W3C home > Mailing lists > Public > public-tracking@w3.org > March 2012

Re: Best Practices for Outsourcing (ACTION-47, ISSUE-49)

From: Jonathan Mayer <jmayer@stanford.edu>
Date: Fri, 16 Mar 2012 19:31:00 -0700
Cc: Vinay Goel <vigoel@adobe.com>, Tracking Protection Working Group WG <public-tracking@w3.org>
Message-Id: <F7934C1F-86A6-4FF2-B5AC-0DFCB27A53E1@stanford.edu>
To: "Roy T. Fielding" <fielding@gbiv.com>
I'm no expert in W3C lingo, so let me explain what I want the language to do.

As written, the outsourcing operative text requires "reasonable" technical precautions.  In many legal contexts, especially related to electronic privacy and security, "reasonable" has been read as a near-nullity.  (For example, "as long as reasonably necessary" retention limits.)  I don't want that to happen here, and I think we had consensus in Santa Clara that that's not the intent.

This text gives some contours to what we have in mind by "reasonable."  It is non-normative in that it does not require any particular technical implementation.  But it is also not merely a collection of best practices - the standard would require use of technologies that have similar privacy properties to these examples.

Jonathan

On Mar 16, 2012, at 5:50 PM, Roy T. Fielding wrote:

> On Mar 16, 2012, at 10:30 AM, Jonathan Mayer wrote:
> 
>> At the Santa Clara meeting we debated whether to mandate specific technical requirements for the outsourcing exception.  The compromise consensus was to call for "reasonable" measures and give implementers guidance in a non-normative section.
> 
> Hi Jonathan,
> 
> Saying "you should do" is a normative statement, regardless of
> where it appears or whether or not the word should is in uppercase.
> As such, standards editors are instructed not to use it within
> non-normative sections except when the subject is clearly not a party
> to the standard.  The compliance spec has a few other bugs like that
> which the editors will need to fix once we have fewer options.
> 
> Normally, this kind of text would appear in a Best Practices document,
> separate from the compliance or protocol spec, and be phrased in neutral
> terms like "Here are a set of practices that are believed to preserve
> privacy (or at least limit loss of privacy) ...".  If it was developed
> within the WG, it would be written by subject matter experts -- like
> by the sysops within some of the larger outsourcing orgs.  It could
> also be written up as a paper outside the WG process and referenced as
> non-normative, just like I referenced the KnowPrivacy paper in the
> intro.
> 
> Normally, such best practices are written after the standard has
> reached consensus.
> 
> 
> Cheers,
> 
> Roy T. Fielding                     <http://roy.gbiv.com/>
> Principal Scientist, Adobe Systems  <http://adobe.com/enterprise>
> 
> 
Received on Saturday, 17 March 2012 02:31:29 UTC

This archive was generated by hypermail 2.3.1 : Friday, 21 June 2013 10:11:26 UTC