URI

**

AG-cop

String

pcpCop-loc

code of practice certificate, URI of public directory with pub-key

**

AG-other

string

pcp_other

Other

**

10

AG Policy Meta - link, notice id, statement id, label

text

pcpn/

the means of privacy

MUST

 


Controller Credential Mapped to Legislative Instruments

 

ISO/IEC 29100 security and privacy framework standard maps terms in the standard itself, for example PII Principal is mapped to the Data Subject.

 

Stakeholder

ISO/IEC 29100

Conv 108+

GDPR

PIPEDA

Quebec Law 25[1]

Regulator

Privacy Supervising Authority

Supervisory Authority

Data Protection Authority

Privacy Commissioner

Commission d’accès à l’information du Québec

 

Principal

PII Principal

Data Subject

Data Subject

Individual

Concerned Person (or person concerned)

Controller

PII Controller

Data Controller

Data Controller

Organisation

Person in Charge of the Protection of Personal Information

Joint (or Co-) Controller

Joint PII Controller

Joint Data Controller

Joint-Controller

Organisations

Person in Charge of the Protection of Personal Information

Processor

PII Processor

Processor

Data Processor

3rd Party

Service Provider (prestataire de services)

Sub-Processor

Sub-Processor

Sub-Contractor

Sub-Processor

3rd  Party / Service Provider

Service Provider (prestataire de services)

3rd Party

Any entity or individual other than the Data Subject, Controller or Processor

Any entity or individual other than the Data Subject, Controller or Processor

Any entity or individual other than the Data Subject, Controller or Processor

3rd Party

Any individual or organisation other than the person concerned or the organisation in charge of data protection

Table 1. Role Mapping

 

 

Quebec, Bill 64 - [1] An Act to modernize legislative provisions as regards the protection of personal information, SQ 2021, c 25,

(compliance roles, mapped to be interoperable within data privacy framework)

Roles in this document refer to a record of relationship between the Individual and any digital service, as documented by the Controller identity schema for TPI assessment.

PII Controller Identification Schema

Schema for the Controller Identification Record, and access point, which does not require any PII. This is immensely useful, as it provides a mechanism that people can use to consent with,

 

Used to specify the digital element, nft, envelope, packet,etc, which encapsulates information, As a result, PII is not exposed through direct interaction, and thus enables the individual to be anonymous the service, authorising through an alternative approach.

 

Interoperable with

 

ISO/IEC A Standard that can be for the,

Convention 108+

GDPR

FIPPS Principles based law

 

ISO/IEC 29184:2020 Online privacy notice and receipt

ISO/IEC 27560:2024 - proposed as a profile for 27560

ISO/IEC ?

 

Appendix A: Standards Interoperability using ISO/IEC 29100 Terminology Bibliography

 

[1] ISO Guide 733, Risk management — Vocabulary

[2] ISO 31000, Risk management — Guidelines

[3] SC 27 committee document 502 — Privacy References List, available at: https://committee.iso .org/home/jtc1sc27

[4] ISO/IEC 27000:2018, Information technology — Security techniques — Information security

management systems — Overview and vocabulary

[5] ISO/IEC 27001, Information security, cybersecurity and privacy protection — Information security management systems — Requirements

[6] ISO/IEC 27002, Information security, cybersecurity and privacy protection — Information security controls

[7] ISO/IEC 27003, Information technology — Security techniques — Information security management systems — Guidance

[8] ISO/IEC 27004, Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation

[9] ISO/IEC 27005, Information security, cybersecurity and privacy protection — Guidance on managing information security risks

[10] ISO/IEC 27006, Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems

[11] ISO/IEC 27007, Information security, cybersecurity and privacy protection — Guidelines for information

security management systems auditing

[12] ISO/IEC TS 27008, Information technology — Security techniques — Guidelines for the assessment of information security controls

[13] ISO/IEC 270094), Information technology — Security techniques — Sector-specific application of

ISO/IEC 27001 — Requirements

[14] ISO/IEC 27010, Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications

[15] ISO/IEC 27011, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations

[16] ISO/IEC 27013, Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1

[17] ISO/IEC 27014, Information security, cybersecurity and privacy protection — Governance of information security

[18] ISO/IEC TR 27016, Information technology — Security techniques — Information security management — Organizational economics

[19] ISO/IEC 27017, Information technology — Security techniques

[20] ISO/IEC 29100:2024 Information technology – Security techniques - Privacy Framework

 

 

 

1 (Kantara Initiative: Trust through ID Assurance

2 Kantara Initiative hosts a number of work groups which work at the apex of digital identification and trust, and assurance.

Related content