- From: David Wainberg <dwainberg@appnexus.com>
- Date: Wed, 18 Jun 2014 17:16:08 -0400
- To: <public-tracking-comments@w3.org>
- Message-ID: <53A20198.1050705@appnexus.com>
In response to the TPWG's call for comments on the TPE, I offer the comments below. Thank you for your consideration of these important issues. Regards, David _The TPE is not a legitimate consensus document_ The TPE cannot reasonably be called the result of a consensus process. Instead, it is the result of overriding the concerns and objections of the main parties who might be expected to implement the specification, i.e. small third-party ad technology companies. Meanwhile, the handful of very large companies who are the primary authors of the specification have ensured they would not be subject to it. As we know, the exclusion of so called "first parties" from the scope of the DNT specification is the result of a deal struck between certain parties present in the early stages of the working group. Under this agreement, the working group has focused the specification on "third parties," who tend to be smaller non-integrated companies. Moreover, to compound this issue, the working group has adopted an excessively broad definition of what constitutes a first party (or "context"). This ensures a result that skews the marketplace without a significant real world privacy benefit. I continue to be perplexed by the W3C's insistence on finalizing a specification just for the sake of getting it done, without regard for the legitimacy of the product, or the real world outcomes. _ The signal cannot be verified_ It is non-controversial that for a signal to be valid it must reflect a user's informed and explicit choice. However, the TPE provides no mechanism for a recipient server of a DNT:1 signal to ensure that a signal is valid. Experience already demonstrates that there will be a high rate of invalid signals as a result of the signals being set by default or injected by intermediaries. The high rate of invalid signals, with no means to distinguish them, will pollute the space, undermine the meaning of the signal, and make it impossible for implementers to support the specification. The W3C, the working group chairs, and the primary authors of the specification are indifferent, and seemingly willing to accept of a high rate of invalid signals, regardless of the source or user intent, regardless of the business impact, and regardless of the overall negative impact on the Internet. (It's worth noting that nearly all of the working group, including the primary authors of the specification and the co-chairs, would not be subject to DNT under this specification's definition of tracking, so would not be negatively impacted by a proliferation of invalid signals.) _The definition of "tracking" is ambiguous_ The terms "set of resources" and "controlled by the same party or jointly controlled by a set of parties," along with the definition of party, are so ambiguous, both individually and together, that it is impossible for prospective implementers to interpret the specification with reasonable certainty. It is, therefore, also impossible for implementers to respond to a DNT signal in a reasonable manner. Here are just some of the questions raised by these ambiguous terms: * What are the elements of control? * What qualifies as joint control? * Does joint control require a contractual relationship? * Does minority investment count as common ownership or joint control? * Does "control" refer to control over the content or the underlying technology service or both? * Does a mobile app store jointly control all of the apps it offers? * Does a website owner control third party content that it embeds its website? * Does the definition really intend that all companies under common ownership could be considered the same party? Take, for example, a company that owns disparate media brands that serve disparate markets around the globe. Under this specification, as long as their relationship is discoverable via a link in a privacy policy, they could collect, share, and use user data across their properties irrespective of a DNT signal, and regardless of whether a reasonable consumer would have any idea the parties are related without digging into the privacy policy. * What about cloud services, such as blogging services or social media? Who is/are the controller(s) of that context? Is it the service provider or the content creator or both? For Joe's Blog hosted by BigBlogService.com, is BigBlogService a/the controller? If so, does that mean that it can collect and use data across all of the thousands or millions of blogs that it hosts? * What about a web hosting company? Does that company have control over all of the sites it hosts? These are complex questions, not easily answered, even in the abstract, much less in the real world where there is an overwhelming diversity of use cases. _The definition of tracking does not belong in the technical specification_ The ambiguity in the definition of tracking points to a fundamental issue with the TPE document: it should not contain this definition at all. The tracking definition is of a legal and policy nature, not technical. It is fraught with ambiguity of the legal and policy variety, not technical. Unlike true technical aspects of the specification, this definition, and its interpretation, creates legal risk. Lawyers, not engineers, will be called upon to interpret it and determine an implementer's TSV response. When this definition was added to the TPE, it was argued that it was necessary to make the TPE a complete, standalone protocol definition. But the effect is just the opposite. This definition in the TPE creates a requirement for significant ancillary clarification. The definition should be removed from the TPE, and defining tracking should be relegated to policy documents. _User agents should be required to support user granted permissions mechanisms_ The protocol cannot succeed if it does not provide elements necessary for a dialog between users and servers. The signal is meant to express a user's preference. Currently the TPE requires UAs to offer only a binary choice, but user preferences are typically not binary, and may vary depending on context and the parties involved. To remedy this gap, a recipient server must be able to request and reliably store a user granted permission, but the TPE currently does not provide for this.
Received on Wednesday, 18 June 2014 21:17:21 UTC