I like that he talks a lot about IoT and how it demands new thinking; it's an area I've become very familiar with.

Looking at the Consumer Privacy Bills of Rights language (Accordified), I see a framework that is aspirational, but it's still pretty familiar. It doesn't have a lot of needed specifics (as the author seems to agree).

As I've been pointing out for a while -- I may have shared my Nov 2016 Gartner talk on this subject at some point in a WG or legal subgroup call, see attachment for a relevant snippet -- we already have lots of sets privacy principles.

Also, its enforcement provisions have no private right of action; it would all be down to a government agency, somewhat EU GDPR-style, which wouldn't be my preference. It was my understanding that it's the different bases for privacy rights in the EU vs. US, human vs. property rights, that leads to the GDPR enforcement regime. Maybe somebody can explain why I'm wrong...

GDPR, of course, starts to get into what my talk called "sharper-edged criteria", deciding numerical boundaries and such (breach notification deadlines! fines! what consent means!), which of course is where arguments tend to crop up. That's where the US would have to go to have something meaningful.

I do think and hope that the UMA business model -- suitably abstracted away from UMA technology as required -- could usefully influence legislators and regulators when it comes to identifying some of the necessary sharper-edged criteria. As we noted on the last WG call, "...UMA can provide value in separating "personal information" services from "protection" services" -- and most laws have no conception that this is even possible or important.

p.s. You can check out my Identiverse slides on how consent needs to be retooled for IoT and the connected car era, involving UMA and IRM and potentially even AI, here. (Worth uploading this to the UMA wiki home page?)

Eve Maler
Cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl


On Sat, Jul 14, 2018 at 11:11 AM, James Hazard <james.g.hazard@gmail.com> wrote:
Cam Kerry’s call for a better approach to privacy and data security is important and timely.  Some time ago, I put his Consumer Privacy Bill of Rights into prose object format and did a sketch of how it could be directly adopted between consumers and companies in the format of a privacy policy.  That uses contract law to effect micro-legislation, the “law of the parties.” 

More generally, the World Economic Forum and others are working on this in the context of data sharing for epidemic response.  We are exploring using work by Chatham House as a base for a universal, federated approach.  I’ve written this up in the Google Doc below.  It mentions some of the challenges of a legislative approach and can be understood to be a kind of crowd-source, internet-speed version of “common law” alternative Cam discusses.  The Golden Rule hammered into very specific shapes by parties, advocates, groups, governments making decisions at their own levels.   

UMA seems an important part of this.  Colin also pointed out the fit with the Consent Receipt project. 

Jim



A federated approach to the rules of data sharing:


Cam Kerry’s CPBR - older work, and very relevant:



    

On Jul 14, 2018, at 9:20 AM, John Wunderlich <john@wunderlich.ca> wrote:

Thanks Thomas;

There are also a couple of new books that UMAnitarians might look at:

Waldman's Privacy as Trust (a prior paper is available on SSRN






John Wunderlich, BA, MBA
@PrivacyCDN



Privacy Tools

JLINC Labs: Data Provenance Solutions

"The sad truth is that most evil is done by people who never make up their minds to be good or evil.” ― Hannah Arendt, The Life of the Mind

On 14 July 2018 at 10:41, Thomas Hardjono <hardjono@mit.edu> wrote:

Dear UMAnitarians,

You might find this article interesting: "Why protecting privacy is a losing game today—and how to change the game".

https://www.brookings.edu/research/why-protecting-privacy-is-a-losing-game-today-and-how-to-change-the-game/


Best

-- thomas --



_______________________________________________
WG-UMA mailing list
WG-UMA@kantarainitiative.org
https://kantarainitiative.org/mailman/listinfo/wg-uma



This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.
_______________________________________________
WG-UMA mailing list
WG-UMA@kantarainitiative.org
https://kantarainitiative.org/mailman/listinfo/wg-uma


_______________________________________________
WG-UMA mailing list
WG-UMA@kantarainitiative.org
https://kantarainitiative.org/mailman/listinfo/wg-uma