SlideShare a Scribd company logo
1 of 22
#Portability4TrustPersonal Data Portability for Trust Frameworks Phil WolffThe DataPortability ProjectIIW Spring 2011
A new Disclosure  Describe your portability practices Plain language Common structure Readable, Comparable Iconography Readable: the CC pattern 2010
Privacy v. Portability Your Privacy Policy tells visitors what you can do with their data. Your Portability Policy tells them what they can do with their data.
4 Stages of Relationship Exit Start ,[object Object]
Working with Things Stored ElsewhereBacking Up Closing An Account Share/Access Sync Public Data Access from Other Products APIs and Data Formats Where Things Are Stored Watching For Updates  Broadcasting Changes Made Here
The DataPortability Project Is Revving Our Portability Policy In Two Threads Portability Policy Summit Feedback from large adopters Portability4Trust Tools for  trust framework authorities  trust framework providers
The OAuth Triangle
The OAuth Triangle
The Trust Triangle Trust Frameworks ,[object Object]
Contracts
Verification,[object Object]
Trust Frameworks Need Personal Data Portability Content
7 Portability4Trust Deliverables A portability principles manifesto. Listing the principles of data portability and why they matter. A portability policy pledge. A short, direct promise to support the data portability principles. A portability policy template. Like the questions found at PortabilityPolicy.org, a structured way to assure all data portability principles are addressed and disclosed, whether they are supported or not. A portability policy minimum disclosure. Describe the least amount of disclosure required by a trust framework. A portability policy minimum practice. Describe required data portability practices. This is prescriptive. A portability policy recommended practice. Describe portability practices above and beyond the required. With time and support of the trust framework’s organization, recommended practices may become required. A portability glossary. Defining our terms.  
7 Portability4Trust Deliverables A portability principles manifesto A portability policy pledge A portability policy template A portability policy minimum disclosure A portability policy minimum practice A portability policy recommended practice A portability glossary
1. Personal Data Portability Principles Manifesto List the principles of data portability and why they matter
2. Policy Pledge A short, direct promise to support the data portability principles
3. Policy Template Like the questions at PortabilityPolicy.org, a structure to assure all data portability principles are addressed and disclosed, supported or not
4. Policy Minimum Disclosure Describe the least amount of disclosure required by a trust framework
5. Policy Minimum Practice Describe required data portability practices. This is prescriptive.
6. Policy Recommended Practice Describe portability practices above and beyond the required. Recommended practices may become Required  ,[object Object],[object Object]
#portability4trust 1 DataPortability.org p4t Google Group Wednesday calls 2 3 4 5 6
2011q2 Roadmap Write, Test, Revise, Release Listen, Repeat

More Related Content

Similar to #Portability4Trust - Personal Data Portability for Trust Frameworks

Phil Wolff at #SemTech
Phil Wolff at #SemTechPhil Wolff at #SemTech
Phil Wolff at #SemTechPhil Wolff
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseDenodo
 
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...Dana Gardner
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Peter Bihr
 
Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Kevin Ashley
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Peter Bihr
 
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...Jeff Willinger
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to PracticeAlgoSec
 
1. What is audience analysis Why is it critical in creating,
1.  What is audience analysis  Why is it critical in creating, 1.  What is audience analysis  Why is it critical in creating,
1. What is audience analysis Why is it critical in creating, MartineMccracken314
 
1. What is audience analysis Why is it critical in creating,
1.  What is audience analysis  Why is it critical in creating, 1.  What is audience analysis  Why is it critical in creating,
1. What is audience analysis Why is it critical in creating, AbbyWhyte974
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationDenodo
 
CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCloudIDSummit
 
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Dana Gardner
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Jean-Marie Abi-Ghanem
 
The economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasThe economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasOpen Knowledge Belgium
 
Why-what-how of linked open government data
Why-what-how of linked open government dataWhy-what-how of linked open government data
Why-what-how of linked open government dataNikos Loutas
 
HIT Policy Info Exch Workgroup 12-6-2010
HIT Policy Info Exch Workgroup 12-6-2010HIT Policy Info Exch Workgroup 12-6-2010
HIT Policy Info Exch Workgroup 12-6-2010Brian Ahier
 

Similar to #Portability4Trust - Personal Data Portability for Trust Frameworks (20)

Phil Wolff at #SemTech
Phil Wolff at #SemTechPhil Wolff at #SemTech
Phil Wolff at #SemTech
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven Enterprise
 
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
How IT4IT Turns IT into a Business that the Business Can Then Use as a Transf...
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)
 
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
SPTechCon 2014 - Keep the Lawyers off Your Back:Where does eDiscover and Comp...
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
1. What is audience analysis Why is it critical in creating,
1.  What is audience analysis  Why is it critical in creating, 1.  What is audience analysis  Why is it critical in creating,
1. What is audience analysis Why is it critical in creating,
 
1. What is audience analysis Why is it critical in creating,
1.  What is audience analysis  Why is it critical in creating, 1.  What is audience analysis  Why is it critical in creating,
1. What is audience analysis Why is it critical in creating,
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data Virtualization
 
CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from Pilots
 
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?
 
The economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasThe economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos Loutas
 
Why-what-how of linked open government data
Why-what-how of linked open government dataWhy-what-how of linked open government data
Why-what-how of linked open government data
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
HIT Policy Info Exch Workgroup 12-6-2010
HIT Policy Info Exch Workgroup 12-6-2010HIT Policy Info Exch Workgroup 12-6-2010
HIT Policy Info Exch Workgroup 12-6-2010
 

More from Phil Wolff

A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?Phil Wolff
 
Seven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouSeven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouPhil Wolff
 
14 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 201514 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 2015Phil Wolff
 
OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014Phil Wolff
 
DRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionDRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionPhil Wolff
 
So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. Phil Wolff
 
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckThe Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckPhil Wolff
 
What’s missing from customer service live chat?
What’s missing from customer service live chat?What’s missing from customer service live chat?
What’s missing from customer service live chat?Phil Wolff
 
Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Phil Wolff
 
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPersonal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPhil Wolff
 
The Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyThe Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyPhil Wolff
 
Johannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringJohannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringPhil Wolff
 
Why Personal Clouds Need A Network
Why Personal Clouds Need A NetworkWhy Personal Clouds Need A Network
Why Personal Clouds Need A NetworkPhil Wolff
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
 
Fiduciary clouds
Fiduciary cloudsFiduciary clouds
Fiduciary cloudsPhil Wolff
 
Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Phil Wolff
 
22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System SucksPhil Wolff
 
Digital Signatures for use by IDA Relying Parties v102
Digital Signatures for use by IDA Relying Parties  v102Digital Signatures for use by IDA Relying Parties  v102
Digital Signatures for use by IDA Relying Parties v102Phil Wolff
 
Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Phil Wolff
 
Interop, please
Interop, pleaseInterop, please
Interop, pleasePhil Wolff
 

More from Phil Wolff (20)

A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?A Code of Ethics for Product Managers?
A Code of Ethics for Product Managers?
 
Seven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To YouSeven Reasons This Epic Training Should Matter To You
Seven Reasons This Epic Training Should Matter To You
 
14 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 201514 OpenOakland Leadership Hacks for 2015
14 OpenOakland Leadership Hacks for 2015
 
OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014OpenOakland: 3 goals for 2014
OpenOakland: 3 goals for 2014
 
DRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product SelectionDRAFT: OpenOakland Product Selection
DRAFT: OpenOakland Product Selection
 
So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next. So Your Product Is Going To Die. Here's What Happens Next.
So Your Product Is Going To Die. Here's What Happens Next.
 
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide DeckThe Things I Don't Know about Product Retirement Could Fill A Slide Deck
The Things I Don't Know about Product Retirement Could Fill A Slide Deck
 
What’s missing from customer service live chat?
What’s missing from customer service live chat?What’s missing from customer service live chat?
What’s missing from customer service live chat?
 
Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission
 
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPersonal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
Personal Data Economy Action Plan - Get Smart, Get Connected, Get Proof
 
The Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. WindleyThe Cloud Needs An Operating System – Philip J. Windley
The Cloud Needs An Operating System – Philip J. Windley
 
Johannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community GatheringJohannes Ernst introduces the first Personal Clouds Community Gathering
Johannes Ernst introduces the first Personal Clouds Community Gathering
 
Why Personal Clouds Need A Network
Why Personal Clouds Need A NetworkWhy Personal Clouds Need A Network
Why Personal Clouds Need A Network
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
 
Fiduciary clouds
Fiduciary cloudsFiduciary clouds
Fiduciary clouds
 
Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.Hi! I'm Phil Wolff. And this is PDEC.
Hi! I'm Phil Wolff. And this is PDEC.
 
22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks22 Ways Skype's Digital Identity System Sucks
22 Ways Skype's Digital Identity System Sucks
 
Digital Signatures for use by IDA Relying Parties v102
Digital Signatures for use by IDA Relying Parties  v102Digital Signatures for use by IDA Relying Parties  v102
Digital Signatures for use by IDA Relying Parties v102
 
Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years Skype 2021: The Next 9 Years
Skype 2021: The Next 9 Years
 
Interop, please
Interop, pleaseInterop, please
Interop, please
 

Recently uploaded

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 

Recently uploaded (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 

#Portability4Trust - Personal Data Portability for Trust Frameworks

  • 1. #Portability4TrustPersonal Data Portability for Trust Frameworks Phil WolffThe DataPortability ProjectIIW Spring 2011
  • 2. A new Disclosure Describe your portability practices Plain language Common structure Readable, Comparable Iconography Readable: the CC pattern 2010
  • 3. Privacy v. Portability Your Privacy Policy tells visitors what you can do with their data. Your Portability Policy tells them what they can do with their data.
  • 4.
  • 5. Working with Things Stored ElsewhereBacking Up Closing An Account Share/Access Sync Public Data Access from Other Products APIs and Data Formats Where Things Are Stored Watching For Updates Broadcasting Changes Made Here
  • 6. The DataPortability Project Is Revving Our Portability Policy In Two Threads Portability Policy Summit Feedback from large adopters Portability4Trust Tools for trust framework authorities trust framework providers
  • 9.
  • 11.
  • 12. Trust Frameworks Need Personal Data Portability Content
  • 13. 7 Portability4Trust Deliverables A portability principles manifesto. Listing the principles of data portability and why they matter. A portability policy pledge. A short, direct promise to support the data portability principles. A portability policy template. Like the questions found at PortabilityPolicy.org, a structured way to assure all data portability principles are addressed and disclosed, whether they are supported or not. A portability policy minimum disclosure. Describe the least amount of disclosure required by a trust framework. A portability policy minimum practice. Describe required data portability practices. This is prescriptive. A portability policy recommended practice. Describe portability practices above and beyond the required. With time and support of the trust framework’s organization, recommended practices may become required. A portability glossary. Defining our terms.  
  • 14. 7 Portability4Trust Deliverables A portability principles manifesto A portability policy pledge A portability policy template A portability policy minimum disclosure A portability policy minimum practice A portability policy recommended practice A portability glossary
  • 15. 1. Personal Data Portability Principles Manifesto List the principles of data portability and why they matter
  • 16. 2. Policy Pledge A short, direct promise to support the data portability principles
  • 17. 3. Policy Template Like the questions at PortabilityPolicy.org, a structure to assure all data portability principles are addressed and disclosed, supported or not
  • 18. 4. Policy Minimum Disclosure Describe the least amount of disclosure required by a trust framework
  • 19. 5. Policy Minimum Practice Describe required data portability practices. This is prescriptive.
  • 20.
  • 21. #portability4trust 1 DataPortability.org p4t Google Group Wednesday calls 2 3 4 5 6
  • 22. 2011q2 Roadmap Write, Test, Revise, Release Listen, Repeat
  • 23.
  • 24. 11-13 May. Telco 2 and Personal Data 5. London
  • 25.
  • 26. #portability4trust DataPortability.org p4t Google Group Wednesday calls @evanwolf skype:evanwolf pwolff@dijest.com +1-510-343-5664

Editor's Notes

  1. A technical layer connects people, identity providers, and relying parties
  2. How do we get data portability promises, behavior, and enforcement into that triangle?
  3. We work with trust frameworks. They add a layer of culture, contracts and verification to the process.
  4. Trust Frameworks Need Personal Data Portability Content