Skip to end of metadata
Go to start of metadata

Consent & Information Sharing Work Group (CISWG)

This Work Group operates under the Kantara IPR Policy - Option Patent & Copyright: Reciprocal Royalty Free with Opt-Out to Reasonable And Non discriminatory (RAND)

Join | Subscribe | Archive (Mailman) | Archive (Google) | Charter | Participant Roster | Minutes
(Mail archives prior to Oct 6, 2009)

The goal of this working group is to identify and document use cases and scenarios that illustrate the various sub-sets of user driven information, the benefits therein, and specify policy and technology enablers needed to enable this information to flow.Project VRM and other groups seek individual autonomy over personal information. Framework and tools can enable personal data flow, to improve the relationship between demand and supply. When individuals are forced to sign organization-centric privacy policies / terms of use, limitations are naturally placed on personal information on both sides of the transaction. If these constraints were removed, and individuals had more autonomous capabilities, then new, rich information would flow - including actual demand data (as opposed to derived / predicted demand).

This blog post on the Personal Data Eco-system is useful background and context for this working group.

Download the Consent Receipt Overview

 

Leadership

  • Mark Lizar - Co-Chair [December 2014]
  • Iain Henderson. - Co-Chair [December 2013]
  • John Wunderlich - Editor
  • Mary Hodder - Editor

Teleconferences:

Calendar: https://kantarainitiative.org/calendars/

 

 View Recently Updated Pages

Recently Updated

 

Lots of CIS appreciation goes out to Domenico

 

MVCR Road Map: 2015

MVCR Road Map 2015

v0.6

v0.7

v0.8

v0.9

v1

(Functional Requirements Specifications)

X

    

(Technical Requirement Specifications)

This includes: MVCR Core Receipt Profile; Tables: Fields, Definitions, technical Logic, Appendix tables,
Core Json Model,
- Use Cases: MVCR Use Case, Consent Receipt Generation Tool, Site Registration

 

X

   

Implementation Review: WG Review and Issues List Generation, Issues Prioritization, Issues Resolution,

This includes: Documentation Development, Demonstrator review and revision list. 

  

X

  

Kantara Community Review:  -Collect and Address Comments, Final Review,

   

X

 

Public Review & Acceptance of V1

    

X

This is a note to let everyone know that you can find the next version of the consent receipt at  this link.  Minimum Viable Consent Receipt Specification - v 0.6

Purpose

Icon

This is the beginning of the list of the 'why' and 'how' of the Consent Reciept. The intention is to develop, discuss and refine this list going forward. 

 

Values, Benefits and Claims of Minimum Viable Consent Receipt

Value proposition:

  1. The MVCR number one purpose is dramatic usability of consent. For example, to be used by people to see (and if desired verify) compliance level and to engage in personal data control
    1. provide a foundation for the less educated and less advantaged technically to engage in the control and choice of how personal information is accessed. 
    2. usabilty promoted as a key missing component  of privacy and security is addressed by the MVCR
  2. The method and rationale behind the term 'minimum viable' is aimed to distill the most common regulatory requirements of a consent token, and to present it as an understandable receipt which demonstrates basics of trusted consent.  This requiers the abiity to demonstrate with a consent token a basic level of self asserted compliance compliance across jurisdictions.   
    1. A consent receipt designed well should show compliance and usability clearly, and provide the consent provider control and independent privacy with how this information is used.   
    2. As a common token format - A Minimum Viable Consent Reciept is Schema that will enable the consent requester to demonstrate scalable levels of trust and the ability for people to assert privacy regulation independently of a service providers platform. 
  3.  The MVCR is specifically designed to provide the minimum amount of common compliance to legal requirements across jurisdictions. 
    1. The presence of a consent receipt in and of itself demonstrates a capacity by the providing organisation for the legal management of consent.  The act of providing a consent receipt demonstates the self asserted level of compliance and the ability for the individual to check the links provided enables the individual to see if the reciept deserves its self asserted value. 
    2. Trust facilitated networks like those facilitated by TAS3, ID3, Respect Network and personal data control protocols (UMA) and so on would automate the trust process and can enable maximum personal data control and customisation.    

Benefits:

  1. Consent Legal Framework - The MVCR Core Extension specifically refers legal context and terminology of existing legislation in the relevant jursidiction (s).  
  2. The standardization of the consent requirements (in the Consent Legal Framework) enable an open source way to build tools that aggregate consent and policy information across jurisdiction  
    1. Adding requirements from multiple jurisidictions is as easy as appending additional context and requiremetns to the existing token.  This way additional context and requiremetns can be specified and third parties can then proxy and policy the use of personal data.  This architecture provides the  method to standardise the communication of consent management requests across jurisdictions (with the potential ability to address SafeHarbour Requirements). 
  3. With a bit of development in a core consent Framework -  people would be able to use a consent receipt with legal effect to escalate the enforcement of personal data management practices by third parties in some jursidictions.  All without logging into a website and profile, or reading the privacy policy and terms of use policies. 
  4. Irrespective of the medium used, as long as the minimum viable consent receipt contains the minimum viable information, it is usable to verify the self asserted claim of compliance and a channel to communicate with an organisation if their is an issue with consent. 

Claims:

  1. The MVCR Core extension will reflect regulator changes
  2. A consent receipt can be used to manage consent on aggregate.  E.g. withdraw consent, or negotiate consent of multiple service providers
  3. With the ability to manage consent by extension of the spec the ability to negotiate terms for service delivery is also possible with a consent receipt. 
    1. To negotiate TOU within context. Specifically, to negotiate terms of personal data use as well as control the use of Sensitive Personal and access/use by third parties,  consent can be modified and specified by the con
      1. This becomes especially significant in the context of Trust Protocols like UMA and trust services like XpressRules (see list email) 
  4. The quality of consent can be measured by how much the usability of consent has evolved in the context of the provisioning organisation.
  5. The consent token format can be used as a standard approach to scaling the usability of consent and associated policy across jurisdictions and the internet.  
  6. Extensions will need to in include Trusted Services and the like (as defined in the v.06 of the MVCR spec) This requires audits of third party trust services so they can be represented in the context of the specification (e.g. verified to effect legal compliance in x way and for the stated purpose) 
  7. For a consent receipt to become a consent transaction token, it needs to be linked to the log of all previous consent changes by the user.  For instance an UMA log or an XDI chain.  
  8. The issuance of a consent receipt itself illustrates an enhanced compliance that also advertises the ability to communicate with those that wish to manage consent themselves.  The receipt provides the mechanism to engage.  (there fore demonstrating discovery through organisations self asserting compliance)
    1.  people are then able to use the receipt to independently communicate about policy with receipt provider 
  9. The receipt itself needs to be flexible.  It needs to be able to self assert the most basic and minimal use of personal data, to the most vouched for or prolific and open use of personal data, a data subject might have. 
  10. The most minum viable consent receipt should not have any personal data associated but the which was the identifier provided.  The individual should have the choice of masking this on his/her device of choice and as a preferences with the provider. 

 

Coming out of the Convergathon in October, it seems that the data flows for the open notice registry will be an integral part of open notice. This data flow and description is my understanding of the first cut at this.

 

 

Privacy Notice Service

It is the case that most countries that have a data protection regime have some form of notice and consent regime. We propose a privacy notice service to provide participating entities with a common protocal and service to publish their privay notices. This enables the following:

  • Regulators to validate that notice and consent guidelines are being met
  • Users to proactively determine which entities to deal with before provide personal information

 

Adoption of a privacy notice service would also encourage competition and innovation in data protection.

Privacy Notice Service

Contents of service

  • "noticeTS":1420642200 # Time that notice was created
  • "noticeType": "Asserted|Validated|Found" # notice could be asserted by entity, validated by third party, or scraped from web site
  • "noticeURL":"http://www.entitty.com/opennotice"
  • "noticeTxt":"We only collect information about you with your consent, except for web browser information which is retained in our logs for 2 weeks."
  • "consentReceipt":TRUE|FALSE # whether the site provides consent receipts

Open Notice Registry

This would be a service on the Internet. Open Notice Registry (ONR) servers would be repositories of privacy notices and could communicate with each other to provide redundancy. A preferred model of this would also have a governance model to allow for validation of notices.

We Had A Great Event (Feb 8/9 2014) 

A community interested in developing personal data control came together, hacked all weekend long and initiated project hacks, to evolve the control of personal data.  The ability to control our own data is seen as an effective way to save the free internet. This event has really started something, the scale and size of this first event was remarkable.   Mary Hodder, and I (Mark Lizar) got involved exactly 30 days before the event and if it wasn't for the huge out-pouring of support such a great event could never of happened. Thank you so much everyone who got involved! With a special thanks to Judi Clark for rejoining the CISWG and helping make the San Francisco event a massive success.

We had some great visitors, one of which was a cameo of Kantara's very own Eve Maler talking about consent. (video link here)

The Three Winning projects 

  1. London - Consent Receipt Request Form - Presented by Reuben Binns & Valentino Spataro
  2. New York - Ghost DropPresented by Max Giraldo
  3. San Francisco - Privacy Visualisation - Presented by Nick Doty 

The judges are currently being invited to voting on Best of Show next week Feb 17.  Let us know which one you think is best (comment below)!

A full list of projects presented can be found on hackerleague.org 

 

 

 

Data-Privacy-logo_large

Come join developers, lawyers, policymakers, and academics as we collaborate to build technology solutions to challenging legal and policy issues. $1,000 prize for the best privacy hack at NYC | London | San Francisco locations. See the contest rules for restrictions.

Step 1: Register for a Location

To participate in person, please sign up with Eventbrite to help us plan space and food. To participate remotely, check out the rules.

SAN FRANCISCO Eventbrite

NEW YORK Eventbrite

LONDON Eventbrite

 

Step 2: See What's Happening

Live Hackathon Broadcasting & Schedule

Twitter Tag #LegalHack | #PrivacyHack

Step 3: Participate!

Join HackerLeague to get updated information about the event, list your project group, locations and topics, as well as find folks to collaborate with...

Judges & Speakers

NEW YORK
Hon. Ann Aiken (District of OR), Susan Herman (ACLU), Johnathan Askin (Brooklyn Law School), David Wainberg (AppNexus), Wilfried De Wever (HiiL), Doc Searls (VRM Harvard Berkman Center), K. Krasnow Waterman (MIT), Amyt Eckstein (Moses & Singer), Jason Tenenbaum (Rashbaum Associates), Dona Fraser (ESRB), Solon Barocas (Doctoral Candidate, NYU), Sol Irvine (Yuson & Irvine), Heather Federman (Online Trust Alliance), David Pashman (Meetup)

LONDON
Dr. Ian Brown  (Oxford Internet Institute)Dr. Ian Walden  (Queen Mary University)John Cummings  (Innovation Partners)Stefan Magdalinski (Mydex)Wilfried De Wever - Senior Justice Adviser / Justice Investment Program Manager (HiiL)

SAN FRANCISCO
K. Krasnow Waterman (MIT)
Brian Behlendorf (Mozilla Board)
Michelle Dennedy, author of the new book: The Privacy Engineer's Manifesto (McAfee)
John Buckman (EFF Chairman)

Organized by:

organizedby

 Platinum Sponsorsplatin

Gold Sponsors
gold
Silver Sponsors
silver
Supporting Organizations
supporters

 Data Privacy Legal Hack-A-thon

This is an unprecedented year documenting our loss of Privacy. Never before have we needed to stand up and team up to do something about it.   In honour of Privacy Day, the Legal Hackers are leading the charge to do something about it, inspiring a two-day international Data Privacy Legal Hackathon. This is no ordinary event. Instead of talking about creating privacy tools in theory, the Data Privacy Legal Hackathon is about action! A call to action for tech & legal innovators who want to make a difference!

We are happy to announce a Data Privacy Legal Hackathon and invite the Kantara Community to get involved and participate.  We are involved in not only hosting  a Pre-Hackathon Project to create a Legal Map for consent laws across jurisdictions, but the CISWG will also be posting a project for the Consent Receipt Scenario that is posted in on the ISWG wiki.

The intention is to hack Open Notice with a Common Legal Map to create consent receipts that enable ‘customisers' to control personal information If you would like to get involved in the hackathon, show your support, or help build the consent receipt infrastructure please get involved right away -- you can get intouch with Mark (dot) Lizar (at)gmail (dot) com, Hodder (at) gmail (dot) com, or join the group pages that are in links below.

Across three locations on February 8th & 9th, 2014, get your Eventbrite Tickets Here: 

* New York City * London, UKSan Francisco *

http://legalhackers.org/privacyhack2014/

This two-day event aims to mix the tech and legal scenes with people and companies that want to champion personal data privacy.   Connecting entrepreneurs, developers, product makers, legal scholars, lawyers, and investors.

Each location will host a two-day judgedhacking competition with a prize awarding finale, followed by an after-party to celebrate the event. 

The Main Themes to The Hackathon Are:

  • Crossing the Pond Hack
  • Do Not Track Hack
  • Anti-Surveillance & Transparency Hacks
  • Privacy Policy Hack
  • Revenge Porn Hack

There are pre-hackathon projects and activities. Join the Hackerleague to participate in these efforts and list your hack:

Sponsorship Is Available & Needed

Any organization or company seeking to show active support for data privacy and privacy technologies is invited to get involved. 

  • Sponsor:  prizes, food and event costs by becoming a Platinum, Gold or Silver Sponsor
  • Participate:  at the event by leading or joining a hack project
  • Mentor:  projects or topics that arise for teams, and share your expertise.

 

Contact NYC sponsorship:            Phil Weiss email or @philwdjjd      

Contact Bay Area sponsorship:     Mary Hodder -  Hodder (at) gmail (dot) com  -  Phone: 510 701 1975

Contact London sponsorship:        Mark Lizar - Mark (dot) Lizar (at)gmail (dot) com  - Phone: +44 02081237426 - @smarthart

 

 

 

 

 

The Information Sharing Working Group is happy to announce that we have now officially changed our name from the ISWG to the Consent and Information Sharing Work Group (CISWG). 

This enlarges the scope of the ISWG workgroup to include consent with information sharing. We welcome this additional mission to produce a consent schema for information sharing. 

In every privacy legislated jurisdiction, consent is a requirement. In society, consent is what regulates all of us so that we can interact in proactive and collaborative ways.  Right now, the broken and outdated policy and infrastructure we use is broken on all sides of these agreements.  It works less and less to help people understand what will happen with their data, and less and less to regulate the one sided nature of those agreements.  The infrastructure for people to express preferences and protect their own data is missing from the people side of the infrastructure. 

The CISWG Charter has been updated to reflect this scope, and we invite any Work Groups whether at Kantara, or outside, and projects that deal with consent to get in touch. Our first consent project will create a Consent Legal Map and Schema. We would love to hear about projects doing similar work, and we are open to participation and collaboration with other projects working on this task. 

If you do any consent work, or have some consent requirements, we want to hear about those. In fact, the CISWG Wiki is setup for adding scenarios for both Information Sharing and Consent use cases and projects. 

We have calls every second Tuesday for the Consent project and our next call is on Tue Jan 28 at 5pm UK, 12 New York, 9AM PT, if you are interested in dropping in.  If you want  join the group, to lurk as a non-voting member, or be actively involved you are more than welcome.  you can find all the infomration you need on the Information Sharing Wiki. https://kantarainitiative.org/confluence/display/infosharing/Home

 

 

=

 

  • No labels