- From: Larry Masinter <masinter@adobe.com>
- Date: Wed, 16 May 2012 00:40:48 -0700
- To: "ashok.malhotra@oracle.com" <ashok.malhotra@oracle.com>, "www-tag@w3.org" <www-tag@w3.org>
- Message-ID: <C68CB012D9182D408CED7B884F441D4D194AF27D99@nambxv01a.corp.adobe.com>
I'm sorry, I didn't double check Ashok's note. In fact, the document I was proposing for TAG reading was a very different document: http://tools.ietf.org/html/draft-iab-privacy-terminology Abstract Privacy is a concept that has been debated and argued throughout the last few millennia. Its most striking feature is the difficulty that disparate parties encounter when they attempt to precisely define it. In order to discuss privacy in a meaningful way, a tightly defined context is necessary. The specific context of privacy used within this document is that of personal data in Internet protocols. Personal data is any information relating to a data subject, where a data subject is an identified natural person or a natural person who can be identified, directly or indirectly. A lot of work within the IETF involves defining protocols that can potentially transport (either explicitly or implicitly) personal data. This document aims to establish a consistent lexicon around privacy for IETF contributors to use when discussing privacy considerations within their work. And table of contents: 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Basic Terms . . . . . . . . . . . . . . . . . . . . . . . . . 5 3. Identifiability . . . . . . . . . . . . . . . . . . . . . . . 6 3.1. Anonymity . . . . . . . . . . . . . . . . . . . . . . . . 6 3.2. Pseudonymity . . . . . . . . . . . . . . . . . . . . . . . 7 3.3. Identity Confidentiality . . . . . . . . . . . . . . . . . 8 3.4. Identity Management . . . . . . . . . . . . . . . . . . . 8 4. Unlinkability . . . . . . . . . . . . . . . . . . . . . . . . 9 5. Undetectability . . . . . . . . . . . . . . . . . . . . . . . 11 6. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 13 8. Security Considerations . . . . . . . . . . . . . . . . . . . 14 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 16 10.1. Normative References . . . . . . . . . . . . . . . . . . . 16 10.2. Informative References . . . . . . . . . . . . . . . . . . 16
Received on Wednesday, 16 May 2012 07:41:22 UTC