project-open-data / project-open-data.github.io

Open Data Policy — Managing Information as an Asset
https://project-open-data.cio.gov/
Other
1.33k stars 585 forks source link

Evaluate new fields as required by Evidence Act #630

Open philipashlock opened 5 years ago

philipashlock commented 5 years ago

New fields that may need to be established based on Evidence Act requirements:

Ideas of what fields can get us there or if we need new ones would be helpful. This issue can be used for general discussion of what new fields are needed, but each individual new field would probably benefit from having a separate issue and discussion focused on it individually

bbrotsos commented 5 years ago

@philipashlock, @dsmorgan77, & @arielsgold

One element that we at DOT had internal discussions on is Data Ownership. There are many instances with cooperative agreements, multi-agency collaborations, and working with 3rd-parties where contactPoint and publisher do not meet our needs. This is an example: https://www.hsisinfo.org/ We narrowed down all the edge cases to these elements:

The cleanest solution we found is to utilize hasRole which is a valid vCard property https://www.w3.org/TR/vcard-rdf/#Organizational_Properties and convert contactPoint to an array.

For example:

           "contactPoint": [{
                          "@type": "vcard:Contact",
                          "fn": "Jane Doe",
                          "hasEmail": "mailto:jane.doe@agency.gov",
                          "hasRole": "owner"
           }, {
                          "@type": "vcard:Contact",
                          "fn": "John Doe",
                          "hasEmail": "mailto:john.doe@agency.gov",
                          "hasRole": "steward"
           }]

With this change, organizational points of contact and shared email boxes are acceptable in some cases.

Thanks for opportunity to provide feedback, and we are open to other ideas on how this change can be implemented.

ddw338 commented 4 years ago

If someone takes an automated system from a persons hard drive they have to run the system from my devices and they use my name and my accounts all my accounts that I have opened and the ones I had before them hacking my system so identity theft is involved with my problem they are not just and haven’t been from the get go.