Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Privacy as Expected is a legal standard, explained technically here as a notice signalling protocol for the managing human expectation for personal data processing.

Signalling Protocol for the Active State

...

of Transparency and Control

https://privacy-as-expected.org/

...

In the PaE.G project we specify the use of the Active State Transparency Privacy Risk signal for use with web browsers and demonstrated transparency over   the  the active state of the PII Controller in order to present a privacy as expected signal, which include disclosures,  to managed what people can  expect.  If people object, the The PasE protocol can be used is designed to implement operational transparency over access to privacy rights, as a default,  and usable so that an invidiual individual can directly manage their own privacy expectations.  

What is the Challenge?

The internet (full of restful api's) is missing the active state , or context of a verified organization and its accountable person, also known as the privacy controller credential (see ToiP) , which is an online privacy security measure, especially for  context of people, and most identity management efforts are about activating the identifier for the individual. Representing the  signalling gap required to indicate a level of (trustworthiness)/transparency - independent of the service provider.  Specific to context.  An online privacy policy or static document doesn't provide active state information about the legal entity, purpose and context of use's identity management system.  

T&C's and their association online privacy policies dont implement privacy rights, and are not written with standards.  Currently what is called An online privacy policy is a static document that facilitates contract of adhesions and ignores data soverignty and providence.    It is not useable to enable dynamic use of privacy rights, as it is missing the active privacy state information required to use rights.   All of which is required in privacy legislation globally and a core considerations for security standards in one way or another. 

For this challenge we have a simple but very powerful technology called a receipt.  Which is a notice of a record for an active state, for example, a record of transaction can be capture with a receipt.  this technology was developed when shipping goods so the receiver could see if the stock received was the same as the stock shipped. 

In essence, it is this technology that is advance for active state for online services, which like money on a credit card is invisible to the person in context.  The receipt fulfils the same purpose of a record and it required an international standard so that it can be used across technical, legal and social domains. 

...


 NGI-Trust - PasE:CG Project Contribution

NGI - Trust project - , we focused on developing a privacy rights signalling protocol that is human centric (which means notice based) to implement a protocol that can leverage multiple, standards  ISO/W3C/Kantara/ToiP standards  and specifications for , which are semantically interoperable,  for contribution to the this Consent Receipt v1.2 Framework  at the Kantara Initiative ANCR WG.  

...

The PasE protocol implements international (ISO/IEC) standard semantics from the open ISO/IEC 29100 and W3C DPV Data Privacy Vocabulary legal ontology,  to generate semantically standardized and linked record.  A record the person owns and controls that is used to produce consent notice receipts the first time a person interacts with or provides a digital identifier to a data controller via an online service, by creating an ANCR record.. Consent Notice Receipts, (published in the appendix of ISO 29184: Online privacy notice and consent standard.  This protocol is implemented as a demo for this projects, and used  the first time a browser add-on interacts with a website data controller  by creating an ANCR record of the controller of the website for automating access to privacy rights. 

Privacy as Expected Signalling

PasE protocol is displayed as a signal the next time a Data Subject uses the same service online, (or encounters the same data controller online).   Each  Using a traffic light colours, green means there is no change in the active state of control, yellow means there was a non-material change (and a notification is waiting), Red means there is a material change, and a notice must be reviewed and accepted to continue using the service. 

Its simple for people, each new session interaction creates a linked consent notice receipt, which is compared against the previous receipt, to show a signal to indicate if privacy is as expected, or not.   .   Thus providing a point to interact and access the use of privacy rights. 

How it works:

The PasE protocol is implemented with a notice and notification best practice called 2 Factor Notice for Online Online Meaningful  Consent (2FC).  Demonstrated with a browser add-on in the NGI-PasE Consent Gateway project.  A first layer notification signal that is visual and accessible in context. 

If privacy is as expected the receipt is used to signal a green light in order to streamline the service experience.  The receipt works like a reverse cookie (is an ANCR record owned by the individual), eliminating the need for services to provide repetitive notices, notifications, or to make people read privacy policies to see what their rights are.        As right preferences are kept by the person and asserted in context for more dynamic control of data sharing. 

First Factor 

The first factor notice is provided by the PasE add-on, implementing standardized Notice semantics via the browser (independent of service providers).  The first notice presented confirms, or registers the identity of data controller with a Consent Gateway. 

  • The Consent Gateway API, is called to validate the authenticity of notice of the controller (Data Controller identity and contact)  inorder to validate the first factor notice receipt. 

Second Factor

The second factor notice is a capture of the websites privacy notice upon Data Subject interaction (or personal data provision).  e.g. an I agree, submit, cookie notice, privacy policy link, etc. This second factor interaction generates the consent notice receipt  that is sent to the Consent Gateway to be notarized, before being sent to the Data Controller as a privacy rights notice. 

Monitoring Conformity Assessment

The response performance of the Data Controller is measured and reported by the gateway back to the Data Subject when the next receipt for this Data Controller is sent to be verified. Along with any notification of changes to the privacy status of the data controller (as monitored by the Consent Gateway) and the service’s data controller with whom the Data Subject is interacting with.  Thus providing a signal for the discovery  point for privacy notice and rights knowledge, reporting, monitoring and access. 

The result, people are able to see if access to privacy is a  risk and how/who is controlling their personal data with this protocol and as a result be able to asser privacy rights in context, and when instructed,  automagically, independent of the service provider t&c’s.   .   

To complete the project the PasE protocol is contributed back to the Kantara Initiative ANCR WG, where the PasE protocol will be published under a FRAND license.  The protocol is then able to include controls from ISO/IEC 29184, Online Privacy Notice & Consent”  which are then implemented in notice, notifications and disclosures with the W3C Data Privacy Control Vocabulary.  

And finally, contributed as comments via a Kantara Liaison agreement to ISO/IEC 27560 Consent Record Structure Standard (for receipts) by Aug 16, in comments via the Kantara Liaison for working draft 3. 

UI : Basic Active State - Visual Signal Specification 

...

a person generates  a notice receipt for an online website based interaction, and then when returning to this website,  generates another receipt.  The 2 receipts are compared for changes in the known active state.    This then provides the active state signal to indicate if privacy is as expected, (or not). 

  • if the signal is green - their is no need for a cookie notice or privacy ritual 

  • if the signal is yellow - then legally a notice is required to be provided, the person can ignore, accept, refuse these notices 
  • if the signal is red - then a notice is legally required to maintain system permissions and to manage a consent (which is technical no longer valid) for example a data breach. 

...

 Overview Privacy as Expected : Consent Gateway

In this document there is the principle reference and any new/proposed principles for the use of receipts for Active State Transparency with Semantically Standardized Governance language. 

The aim of the PaeCG signalling protocol is to extend existing digital identity security and privacy governance schemes with an overarching privacy operator risk and liability scheme that meets legal and social, security, privacy and surveillance expectations. 

This project is named to indicate a common and standardizable path for a consent gateway for browsers and services online to display an active state of legal entity transparency the standards and law providing a common language for broadcasting. 

Simple in mechanics, the way it works, the first time a notice of the Controller identity is captured it generates an ANCR receipt, which is then linked for any additional receipts for that relationship.  The receipt is identity management/org relationship receipt.  Thisn ANCR receipt is used to provide proof of notice of legal identity, addressing key consent,  provide permission and for a person to manage their own consent.  an identifier relationship is created and tracked, this removes the need to provide the same notice of who the controller is, everytime a person access a website.  

Receipt Signal Protocol

The receipt signal is generated after the first notice is provided and a receipt is stored by the person.  (aka in a Master Identity Controller-plugin) and is usable of a proof of notice.  This first receipt becomes the ANCR receipt id for that relationship for the person and software used for personal data management. 

The next time a person comes to this website, a new notice of controller receipt is generated and then linked to the ANCR receipt ID.  If it is the same state - the signal in the icon will be green, if it is the same legal entity and same surveillance and  policy.  If there is a change, then the icon would be yellow or red, depending on how material the change in status of the legal entity (or more specifically the PII Controller) since the last time the receipt is provided.  Nominally this is defined by scope of the Surveillance and measured by the number of identity management relationships active at any one time. 

 In Context Notifications for identity system permissions

Identity Management Requires that a state change notification for privacy should at a minimum be linked to a log detailing the change using standard (semantics) so that this can automatically be understood by people.  

This protocol is manged with receipts which in the PasECG project is publicly registered with a Consent Gateway so that all stakeholders can see a proof of notice and wether  the consent grant is active, 

When combined with a receipt, this notice can be used to provide an active state signal, that is decentralized and specific to the context and of the person (human centric) view of  the  expected state of Controller of the online service.  This transparency is a universal notice requirement for processing personal data, as it is required in all privacy laws and is required unless there is  a specified legal exemptions and derogations.    Which should be noticed to people as a surveillance risk. 

...

  • Consent Receipt framework to implement PasE communication protocol 
    • Legal Justification and what privacy rights apply for each
    • Purpose Specified with data privacy control vocabulary 
    • record format specified with ISO 29100 
    • notice controls and record specification format ISO 29184 
  • Notice of Control for Online Services Implementing 2FC
    • 2FC 
      • First Factor - Generated standards 
      • Second Factor (link) - existing Factor - the sign or notice or notification form the provider
  • Semantic Standards Stack for Human Centric -  user centric - control semantics

    • usage of the ISO 29100 - roles and definitions for transborder flow of personal data 
      • stakeholders - 
    • usage of ISO 29184 - notice controls and record structure 
    • ISO 27560 - to. generate consent record structure for rights receipt 
    • W3C DPV - legal semantic ontology for notice and notification . 
    • ** In review - 27710
      • requirements against privacy by design and default. 
      • 27550 - Privacy Engineering - C.4 - and C.5 - \
    • Linked Data - Semantics - Human, Legal and Machine Readable framework for expectation management
      • Core Record - or Credential Record for a legal entity
      • Receipt of. notice of credential record 
      • core record id - linked reference id - PII Controller Credential
      • Consent Receipt generated for each purpose specification and linked to anchor record
        • each purpose is specifies by legal justification
        • each purpose specification uses the DPV
    • Security considerations 
      • PII Principal controls the ANCR Record
      • 3rd Party N&C Processor - Network Facilitator 
      • Consent Grant Validation 
        • Status of the PII Controller 
        • Status of the Consent 
        • Scope of Consent Grant Permissions 
        • Privacy Framework Governance 
          • required notice, timing, formats, parties according to Privacy Law
    • Human Centric Privacy RiSK Assessment
      • each, PII Controller shared, identifiers or attributes of the PII Principal is a separate risk factor
      •  impacted by the amount of PII - (digital identifiers and attributes)  Disclosed by the Controller and under what legal frameworks