RE: For consideration: comments and editing upon review of section 5.4 Constraints on Actions

Jumping in (potentially without full context/consideration) to flag that we have multiple vendor agreements which permit display-only redistribution of data to external parties (clients). Agree we need to additionally be able to distinguish between display-only apps which control user access through unique login credentials versus publically viewable (either internal to GS or externally).

Thanks,

The Goldman Sachs Group, Inc. All rights reserved.
See http://www.gs.com/disclaimer/global_email for important risk disclosures, conflicts of interest and other terms and conditions relating to this e-mail and your reliance on information contained in it.  This message may contain confidential or privileged information.  If you are not the intended recipient, please advise us immediately and delete this message.  See http://www.gs.com/disclaimer/email for further information on confidentiality and the risks of non-secure electronic communication.  If you cannot access these links, please notify us by reply message and we will send the contents to you.

From: Benedict Whittam Smith <ben@deonticdata.com>
Sent: 26 May 2021 12:22
To: laura.perdue@fmr.com; Mark Bird <mark.bird@databp.com>; public-md-odrl-profile@w3.org
Subject: Re: For consideration: comments and editing upon review of section 5.4 Constraints on Actions

Hi Laura,

I take your point on display types.

In my mind, we only have to distinguish between two display types: a terminal that is accessed by one user and a wallboard that shows the data to many..

But is this enough? Is there something in the middle that we need to capture?

In addition, do we need to know, for example, if the wallboard displays only to "Internal Parties" - or can it be in a public space? Or am I just over complicating things?

Ben
________________________________
From: Perdue, Laura <Laura.Perdue@fmr.com<mailto:Laura.Perdue@fmr.com>>
Sent: Friday, May 21, 2021 6:09 PM
To: Mark Bird <mark.bird@databp.com<mailto:mark.bird@databp.com>>; public-md-odrl-profile@w3.org<mailto:public-md-odrl-profile@w3.org> <public-md-odrl-profile@w3.org<mailto:public-md-odrl-profile@w3.org>>
Subject: For consideration: comments and editing upon review of section 5.4 Constraints on Actions


Below for consideration:  comments and editing on 5.4 Constraints on Actions:



Constraints on Actions



display types



Definition:  Classifies the display application as being either for individual use or public display [Question: Is this enough definition?  And I assume this is unrelated to whether an action falls under a display or non-display use case.  Perhaps we should add an editorial note to give an example of "individual use" versus "public display".]



Constraint Values



Market Depth



Note:  Market depth can be qualified to specify the exact depth of market offered by using the position from and position to properties. (See Example 11).  [For ease of reading, add quote marks around "position from" and "position to", or put them in italics.]



Display Type



Scope Note:  Used to constrain a Display action to allow either individual or public presentation.  [Same comment as in "display types" above.  Wondering if we may need to give readers more clarity on the difference between individual and public presentation.]



One more on that page:



Time

Time Instants



There are some moments in time which are of particulat interest and demand definition. The following are especially useful in calculating the timeliness of data.  [Adjust spelling to particular]





Thank you,

Laura







From: Mark Bird <mark.bird@databp.com<mailto:mark.bird@databp.com>>
Sent: Wednesday, May 5, 2021 12:13 PM
To: public-md-odrl-profile@w3.org<mailto:public-md-odrl-profile@w3.org>
Subject: Request for ODRL Specification Reviewers



NOTICE: This email is from an external sender - do not click on links or attachments unless you recognize the sender and know the content is safe.



Hi everyone,



I hope you're week has been pleasant and productive. On last week's ODRL community group call we talked about reviewing the Market Data Profile for ODRL<https://urldefense.proofpoint.com/v2/url?u=https-3A__w3c.github.io_market-2Ddata-2Dodrl-2Dprofile_md-2Dodrl-2Dprofile.html&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=qlMeee1RTi74YN8p0hwZL1n3JVH9oZvt4jnRsbDTd4A&e=> document that is close to being finalized. I'd like to ask for at least two people to sign up to review one of three sections of the document. Of course the more the merrier!



The three sections are:



  *   Parties and Constraints on Parties

     *   2.1 Supply Chain Metamodel - Parties<https://urldefense.proofpoint..com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c.github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523Parties-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547042171-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3Dgd1jZ-252F3kXxNHShpqA2IMzhZ9oZBJzgUNUHjYZTCWVJ0-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=z0Btq24n2itGUys0SaHsZaowmaXAXcNwDlaNSUv1wTo&e=>
     *   2.4 Supply Chain Metamodel - Entities<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c.github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523Entities-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547052136-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3DDI9BQ9GyQLzhH7Uf71pr3BybeNZMyZowEIRFGGbzTlM-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=FoYc3eg68RCaYrn9bubyFJ3817KHoaROIz2Zn6QYrBc&e=>
     *   5.3 Constraints on Rules<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c.github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523ConstraintsOnRules-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547052136-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3DaRZiv8GBqTQVP5EO14-252BevJez6NdF4PjRFgLnlYLPpuc-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=6KdIEXual___4YNZkuAyU9G04lhfc6Un0w1E0rSIBp8&e=>



  *   Resources and Constraints on Resources

     *   2.2 Supply Chain Metamodel - Resources<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c.github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523Resources-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547062087-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3DlPGXOtRTWdFvgCLJ-252Fuu7coxXxzFzJAXthBdzzRZ-252Fxu4-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=R_KJfwuxZKOeP-rtPPNg5lDT2_P7DwFayi1w2WogXvE&e=>
     *   5.1 Constraints on Resources<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c.github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523ConstraintsOnResources-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547062087-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3Dx47Gm2EVmexfbR92nDZ1wqlZJ6uCrdDMitL5u1vR2Dc-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=RcHJgY59DanQaR4Ru2CwzrjnkWJzjx0sEIOhBTHNltM&e=>



  *   Activities and Actions and their Constraints

     *   2.3 Supply Chain Metamodel - Activities<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c.github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523Activities-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547072047-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3D3-252B8JcWLNqFri7Ed2iYWJkhPJ4etRaYeynDbtYYs3Yuc-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=y23m3CahzrIl-sPMePUH0igxQ79GG1dKpt5HFYa6YM4&e=>
     *   3 Permissions<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c.github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523Permissions-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547072047-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3Da06P34i0xM0LHKmnnoDTYlg0OVmpjWWXkI8d-252F8do38o-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=35b_8gEjWbuq0_pBO0MOCaf1eh28PLKPsbJeaDpsmDE&e=>
     *   4 Duties<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c..github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523Duties-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547081997-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3D-252F1WOne9qVsVZR1uIB5twkyk7UYYG-252BJv9-252FqMtbMljR6k-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=0Ytxgzy_s7BqPu4z6-WAiSvDbeAD2iLKZtMn44QQyzU&e=>
     *   5.4 Constraints on Actions<https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fw3c.github.io-252Fmarket-2Ddata-2Dodrl-2Dprofile-252Fmd-2Dodrl-2Dprofile.html-2523ConstraintsOnActions-26data-3D04-257C01-257Cmark.bird-2540databp.com-257Cb616743110fa430520c908d90fe1c062-257Cb96ad7214b2f4c3d890decb8f034c790-257C1-257C0-257C637558284547081997-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C1000-26sdata-3D6ZaH1UgJ-252FlGuTKQU-252B4DXSLBrs3VvCsBJcljBgfmYk6o-253D-26reserved-3D0&d=DwMF-g&c=7563p3e2zaQw0AB1wrFVgyagb2IE5rTZOYPxLxfZlX4&r=JInENxzUdsSF_yYqrzyNRMxzSnLufoT_UNXdhWpifCc&m=i8JJBN7On3iFqFAR_fgCwXsQnl_Lv2ndGeaoYhAcqjw&s=fR654oUKFzwnyIQx3fLVeS0R_cRydDFtrQL8f5yN3m4&e=>



This review task will be relatively light. The goal isn't to identify anything missing or wrong in the specification, but just to highlight areas that might be unclear. You'll be looking for things like definitions that can be clarified or examples that can be tightened up. Taking a stab at updating the text would be great, but even simply calling out spots that need attention will be helpful.



You can email your notes to the group, and we can spend time going over them on next week's call.



If you'd like to sign up for one of the three sections above please let me know on this thread, thanks!



Best,
Mark





Mark Bird | DataBP

14 Wall Street, Suite 4C

New York, NY 10005

Telephone: 917-257-5519

mark@databp.com<mailto:mark@databp.com>



[A picture containing tableware    Description automatically generated]



________________________________

Your Personal Data: We may collect and process information about you that may be subject to data protection laws. For more information about how we use and disclose your personal data, how we protect your information, our legal basis to use your information, your rights and who you can contact, please refer to: www.gs.com/privacy-notices<http://www.gs.com/privacy-notices>

Received on Tuesday, 1 June 2021 05:20:55 UTC