Rich Furr
Head, Global Regulatory Affairs, Policy & Compliance
Cell: 704-575-1680
Office: 980-236-7576
SAFE-BioPharma
SAFE-BioPharma
SAFE-BioPharma

http://www.diahome.org/en/FlagshipMeetings/27170/Trusted+Identities+for+Cloud+Collaboration

I tend to agree with a lot of what Jeff is saying here.Especially with Notice. I do not think this ICAM document describes adequate notice proportional to the use of data and identity. Notice itself needs a registry and a common format so that it can be centrally managed and accessible post transaction by the data subject.This way the data subject is able to get the level of transparency needed to centrally manage use of identity post IdP transaction. Notice requirements are an excellent point in which the data subject can exercise control, administrate transparency, and make the management of administrative identities transparent.After, researching this issue extensively, I would suggest that a separate effort focused on standardising notice in IdP, with a central registry or similar protocol is the needed solution in this context. Providing much more than the minimum notice required, in fact providing a notice regieme that is well above the minimum legal requirement and useful internationally as standard for identity management that is above compliant with laws in all jurisdictions internationally.This ICAM's document of pushing for adequate notice is not nearly enough. Adequate notice does not resolve issues of activity tracking, although, a central notice repository, in which data subjects can centrally track notices after their use, enables a registry of tracking to be made.I also assert that a more advanced notice tracking protocol would reduce the compliance burdens and also dramatically increase the economic performance of administrating identity management.I am working on a project called the Surveillance Trust Project which is testing and implementing this model for video surveillance notices, based on this model (a notice registry) for trust frameworks. The intention is to regulate institutional surveillance practices in Britain by creating a simple notice registry. If there is more interest in this model I would be happy to discuss an identity management version, which this approach was originally designed for .Best Regards,MarkOn 29 Mar 2012, at 18:20, j stollman wrote:All,While I apologize for being unable to attend today's meeting, I did briefly review the ICAM document and can provide the following feedback:_______________________________________________Jeff
- Adequate Notice
- I think that the requirements for notice need to extend well beyond what is listed in the ICAM document to include such items as how data are stored and protected from insider threats and outside hackers; how data is protected in flight between the user and the IdP and between the IdP and the RP, the retention periods of the IdP, the destruction processes of the IdP, etc.
- In reality, I believe that we need to establish a separate set of criteria for Notice and Consent independent of the Privacy profile. In this way, the privacy profile will merely need to reference compliance with the Notice and Consent profile. The Notice and Consent Profile will then need to be developed by a collaborative IAwg and P3wg team, since it addresses elements of both.
- As well, I would suggest that this document extend beyond the 3-party model (Subject, IdP, and RP). It should be robust enough to address other models (e.g., separate IdP and CSP, AP, and the various UMA roles).
- Minimalism
- I suspect that trying to assess minimalism for the IdP is a fool's errand. In ICAM's view, the IdP is the single source of truth for all attributes required by the RP. In such a model, the IdP would need to anticipate every possible attribute required by any RP in order to fulfill its role. This is a broken model from the start.
- One alternative model would be for the IdP to merely assert that the Subject is Joe313452. Additional attributes would then be obtained from the various Attribute Providers (APs) who can substantiate each attribute claim (e.g., a credit bureau for credit worthiness, a credit-card company for authorization of a particular purchase, etc. Of course, this can become slow and complex if many APs are required.
- Still other models may separate the IdP from an AP who aggregates multiple attributes along with their signed substantiation from the AP who substantiates each transaction. Technologies such as U-Prove make this practical.
- Of course, once we bring APs into the picture, the same privacy profile will need to apply to them. Otherwise it is like trying to stop a leak by patching only two of three large holes.
- Activity Tracking
- Most of the content of the ICAM document appears to deal with Notice, not with activity tracking.
- There is an inherent contradiction in not tracking activity and having a log available to support claims of unfair practice. The ICAM document does not suggest tracking records not be maintained, merely that they not be disclosed to other parties. The problem inherent in maintaining these data are that they represent a honeypot for both insiders and outside hackers who may seek to profit from the information. We can regulate and certify business practices, but will that be enough to overcome the skepticism of the public who read continuously about PII being exposed through error or malfeasance? So it would appear, that -- at a minimum -- there ought to be a maximum retention period established.
- In addition, if users decide to stop working with an IdP, they ought to have the right to have their tracking history destroyed (after weighting some defined minimum period to provide the IdP with records needed for audit, etc.).
- If the same requirements for IdPs are not applicable to other parties in the interaction, have we really fixed anything?
- Identity Provider Bona Fides
- The first two items listed under this rubric appear best address in the Notice and Consent profile.
On Thu, Mar 29, 2012 at 10:39 AM, Ann Geyer <age...@tunitas.com> wrote:
I found the ICAM Privacy Guidance for Trust Providers. It looks very
similar to what we are trying to develop for Kantara. I suggest we
look at this document and see what modifications, if any, are required
for our purpose.
http://kantarainitiative.org/confluence/download/attachments/49775195/ICAM+Privacy+Guidance+for+Trust+Providers.pdf
--
Ann Geyer, ESQ, MBA, MA, CIPP, CISSP, CISM, CPHRM
Managing Director, Tunitas Group
PO Box 278, Mountain Ranch, CA 95246
209-817-1691 (cell)
age...@tunitas.com
www.tunitas.com
_______________________________________________
WG-P3 mailing list
WG...@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/wg-p3
--
Jeff Stollman
stoll...@gmail.com
1 202.683.8699
Truth never triumphs — its opponents just die out.Science advances one funeral at a time.Max Planck
WG-P3 mailing list
WG...@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/wg-p3
_______________________________________________
WG-P3 mailing list
WG...@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/wg-p3
Comopletely concur. As I have noted a number of times, we need to strike a balanc e betiween what is needed for privacy and what will keep IdP/CSPs from implementing. Layering on much more significant requirements than already exist will, in my humble opinion, make adoption of any of this less likely, especially if it adds appreciably to cost and drives cost of credentials to consumers to the point nobody buys. Just a thought.
SAFE-BioPharmaSAFE-BioPharmaSAFE-BioPharma