Re: new security/privacy review questions

>> As to first party and third party, I believe there were many many 
>> discussions about this in the Tracking Protection WG, but that they 
>> were specifically for that context.

In the TPWG we also aimed at law-neutral formulations of the key terms 
[1,2]. As to first and third party, e.g., in the US first and third 
party relates more to a service provider model whereas in the EU this 
relates to data controller/data processor or joint controllership.

Rob

[1] 
http://www.w3.org/2011/tracking-protection/drafts/tracking-compliance.html#first-party
[2] 
http://www.w3.org/2011/tracking-protection/drafts/tracking-compliance.html#third-party

Christine Runnegar schreef op 2015-07-03 13:28:
> Yes, welcome Tiffany, and thank you for sharing your views.
> 
> Indeed, the scope of privacy and data protection laws (i.e. the
> definition of “personal data/personal information”) varies depending
> on the jurisdiction.
> 
> A common, but not universal definition is:
> 
> “any information [relating to/about] an identified or identifiable 
> individual”
> 
> (found, for example, in the OECD Privacy Guidelines, Council of Europe
> Convention 108 and APEC Privacy Framework)
> 
> My personal preference is not to use “PII”, but rather, “personal
> data” or “personal information”, as needed.
> 
> As much as possible, we should try to be “law-neutral” in our approach.
> 
> Our goal is to help Web specifications authors consider privacy
> implications and choose privacy-enhancing design choices. To do this,
> we need to use language that makes sense for that audience. This is
> often why we see discussions about “identifiers”, “permissions”,
> “fingerprinting”, “persistence”, “same-origin”, “user agent”, etc.
> Also, as some of the key privacy-decision points may occur at
> implementation, it is useful to include guidance for implementors, as
> appropriate.
> 
> As to first party and third party, I believe there were many many
> discussions about this in the Tracking Protection WG, but that they
> were specifically for that context.
> 
> Generally, however, the language typically revolves around “origin”,
> “same origin” and “cross-origin”. However, I will leave this to others
> to explain in more detail.
> 
> Christine
> 
>> On 2 Jul 2015, at 5:48 pm, Katie Haritos-Shea GMAIL 
>> <ryladog@gmail.com> wrote:
>> 
>> Welcome Tiffany!  Your English is great….:-)
>> 
>> 
>> 
>> * katie *
>> 
>> Katie Haritos-Shea
>> Senior Accessibility SME (WCAG/Section 508/ADA/AODA)
>> 
>> Cell: 703-371-5545 | ryladog@gmail.com | Oakton, VA | LinkedIn Profile 
>> |Office: 703-371-5545
>> 
>> From: Tiffany DUMAS [mailto:tiffany.dumas@live.com]
>> Sent: Thursday, July 2, 2015 4:17 AM
>> To: public-privacy@w3.org
>> Subject: Re: new security/privacy review questions
>> 
>> Hi Everybody,
>> 
>> I'm a new in this mailinglist and I feel very honoured that you agreed 
>> me. I'm a french attorney passionate and concerned about privacy 
>> issues, so please excuse me for my bad english and my ignorance of US 
>> law...
>> 
>> I agree that the specifications should use terms that are not to much 
>> related to a national legislation and are more neutral to be more 
>> understandable for everybody. "PII" is to close to US Law and  
>> "Personal Data" maybe to close to EU law. However comparing the french 
>> and european definition of Personal Data to the definition you give of 
>> PII in this specifications, both concepts seems to me quite similar:
>> 
>> legal definition of Personal data according to EU directive of 1995 
>> about personal data is: "'personal data' shall mean any information 
>> relating to an identified or identifiable natural person ('data 
>> subject'); an identifiable person is one who can be identified, 
>> directly or indirectly, in particular by reference to an 
>> identification number or to one or more factors specific to his 
>> physical, physiological, mental, economic, cultural or social 
>> identity".
>> 
>> In other words a personal data is also a data that at first sight 
>> isn't personally identifying but becomes personally identifying when 
>> it's combined or crossed with an other data and as a result permits to 
>> identify a person (for example a cookie identifier crossed with a 
>> browser history).
>> 
>> On the other hand what is not defined in this specifications and seems 
>> for me not clear is what you understand under "First" and "Third"- 
>> Party? Talking about this in France with developpers, it is a real 
>> debate. As a lawyer I understand strictly that first party are 
>> exclusively components controlled by the controller (the direct person 
>> I think, as an user, I'm talking to and who defines legally the 
>> purposes and the collecting of data) and a third party is any other 
>> person outside of this relationship, even if the third party has been 
>> authorised by the controller but the processing of data isn't 
>> completely controlled by the controller (so it materially can't be 
>> under his direct authority, for example collected data by Google 
>> Analytics).
>> 
>> Hereafter the legal definition of Third Party according to EU 
>> directive of 1995 : "'third party' shall mean any natural or legal 
>> person, public authority, agency or any other body other than the data 
>> subject, the controller, the processor and the persons who, under the 
>> direct authority of the controller or the processor, are authorized to 
>> process the data".
>> 
>> For the developpers I was talking with, they understand that a Third 
>> party is only a person which wasn't  authorised by the controller.
>> 
>> What is your position?
>> 
>> Regards,
>> 
>> <image001.png>
>> Le 01/07/2015 22:43, Katie Haritos-Shea GMAIL a écrit :
>>> I think this is a very good first pass, however, I think that we 
>>> should give the localized name as (e.g, ?) after the 
>>> internationalized term.
>>> 
>>> As and example:
>>> 
>>> Where you have “high-value data” I ould like to see (e.g, PII, 
>>> <whatever PII is referred to elsewhere>, PIFI, PHI) – so that users 
>>> in each country can better understand what is being said……..
>>> 
>>> * katie *
>>> 
>>> Katie Haritos-Shea
>>> Senior Accessibility SME (WCAG/Section 508/ADA/AODA)
>>> 
>>> Cell: 703-371-5545 | ryladog@gmail.com | Oakton, VA |LinkedIn Profile 
>>> | Office: 703-371-5545
>>> 
>>> From: Greg Norcie [mailto:gnorcie@cdt.org]
>>> Sent: Wednesday, July 1, 2015 4:22 PM
>>> To: Greg Norcie
>>> Cc: public-privacy (W3C mailing list)
>>> Subject: Re: new security/privacy review questions
>>> 
>>> Also I went through and made a pass at removing the instances of 
>>> "PII" and replacing with more inclusive language.
>>> 
>>> On Wed, Jul 1, 2015 at 4:20 PM, Greg Norcie <gnorcie@cdt.org> wrote:
>>>> Hi Frank,
>>>> 
>>>> Please send your feeback to the list so it can be discussed.
>>>> 
>>>> Thanks for the help!
>>>> 
>>>> On Wed, Jul 1, 2015 at 4:17 PM, Dawson Frank (Nokia-TECH/Irving) 
>>>> <frank.dawson@nokia.com> wrote:
>>>>> PS…
>>>>> 
>>>>> Under §4 Mitigations, it occurred to me that another mitigation is 
>>>>> “data minimization”. An example was in work that ex-colleague 
>>>>> Frederick Hirsch did in Devices API work. For example, on 
>>>>> addressbook lookup, rather than allow functionality of API to 
>>>>> transfer full addressbook entry via an identifier, you had to 
>>>>> access entry and retrieve partial information, parameter by 
>>>>> parameter, out of the entry. This data minimization decreased the 
>>>>> attack surface of the API by limiting amount of entry that could be 
>>>>> retrieved at once.
>>>>> 
>>>>> Another would be the classic “Privacy by Default”. For example, 
>>>>> when you would use WebRTC to open a video connection, the 
>>>>> microphone and video sensors should be muted and privacy lid 
>>>>> enabled by default.
>>>>> 
>>>>> Another would be “Contexual or Timely User Control” (you might have 
>>>>> better term). In the same example as previous, user should have 
>>>>> ability to toggle off microphone and video, on-demand, even if 
>>>>> consent has already been granted for the session.
>>>>> 
>>>>> From: ext Greg Norcie [mailto:gnorcie@cdt.org]
>>>>> Sent: Wednesday, July 01, 2015 10:27
>>>>> To: Dawson Frank (Nokia-TECH/Irving)
>>>>> Cc: public-privacy (W3C mailing list)
>>>>> Subject: Re: new security/privacy review questions
>>>>> 
>>>>> Hi Frank,
>>>>> 
>>>>> Thanks for the input. I definitely agree we should try to remove US 
>>>>> centric language. I can try to go through and be a little more 
>>>>> general, but it might be useful for a non-US person to make a pass 
>>>>> as well.
>>>>> 
>>>>> I will make a second pass today and try to alter anything that 
>>>>> seems especially tied to US law.
>>>>> 
>>>>> Also, while I'm sure there are many techniques aside from 
>>>>> questionnaires that can be used when reviewing a new standard, I 
>>>>> think for right now we'll focus on refining the questionnaire - 
>>>>> other techniques can certainly be developed to supplement the 
>>>>> questionnaire once it is mature.
>>>>> 
>>>>> (The addition of new sections would be something that probably 
>>>>> should be saved for discussion in Prague)
>>>>> 
>>>>> I'll send out a revised question set with revised language later 
>>>>> today.
>>>>> 
>>>>> -Greg
>>>>> 
>>>>> On Wed, Jul 1, 2015 at 10:50 AM, Dawson Frank (Nokia-TECH/Irving) 
>>>>> <frank.dawson@nokia.com> wrote:
>>>>>> Hei Greg.
>>>>>> 
>>>>>> Looks like a hard crowd to please at SOUPS events J
>>>>>> 
>>>>>> SOUPS acceptance rates: 2005: 10/39 (25%); 2006: 14/39 (35%); 
>>>>>> 2007: 12/41 (29%); 2008: 13/43 (30%); 2009: 15/49 (30%); 2010: 
>>>>>> 16/65 (24%); 2011: 15/45 (33%); 2012: 14/67 (20%); 2013 15/51 
>>>>>> (29%)
>>>>>> 
>>>>>> At least maybe you can escape the heat/humidity of summer time in 
>>>>>> DC for a while.
>>>>>> 
>>>>>> I looked at the questionnaire that you Joe and Mike updated. Have 
>>>>>> you read PRIPARE paper from IWPE15 event on goal-based versus 
>>>>>> risk-based approaches to analyzing privacy impact? Net-net is that 
>>>>>> both approaches are important and a hybrid of the two makes for 
>>>>>> better privacy engineering.
>>>>>> 
>>>>>> The questionnaire approach is good when system is well known and 
>>>>>> true table of knowledge exists for problem determination and 
>>>>>> solution selection (e.g., A380 engine #4 shows fire light, what to 
>>>>>> do). But with the privacy impact analysis for new web technologies 
>>>>>> this might not be the case.
>>>>>> 
>>>>>> I was wondering if the questionnaire might be complemented by some 
>>>>>> additional section with more systematic guidance. For example, 
>>>>>> pre-analysis work involving assembly by editors of worksheet with 
>>>>>> data inventory that can be used for analysis of the data flows 
>>>>>> involved. Attached is an example, but this could be specified in 
>>>>>> other ways than XLS, such as questions. Obviously, the attached 
>>>>>> example columns are specific to a deployment of a standard (ie, 
>>>>>> implementation or product) but can be generalized to capture the 
>>>>>> more generic nature that a W3C web specification would creation.
>>>>>> 
>>>>>> Also, the questionnaire could be supplemented by a suggested PII 
>>>>>> classification scheme. I prefer the Paul Schwartz/Daniel Solove 
>>>>>> “PII 2.0”, as is incorporated into the XLS attached.
>>>>>> 
>>>>>> Lastly, the W3C specifications are for a global web, but the 
>>>>>> vocabulary in the questionnaire is very US specific (eg, use of 
>>>>>> PII over Personal Data). Why not go for a more international 
>>>>>> vocabulary (eg, EU GDPR that is being copied by regional 
>>>>>> jurisdictions other than US or ISO 29100/Privacy Framework which 
>>>>>> PDF is freely available from ISO).
>>>>>> 
>>>>>> Additionally, the questionnaire could be enhanced by a Privacy 
>>>>>> Recommendations section that listed a set or catalog of 
>>>>>> principles, controls, implementation criteria. The set would be 
>>>>>> something that would grow as experienced identified further 
>>>>>> patterns for best practice. The sectorial standards for the ISO 
>>>>>> 27001-series for Information Security Management Systems provides 
>>>>>> in ISO 27009 guidance on how this would be formatted.
>>>>>> 
>>>>>> x Data Stewardship
>>>>>> 
>>>>>> x.1 Data inventory
>>>>>> 
>>>>>> Control: Personal data collected, processed, stored, transferred 
>>>>>> or managed by the specification is identified and classified 
>>>>>> according to its purposes, personal data category, security 
>>>>>> category, retention/deletion recommendation…
>>>>>> 
>>>>>> Implementation guidance: Sensitive categories of personal data 
>>>>>> should be encrypted when transferred and consideration given on 
>>>>>> encryption when at rest/stored.
>>>>>> 
>>>>>> Frank/
>>>>>> 
>>>>>> From: ext Greg Norcie [mailto:gnorcie@cdt.org]
>>>>>> Sent: Tuesday, June 30, 2015 20:51
>>>>>> To: Christine Runnegar
>>>>>> Cc: public-privacy (W3C mailing list)
>>>>>> Subject: Re: new security/privacy review questions
>>>>>> 
>>>>>> Hi all,
>>>>>> 
>>>>>> Joe's out of the office this week, but I spoke with him before he 
>>>>>> left, and he will be at IETF in Prague.
>>>>>> 
>>>>>> I'd love to join him, but I had made plans to attend SOUPS in 
>>>>>> Ottawa during that time prior to this idea being raised. (But if 
>>>>>> anyone will also be at SOUPS I'd be happy to chat)
>>>>>> 
>>>>>> If anyone has feedback between now and then, please feel free to 
>>>>>> share it with the list and I will iterate on the current question 
>>>>>> set.
>>>>>> 
>>>>>> On Tue, Jun 30, 2015 at 7:52 AM, Christine Runnegar 
>>>>>> <runnegar@isoc.org> wrote:
>>>>>>> Thank you Greg and Joe for all your work on this.
>>>>>>> 
>>>>>>> One suggestion at the PING call last week is to use at least some 
>>>>>>> of the time at the PING meeting alongside IETF (Thursday 23 July 
>>>>>>> - during the lunch break) to progress this work further.
>>>>>>> 
>>>>>>> In the meantime, everyone, please continue to share your thoughts 
>>>>>>> on the draft as well as the feedback from Greg and Joe.
>>>>>>> 
>>>>>>> Christine and Tara
>>>>>>> 
>>>>>>> > On 24 Jun 2015, at 3:34 pm, Greg Norcie <gnorcie@cdt.org> wrote:
>>>>>>> >
>>>>>>> > Hi all,
>>>>>>> >
>>>>>>> > Myself and Joe Hall been working on a rewrite of the TAG security questionaire[1], which incorporates privacy concerns as well as security concerns. (For example, we include some of the questions raised by Nick in his privacy questionnaire.[2])
>>>>>>> >
>>>>>>> > We also split the questionnaire into a security section and a privacy section (with the implication all new standards should enumerate their privacy impacts as well as their security impacts.)
>>>>>>> >
>>>>>>> > The goal is that for each question, there will eventually be an explanation and a concrete, real world example.
>>>>>>> >
>>>>>>> > [1] https://w3ctag.github.io/security-questionnaire/
>>>>>>> > [2] https://lists.w3.org/Archives/Public/public-privacy/2013AprJun/0004.html
>>>>>>> >
>>>>>>> > I've attached a .odt outlining our proposed questions, as well as a PDF in case you don't have an ODT capable editor installed. (I recommend Libreoffice)
>>>>>>> > --
>>>>>>> > /***********************************/
>>>>>>> > Greg Norcie (norcie@cdt.org)
>>>>>>> > Staff Technologist
>>>>>>> > Center for Democracy & Technology
>>>>>>> > 1634 Eye St NW Suite 1100
>>>>>>> > Washington DC 20006
>>>>>>> > (p) 202-637-9800
>>>>>>> > PGP: http://norcie.com/pgp.txt
>>>>>>> >
>>>>>>> > Fingerprint:
>>>>>>> > 73DF-6710-520F-83FE-03B5
>>>>>>> > 8407-2D0E-ABC3-E1AE-21F1
>>>>>>> >
>>>>>>> > /***********************************/
>>>>>>> > <PingPrivSecQs..pdf><PingPrivSecQs.odt>
>>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> --
>>>>>> /***********************************/
>>>>>> Greg Norcie (norcie@cdt.org)
>>>>>> Staff Technologist
>>>>>> Center for Democracy & Technology
>>>>>> 1634 Eye St NW Suite 1100
>>>>>> Washington DC 20006
>>>>>> (p) 202-637-9800
>>>>>> PGP: http://norcie.com/pgp.txt
>>>>>> 
>>>>>> Fingerprint:
>>>>>> 73DF-6710-520F-83FE-03B5
>>>>>> 8407-2D0E-ABC3-E1AE-21F1
>>>>>> 
>>>>>> /***********************************/
>>>>> 
>>>>> 
>>>>> 
>>>>> --
>>>>> /***********************************/
>>>>> Greg Norcie (norcie@cdt.org)
>>>>> Staff Technologist
>>>>> Center for Democracy & Technology
>>>>> 1634 Eye St NW Suite 1100
>>>>> Washington DC 20006
>>>>> (p) 202-637-9800
>>>>> PGP: http://norcie.com/pgp.txt
>>>>> 
>>>>> Fingerprint:
>>>>> 73DF-6710-520F-83FE-03B5
>>>>> 8407-2D0E-ABC3-E1AE-21F1
>>>>> 
>>>>> /***********************************/
>>>> 
>>>> 
>>>> 
>>>> --
>>>> /***********************************/
>>>> Greg Norcie (norcie@cdt.org)
>>>> Staff Technologist
>>>> Center for Democracy & Technology
>>>> 1634 Eye St NW Suite 1100
>>>> Washington DC 20006
>>>> (p) 202-637-9800
>>>> PGP: http://norcie.com/pgp.txt
>>>> 
>>>> Fingerprint:
>>>> 73DF-6710-520F-83FE-03B5
>>>> 8407-2D0E-ABC3-E1AE-21F1
>>>> 
>>>> /***********************************/
>>> 
>>> 
>>> 
>>> --
>>> /***********************************/
>>> Greg Norcie (norcie@cdt.org)
>>> Staff Technologist
>>> Center for Democracy & Technology
>>> 1634 Eye St NW Suite 1100
>>> Washington DC 20006
>>> (p) 202-637-9800
>>> PGP: http://norcie.com/pgp.txt
>>> 
>>> Fingerprint:
>>> 73DF-6710-520F-83FE-03B5
>>> 8407-2D0E-ABC3-E1AE-21F1
>>> 
>>> /***********************************/
>> 

Received on Friday, 3 July 2015 12:11:37 UTC