SlideShare une entreprise Scribd logo
1  sur  22
#Portability4TrustPersonal Data Portability for Trust Frameworks Phil WolffThe DataPortability ProjectIIW Spring 2011
A new Disclosure  Describe your portability practices Plain language Common structure Readable, Comparable Iconography Readable: the CC pattern 2010
Privacy v. Portability Your Privacy Policy tells visitors what you can do with their data. Your Portability Policy tells them what they can do with their data.
4 Stages of Relationship Exit Start ,[object Object]
Working with Things Stored ElsewhereBacking Up Closing An Account Share/Access Sync Public Data Access from Other Products APIs and Data Formats Where Things Are Stored Watching For Updates  Broadcasting Changes Made Here
The DataPortability Project Is Revving Our Portability Policy In Two Threads Portability Policy Summit Feedback from large adopters Portability4Trust Tools for  trust framework authorities  trust framework providers
The OAuth Triangle
The OAuth Triangle
The Trust Triangle Trust Frameworks ,[object Object]
Contracts
Verification,[object Object]
Trust Frameworks Need Personal Data Portability Content
7 Portability4Trust Deliverables A portability principles manifesto. Listing the principles of data portability and why they matter. A portability policy pledge. A short, direct promise to support the data portability principles. A portability policy template. Like the questions found at PortabilityPolicy.org, a structured way to assure all data portability principles are addressed and disclosed, whether they are supported or not. A portability policy minimum disclosure. Describe the least amount of disclosure required by a trust framework. A portability policy minimum practice. Describe required data portability practices. This is prescriptive. A portability policy recommended practice. Describe portability practices above and beyond the required. With time and support of the trust framework’s organization, recommended practices may become required. A portability glossary. Defining our terms.  
7 Portability4Trust Deliverables A portability principles manifesto A portability policy pledge A portability policy template A portability policy minimum disclosure A portability policy minimum practice A portability policy recommended practice A portability glossary
1. Personal Data Portability Principles Manifesto List the principles of data portability and why they matter
2. Policy Pledge A short, direct promise to support the data portability principles
3. Policy Template Like the questions at PortabilityPolicy.org, a structure to assure all data portability principles are addressed and disclosed, supported or not
4. Policy Minimum Disclosure Describe the least amount of disclosure required by a trust framework
5. Policy Minimum Practice Describe required data portability practices. This is prescriptive.
6. Policy Recommended Practice Describe portability practices above and beyond the required. Recommended practices may become Required  ,[object Object],[object Object]
#portability4trust 1 DataPortability.org p4t Google Group Wednesday calls 2 3 4 5 6
2011q2 Roadmap Write, Test, Revise, Release Listen, Repeat

Contenu connexe

Similaire à #Portability4Trust - Personal Data Portability for Trust Frameworks

Phil Wolff at #SemTech
Phil Wolff at #SemTechPhil Wolff at #SemTech
Phil Wolff at #SemTechPhil Wolff
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseDenodo
 
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...Dana Gardner
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Peter Bihr
 
Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Kevin Ashley
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Peter Bihr
 
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...Jeff Willinger
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to PracticeAlgoSec
 
1. What is audience analysis Why is it critical in creating,
1.  What is audience analysis  Why is it critical in creating, 1.  What is audience analysis  Why is it critical in creating,
1. What is audience analysis Why is it critical in creating, MartineMccracken314
 
1. What is audience analysis Why is it critical in creating,
1.  What is audience analysis  Why is it critical in creating, 1.  What is audience analysis  Why is it critical in creating,
1. What is audience analysis Why is it critical in creating, AbbyWhyte974
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationDenodo
 
CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCloudIDSummit
 
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Dana Gardner
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Jean-Marie Abi-Ghanem
 
Why-what-how of linked open government data
Why-what-how of linked open government dataWhy-what-how of linked open government data
Why-what-how of linked open government dataNikos Loutas
 
The economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasThe economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasOpen Knowledge Belgium
 
HIT Policy Info Exch Workgroup 12-6-2010
HIT Policy Info Exch Workgroup 12-6-2010HIT Policy Info Exch Workgroup 12-6-2010
HIT Policy Info Exch Workgroup 12-6-2010Brian Ahier
 

Similaire à #Portability4Trust - Personal Data Portability for Trust Frameworks (20)

Phil Wolff at #SemTech
Phil Wolff at #SemTechPhil Wolff at #SemTech
Phil Wolff at #SemTech
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven Enterprise
 
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)
 
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
1. What is audience analysis Why is it critical in creating,
1.  What is audience analysis  Why is it critical in creating, 1.  What is audience analysis  Why is it critical in creating,
1. What is audience analysis Why is it critical in creating,
 
1. What is audience analysis Why is it critical in creating,
1.  What is audience analysis  Why is it critical in creating, 1.  What is audience analysis  Why is it critical in creating,
1. What is audience analysis Why is it critical in creating,
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data Virtualization
 
CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from Pilots
 
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?
 
Why-what-how of linked open government data
Why-what-how of linked open government dataWhy-what-how of linked open government data
Why-what-how of linked open government data
 
The economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasThe economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos Loutas
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
HIT Policy Info Exch Workgroup 12-6-2010
HIT Policy Info Exch Workgroup 12-6-2010HIT Policy Info Exch Workgroup 12-6-2010
HIT Policy Info Exch Workgroup 12-6-2010
 

Plus de Phil Wolff

A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?Phil Wolff
 
Seven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouSeven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouPhil Wolff
 
14 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 201514 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 2015Phil Wolff
 
OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014Phil Wolff
 
DRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionDRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionPhil Wolff
 
So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. Phil Wolff
 
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckThe Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckPhil Wolff
 
What’s missing from customer service live chat?
What’s missing from customer service live chat?What’s missing from customer service live chat?
What’s missing from customer service live chat?Phil Wolff
 
Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Phil Wolff
 
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPersonal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPhil Wolff
 
The Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyThe Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyPhil Wolff
 
Johannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringJohannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringPhil Wolff
 
Why Personal Clouds Need A Network
Why Personal Clouds Need A NetworkWhy Personal Clouds Need A Network
Why Personal Clouds Need A NetworkPhil Wolff
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
 
Fiduciary clouds
Fiduciary cloudsFiduciary clouds
Fiduciary cloudsPhil Wolff
 
Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Phil Wolff
 
22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System SucksPhil Wolff
 
Digital Signatures for use by IDA Relying Parties v102
Digital Signatures for use by IDA Relying Parties  v102Digital Signatures for use by IDA Relying Parties  v102
Digital Signatures for use by IDA Relying Parties v102Phil Wolff
 
Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Phil Wolff
 
Interop, please
Interop, pleaseInterop, please
Interop, pleasePhil Wolff
 

Plus de Phil Wolff (20)

A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?
 
Seven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouSeven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To You
 
14 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 201514 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 2015
 
OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014
 
DRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionDRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product Selection
 
So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next.
 
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckThe Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
 
What’s missing from customer service live chat?
What’s missing from customer service live chat?What’s missing from customer service live chat?
What’s missing from customer service live chat?
 
Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission
 
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPersonal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
 
The Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyThe Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. Windley
 
Johannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringJohannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community Gathering
 
Why Personal Clouds Need A Network
Why Personal Clouds Need A NetworkWhy Personal Clouds Need A Network
Why Personal Clouds Need A Network
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
 
Fiduciary clouds
Fiduciary cloudsFiduciary clouds
Fiduciary clouds
 
Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.
 
22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks
 
Digital Signatures for use by IDA Relying Parties v102
Digital Signatures for use by IDA Relying Parties  v102Digital Signatures for use by IDA Relying Parties  v102
Digital Signatures for use by IDA Relying Parties v102
 
Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years
 
Interop, please
Interop, pleaseInterop, please
Interop, please
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

#Portability4Trust - Personal Data Portability for Trust Frameworks

  • 1. #Portability4TrustPersonal Data Portability for Trust Frameworks Phil WolffThe DataPortability ProjectIIW Spring 2011
  • 2. A new Disclosure Describe your portability practices Plain language Common structure Readable, Comparable Iconography Readable: the CC pattern 2010
  • 3. Privacy v. Portability Your Privacy Policy tells visitors what you can do with their data. Your Portability Policy tells them what they can do with their data.
  • 4.
  • 5. Working with Things Stored ElsewhereBacking Up Closing An Account Share/Access Sync Public Data Access from Other Products APIs and Data Formats Where Things Are Stored Watching For Updates Broadcasting Changes Made Here
  • 6. The DataPortability Project Is Revving Our Portability Policy In Two Threads Portability Policy Summit Feedback from large adopters Portability4Trust Tools for trust framework authorities trust framework providers
  • 9.
  • 11.
  • 12. Trust Frameworks Need Personal Data Portability Content
  • 13. 7 Portability4Trust Deliverables A portability principles manifesto. Listing the principles of data portability and why they matter. A portability policy pledge. A short, direct promise to support the data portability principles. A portability policy template. Like the questions found at PortabilityPolicy.org, a structured way to assure all data portability principles are addressed and disclosed, whether they are supported or not. A portability policy minimum disclosure. Describe the least amount of disclosure required by a trust framework. A portability policy minimum practice. Describe required data portability practices. This is prescriptive. A portability policy recommended practice. Describe portability practices above and beyond the required. With time and support of the trust framework’s organization, recommended practices may become required. A portability glossary. Defining our terms.  
  • 14. 7 Portability4Trust Deliverables A portability principles manifesto A portability policy pledge A portability policy template A portability policy minimum disclosure A portability policy minimum practice A portability policy recommended practice A portability glossary
  • 15. 1. Personal Data Portability Principles Manifesto List the principles of data portability and why they matter
  • 16. 2. Policy Pledge A short, direct promise to support the data portability principles
  • 17. 3. Policy Template Like the questions at PortabilityPolicy.org, a structure to assure all data portability principles are addressed and disclosed, supported or not
  • 18. 4. Policy Minimum Disclosure Describe the least amount of disclosure required by a trust framework
  • 19. 5. Policy Minimum Practice Describe required data portability practices. This is prescriptive.
  • 20.
  • 21. #portability4trust 1 DataPortability.org p4t Google Group Wednesday calls 2 3 4 5 6
  • 22. 2011q2 Roadmap Write, Test, Revise, Release Listen, Repeat
  • 23.
  • 24. 11-13 May. Telco 2 and Personal Data 5. London
  • 25.
  • 26. #portability4trust DataPortability.org p4t Google Group Wednesday calls @evanwolf skype:evanwolf pwolff@dijest.com +1-510-343-5664

Notes de l'éditeur

  1. A technical layer connects people, identity providers, and relying parties
  2. How do we get data portability promises, behavior, and enforcement into that triangle?
  3. We work with trust frameworks. They add a layer of culture, contracts and verification to the process.
  4. Trust Frameworks Need Personal Data Portability Content