See comments in-line below


Have a better than expected day,
John Wunderlich


On Nov 2, 2023 at 2:04 PM -0400, Jordaan, Loffie <LJordaan@aamva.org>, wrote:

John,

 

To the extent that I may have a vote, I vote to approve the document, with suggestions.  My suggestions follow.  I’d be happy to discuss any of them if needed.

 

In UC3, I believe that (at this time, given what we say in UC2) the biometrics collected are explicitly not collected “on-device”.  They are biometrics included in the identity credential provided by the Holder.  I suggest striking “on-device” in line 215.

 

In UC3 the only reference to ‘on-device’ is to the ability of a device to verify the holder of the device.

 

There is statement on line 447/448 that a Verifier may limit the Holder’s access to the Holder’s data.  I suggest that this statement be deleted.  My understanding is that we are talking about information the Holder shared with the Verifier, or metadata directly related to the action of sharing.  I do not think any of this should ever be withheld from the Holder.  

This is a very narrow exclusion. It is unlikely that a mobile credential will contain information about others (which is what happens in some medical or HR data sets) so really the only applicable exception is where required by law.

 

<!—start sidebar-->

This also raises an interesting point.  If a Holder shares identity and driving privilege information with a law enforcement officer, and the officer associates this identity information with information about a traffic violation, does the Holder have a right to access this linkage (and the violation information) because the holder shared identity and driving privilege information?  Or say the law enforcement officer associates the Holder’s identity information with the identity information of the driver of the other vehicle in a 2-car crash.  Does the Holder have a right to access this linkage (and the identity of the other driver) because the holder shared identity and driving privilege information?  I am fairly confident that questions like these are not new, so am eager to hear what the experts say.

<!—stop sidebar—>


The point is a good one, although out of scope of our guidance. As above, where an individual exercises their privacy rights to access data held in a police or insurance database, some parts of the record may be redacted to protect the privacy of other individuals who might be in the record. This is different than a discovery request in the event of a criminal or civil proceeding where the whole record - if producible and not under legal privilelge - would be produced (noting that I am not a lawyer and this in not a legal opinion)

 



 

Line 553: It is not clear why this is prefaced with “If an Issuer permits…”.

  

Removed

Line 556: Since the credential is signed by the Issuer, and there is of yet no standardized way for the device to perform trustable data calculations at transaction time, ensuring that minimized data elements are present in the credential is an Issuer responsibility and not a Provider responsibility.  The Provider’s responsibility in respect of data minimization is to provide the Holder with the means to prevent sharing more than the Holder feels comfortable with. 

This is more by way of the Provider providing a capability to meet Issuer requirements or constraints.

 

Line 567: I believe the reference should be to the Provider Solution rather than to the Provider Service. 

Fixed

 

Line 581/582: See comments above.  I am not aware of any standard way for the device to perform trustable data calculations at transaction time.  I suggest that the example be qualified accordingly.  That is, explain that calculations by the Provider Solution is contingent on the Issuer (or Verifier) trusting the Provider Solution to do this.

 


 

Line 639, last 2 sentences of the 1st paragraph: It is not clear what these two sentences say.  If it is intended to say what I think it wants to say, I would like to point out that an Issuer should provision into any Solution, regardless of the relationship (or absence thereof) with the Verifier, only if the Issuer is satisfied that the Solution and the Solution Provider meet the necessary conditions (including privacy requirements).  It is up to the Issuer to confirm what those conditions are and how it will ensure compliance.  I therefore believe that this is what we should convey here, i.e. that the Issuer has a responsibility to ensure that both the Solution and Solution Provider comply with the necessary requirements before (and after) provisioning takes place.

  

I think that is what the current version says.

Row 695 and 699: It is not clear what “ancillary data” would be for a Verifier (it is clear what it would be for an Issuer).  Perhaps add an example?

 

Lines 826 to 828: I believe the genesis of this requirement is an item in the AAMVA mDL Implementation Guidelines that states (paraphrased) that if a person holds more than one mDL and chooses to keep separate transaction logs, visibility of the log file should not enable to infer the existence of the other log file.  This requirement was created in response to a comment from the ACLU that pointed out that if a Holder’s log file were to become known to someone other than the Holder (e.g. if forced, as a condition of entry into a country, to show the log file), it will not reveal the existence of the other mDL instance or its transaction log.

 

Line 852: While a Next Steps section could be helpful, I agree with the comment that the current content is perhaps not a good fit.

 

Thanks,

 

<image001.png>

Loffie Jordaan

Business Solutions Architect

 

 

Phone: 703.908.5864

Email: ljordaan@aamva.org  

aamva.org

 

 

Icon Description automatically generatedA picture containing text, wheel, gear Description automatically generatedIcon Description automatically generated with medium confidenceA picture containing graphical user interface Description automatically generatedIcon Description automatically generatedIcon Description automatically generatedIcon Description automatically generated

 

 

From: John Wunderlich <john@wunderlich.ca>
Sent: Tuesday, October 31, 2023 17:18
To: WG PEMC <wg-pemc@kantarainitiative.org>
Subject: [WG-PEMC] Implementor’s report for workgroup vote

 

WARNING: This email originated from outside of AAMVA. Do not click on links or open attachments unless you recognize the sender and know the content is safe.

 

Please find attached the Early Implementors Draft for workgroup vote:

Next steps:

1 Workgroup Votes:

  • Vote Approve
  • Vote Approve with suggestions (include specific suggestions for final editing)
  • Vote Not Approve

2. Final Editing by leadership team (assuming majority of votes cast are Approve or Approve with suggestions)

3. Submit for publication


On the agenda for tomorrow:

  1. Developing a cadence and calendar for asynchronous development of requirement
  2. Review of voting process

 


Have a better than expected day,

John Wunderlich

 

 

 

This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.



This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.