You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update vCon Lifecycle Management draft to include acknowledgment section and refine text for clarity and readability, enhancing the document's focus on privacy compliance and consent management.
Copy file name to clipboardExpand all lines: draft-howe-vcon-lifecycle.md
+22-9Lines changed: 22 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,7 @@ author:
44
44
email: thomas.howe@strolid.com
45
45
-
46
46
fullname: S. Lasker
47
+
organization: Independent
47
48
email: stevenlasker@hotmail.com
48
49
-
49
50
fullname: Diana James
@@ -189,8 +190,10 @@ These relying parties can then use this information to make decisions
189
190
based on the current state and context of the vCon to account for changes
190
191
in consent, updates in the accuracy of the content, or amendments of the
191
192
information it might contain.
192
-
SCITT, the Supply Chain, Integrity, Transparency, and Trust protocol, enables clients to register statements about events, physical or virtual, such as when things are created or used.
193
-
These statements are immutable and are useful to support auditing,
193
+
SCITT, the Supply Chain, Integrity, Transparency, and Trust protocol,
194
+
enables clients to register statements about events, physical or virtual,
195
+
such as when things are created or used.
196
+
These statements are immutable and are useful to support auditing,
194
197
governance, and coordination between various distributed systems.
195
198
196
199
When using vCons to define a conversation, and SCITT to record the
@@ -212,14 +215,15 @@ principles, multijurisdictional business operations, and the ever-changing
212
215
privacy laws. Please see the [privacy-primer-vcon] for more information on
213
216
consent and other data subject protection concepts.
214
217
215
-
In all of these cases, the ability to define and express the processing of conversations depends on the ability to authoritatively define the lifecycle of a vCon:
218
+
In all of these cases, the ability to define and express the processing of
219
+
conversations depends on the ability to authoritatively define the lifecycle of a vCon:
216
220
217
-
* who originated the vCon in the first place to establish provenance
218
-
* how it was analyzed and amended, to accurately respond to right-to-know requests
219
-
* the authenticity both of the original document for downstream workflow
220
-
* and authenticity of the redactions that come from the original, in service of data minimization efforts
221
-
* the various expressions of digital rights
222
-
* the sharing or deletion in response to the same digital rights
221
+
-who originated the vCon in the first place to establish provenance
222
+
-how it was analyzed and amended, to accurately respond to right-to-know requests
223
+
-the authenticity both of the original document for downstream workflow
224
+
-and authenticity of the redactions that come from the original, in service of data minimization efforts
225
+
-the various expressions of digital rights
226
+
-the sharing or deletion in response to the same digital rights
223
227
224
228
For this document and for purposes of illustration, consent will be used as an example use case.
225
229
Proper consent management is fundamental to the responsible protection of data and the ability
@@ -675,3 +679,12 @@ This document has no IANA actions.
0 commit comments