- From: Mark Lizar <info@smartspecies.com>
- Date: Thu, 17 May 2012 15:47:10 +0100
- To: "public-privacy (W3C mailing list)" <public-privacy@w3.org>
- Cc: runnegar@isoc.org
- Message-Id: <493EC41A-30B6-40EA-948F-F89967529A80@smartspecies.com>
Christine and Tara, After some thought I think privacy consideration document is a great starting point! > > 2. Share your ideas for goals for a privacy considerations document, > useful resources to draw from, and help us build an outline for what > such a document should look like via this email list or on the wiki > at http://www.w3.org/wiki/Privacy/Privacy_Considerations. > I have two suggestions I would ask PING to consider. The first is to explore a more functional ontology for the standard development of privacy considerations. The second is the exercise of exploring how a more practical core ontology could provide functional benefits that independently address privacy considerations in context. (Note; It is my personal opinion that a lack of clear and appropriate ontology in relation to Privacy and Public policy is due to a lack of an appropriate ontology that can connect the technical, legal, and socially explicit contexts of privacy to an over arching framework that will serve public policy.) 1. There are many ontological approaches that can be explored. Privacy is often described as a poor choice ontologically as it varies in meaning, the meaning changes over time, and means different things depending on culture and context. Perhaps a better ontological choice would be to explore the use of 'Surveillance' or surveillance considerations. Building on the Privacy Consideration for Internet Protocols by Cooper et al, which in section 3.2.1.1. Surveillance, is presented as a primary privacy/ security threat, although the definition of surveillance in this paper seems to me to be overtly sociological. I would suggest that surveillance start to be further defined technically as communications surveillance and information surveillance. If further social privacy considerations of privacy are in scope I would suggest that the state and scope of surveillance be quantified for example; retro-active, re- active, passive etc. In addition, in the Privacy Considerations document in section 3.2. Privacy Threats it states; If a data subject authorizes surveillance of his own activities, for example, the harms associated with it may be significantly mitigated. This is what would seem to distinctively refer to as sub-category of surveillance in which volunteered information sharing can be categorized. Socially, people want simple transparency over what the control of sharing information they have, (which is usually a protocol feature), and what control they dont have. A this time this information is inappropriately buried in unstandardized privacy policies etc. and hence not transparent and useful in context. (therefore has little contextual integrity) Building on the privacy by design approach, surveillance as a core ontology would provide a much more useful technical, legal and social ontology than privacy. From such a suitable core ontology the issues of storage security, intrusion, data minimization, retention, correlation, identification, accountability, etc. can be addressed with appropriate privacy considerations. Once structured together this could be reffered to as the surveillance policy (or if not surveillance another more appropriate ontological policy, as oppose to the existing privacy policy ontology which is commonly now used as a source of great obsfucation). 2. An approach to understanding if another ontological approach (to that of privacy) would be useful may be to explore what practical benefits would be possible if such an ontology (such as surveillance considerations) was pursued in a the privacy considerations document. In the context of these suggestions I thought I would take a stab at postulating some benefits. Hypothetically, if it were a standard practice to prodcue privacy considerations with the surveillance ontology, a protocol architect would then be required to list the known surveillance properties and the intended information sharing properties of a protocol for architectural consideration. This list could then form the foundation for the technical surveillance policy to accompany the protocol. It is conceivable that such a policy would then be passed along to others in the architectural development and as a surveillance issues was raised or found this would then be added to the appropriate part of the policy, according to the formalized ontology. A privacy impact assessment could then be performed for each ontological branch and a standard policy notice produced that could address legal, technical, and social privacy considerations. At the risk of taking this suggestions one step to far, I would like to postulate how privacy considerations might be useful and provide contextual integrity(as defined by Nissenbaum). If for instance this became the dominant ontological policy format for privacy considerations it would be concievable that an individual would be able to look at the privacy considerations of multiple protocols, services, etc. in the context of their use. Standard notification would then become possible (as privacy notices at this time are not standard) transparency could then become a part of the usability and the contextual use of the technology. In such a scenario the independent development (or privacy by design approach) would greatly enhance the use of privacy considerations as an independant source of information rather than complete dependance currently found upin the provider of the service or technology in use. > 3. Please let us know which W3C groups and external privacy-related > groups you participate in, and how the work being undertaken in > those groups might relate to PING's work. > I am an active member of the Kantara Privacy & Public Policy (P3) WG, and the Information Sharing Work Group (ISWG). In P3 the work group is working towards Privacy Assessment Criteria for Federated Identity Management, in ISWG the work group is currently working on a standard contract format for volunteered personal information and also working on Information Sharing Labels > All other ideas are most welcome. > The development of a standard practice for listing the surveillance and intended information sharing aspects of protocal and architecture design in a common location. With the intent of developing a standard infrastructure for notification, consent and end to end transparency. > Christine and Tara Kind Regards, Mark Lizar
Received on Thursday, 17 May 2012 14:49:02 UTC