W3C home > Mailing lists > Public > www-tag@w3.org > May 2012

RE: Privacy Document from IETF

From: Larry Masinter <masinter@adobe.com>
Date: Wed, 16 May 2012 00:40:48 -0700
To: "ashok.malhotra@oracle.com" <ashok.malhotra@oracle.com>, "www-tag@w3.org" <www-tag@w3.org>
Message-ID: <C68CB012D9182D408CED7B884F441D4D194AF27D99@nambxv01a.corp.adobe.com>
I'm sorry, I didn't double check Ashok's note.

In fact, the document I was proposing for TAG reading was a very different document:

                http://tools.ietf.org/html/draft-iab-privacy-terminology

Abstract

   Privacy is a concept that has been debated and argued throughout the
   last few millennia.  Its most striking feature is the difficulty that
   disparate parties encounter when they attempt to precisely define it.
   In order to discuss privacy in a meaningful way, a tightly defined
   context is necessary.  The specific context of privacy used within
   this document is that of personal data in Internet protocols.
   Personal data is any information relating to a data subject, where a
   data subject is an identified natural person or a natural person who
   can be identified, directly or indirectly.

   A lot of work within the IETF involves defining protocols that can
   potentially transport (either explicitly or implicitly) personal
   data.  This document aims to establish a consistent lexicon around
   privacy for IETF contributors to use when discussing privacy
   considerations within their work.

And table of contents:


1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Basic Terms  . . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.  Identifiability  . . . . . . . . . . . . . . . . . . . . . . .  6
     3.1.  Anonymity  . . . . . . . . . . . . . . . . . . . . . . . .  6
     3.2.  Pseudonymity . . . . . . . . . . . . . . . . . . . . . . .  7
     3.3.  Identity Confidentiality . . . . . . . . . . . . . . . . .  8
     3.4.  Identity Management  . . . . . . . . . . . . . . . . . . .  8
   4.  Unlinkability  . . . . . . . . . . . . . . . . . . . . . . . .  9
   5.  Undetectability  . . . . . . . . . . . . . . . . . . . . . . . 11
   6.  Example  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
   7.  Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 13
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 14
   9.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 15
   10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
     10.1. Normative References . . . . . . . . . . . . . . . . . . . 16
     10.2. Informative References . . . . . . . . . . . . . . . . . . 16
Received on Wednesday, 16 May 2012 07:41:22 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Wednesday, 16 May 2012 07:41:22 GMT