Re: DNT: Agenda for Wednesday call, February 20

A couple of updates for this Wednesday's call:

1.  We will not have slides from Jon Callas on cybersecurity as a permitted use.  After the group finishes discussion of the various action items to assign, I will do a structured Q&A with Jon.  The group will have the chance to ask questions as well.  In the intro, I will say more about why I am making these experts available to the group to discuss actual data handling practices.  The basic idea is to build a factual record on difficult issues, so we can consider proposed standards text with a greater overlap in our understanding of the facts.

2. I have received pushback on the non-techie term "lifetime browsing history."  For the basic idea, I am suggesting the term "truncated URLs" to get at the basic idea.  This sort of truncation is inter-woven, in my view, with the de-identification debate.  At the risk of starting a big long thread of observations from different people on the list, I observe the following: the privacy risk around a database is related to both of these things -- (1) how clearly identified the data is; and (2) how detailed the data is.  De-identification matters less if the data is less granular.  For detailed data, to achieve the same level of privacy risk, the level of de-identification would need to become stricter.

I hope to get people on Wednesday's call to take on action items to draft about de-identificaiton and truncated URLs.

Thank you,


Professor Peter P. Swire
C. William O'Neill Professor of Law
    Ohio State University

From: Peter Swire <<>>
Date: Tuesday, February 19, 2013 12:36 PM
To: "<> WG" <<>>
Subject: DNT: Agenda for Wednesday call, February 20
Resent-From: <<>>
Resent-Date: Tuesday, February 19, 2013 12:36 PM

Wednesday call February 20, 2013


Chair:  Peter Swire

1.  Confirmation of scribe – glad to accept volunteer in advance

2.  Offline-caller-identification:
If you intend to join the phone call, you must either associate your phone number with your IRC username once you've joined the call (command: "Zakim, [ID] is [name]" e.g., "Zakim, ??P19 is schunter" in my case), or let Nick know your phone number ahead of  time. If you are not comfortable with the Zakim IRC syntax for associating your phone number, please email your name and phone number to<>. We want to reduce (in fact, eliminate) the time spent on the call identifying phone numbers. Note that if your number is not identified and you do not respond to off-the-phone reminders via IRC, you will be dropped from the call.

Action Items after Boston Face-to-Face

3.   The basic work plan coming out of Boston is to assign a number of action items to individuals, who will take the lead and promptly provide draft text to the group.  We may also ask for volunteers to provide feedback to the lead person as the drafting proceeds. For this week, here is a draft list of such action items, each ofwhich we can discuss in order to define the scope. If you have additional suggestions, you can make them on the call or let the chair know in advance:

a.  Serviceprovider/controller definition.
b.  Market research definition.
c.   “Lifetime browsing history” definition.
d.  De-identification.
e.  Others?

Cybersecurity permitted use

4.  Presentation by Jon Callas, currently CTO of Entrust, and with long-time security experience at PGP, Apple, and elsewhere.  This presentation will discuss issues related to what data is kept for how long for cybersecurity purposes. If possible, slides will be posted in advance.


5.  Announce next meeting & adjourn

================ Infrastructure =================

Zakim teleconference bridge:
Phone +1.617.761.6200 passcode TRACK (87225)
IRC Chat:<>, port 6665, #dnt


Professor Peter P. Swire
C. William O'Neill Professor of Law
    Ohio State University

Received on Wednesday, 20 February 2013 02:04:40 UTC