Closed PrivacyCDN closed 2 years ago
New proposal for the definition or principles of enhanced privacy: n.b. I deliberately removed the word “attribute” and focused on the word “purpose” Privacy of data stored in a mobile credential is enhanced when the following principals are followed:
i found that trying to answer the question about the "definition" did not permit addressing the questions that were in that definition and decide that principles was better.
not sure how this issue got closed - perhaps my fault?
Turning into a rathole, so work group consensus is to not define privacy at this time
For the purposes of privacy-enhancing mobile credentials, I propose that the PEMC WG use the following as an operational definition of privacy for the recommendation. I came up with this starting from my view that privacy in our context can not be a characteristic of the data, but rather a characteristic of the relationship between the holder and the verifier, mediated by the issuer who sets out some of the requirements or constraints for disclosure.
Proposed Definition
Discussion
Wikipedia describes privacy as the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. While this seems a reasonable high-level view from 50,000 feet it fails to provide sufficient guidance for defining and applying operational protections and controls consistently.
Privacy or Data Protection legislation such as Canada’s PIPEDA or the EU’s GDPR do not define privacy per se. Rather they set their scope to be the protection of personal information or data and take pains to define the types of data or information that is in the scope of the legislation. Note that this presumes a particular kind of data flow whereby the individual (or holder in our case) loses control of the data about them as it passes under the control of the entity that is bound by the particular law. For the purposes of mobile credentials, where there is a three-party architecture and a dynamic relationship, a static assignment of accountability is insufficient.
Further, the framing of data protection statutes assumes a client-server architecture representing the data subject and the data controller respectively. This architecture may apply but disallows other architectures where there may be co-management of the data or where the data subject may retain custody and control of the data. These approaches can be seen in work on data trusts, information fiduciaries, and MyData Operators all of which reduce the ceded control by the data subject. Privacy Enhancing Mobile Credentials may be delivered using any of these approaches.
It seems to me that a more appropriate way to view privacy as I’ve expressed it above is to think about it in terms of a graph database. Rather than a server and a client, we have nodes, edges, and relationships. In this context an individual (a node) chooses to disclose information about themselves to another node or nodes, creating a relationship that expresses or should express a shared understanding or agreement about how the information that has been shared will be treated. This edge relationship then defines the terms of the co-management of the information. Whether we are talking about ISO 18013-5, Verifiable Credentials, or Self-Sovereign Identity models we have three entities (or nodes) with edge relationships to the other entities that include rights and obligations with respect to the data shared between them.
I should note that privacy is regarded as a human right in many jurisdictions such as the EU Charter of Fundamental Rights (Article 8), or the Universal Declaration of Human Rights (Article 12). I will note specifically 8.1 of the EU Charter of Fundamental Rights which states that, “…data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid.”
For those that are interested in going down a rathole of details for definitions of privacy, see the references below.
References