<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-howe-vcon-lawful-basis-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="vCon Lawful Basis">vCon Lawful Basis</title>
    <seriesInfo name="Internet-Draft" value="draft-howe-vcon-lawful-basis-00"/>
    <author initials="T." surname="McCarthy-Howe" fullname="Thomas McCarthy-Howe">
      <organization>Strolid</organization>
      <address>
        <email>ghostofbasho@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="25"/>
    <area>Applications and Real-Time</area>
    <workgroup>vCon</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 151?>

<t>This document defines a lawful basis extension for Virtualized Conversations (vCon) that provides standardized mechanisms for recording, verifying, and managing the lawful basis for processing data within conversation containers. The lawful basis extension addresses privacy compliance challenges through structured attachment metadata, including the specific lawful basis being asserted, temporal validity periods where applicable, and cryptographic proof mechanisms.</t>
      <t>The extension is designed as a Compatible vCon extension that introduces lawful basis management capabilities without altering existing vCon semantics. It defines a "lawful_basis" attachment type with structured records for each of the six lawful bases defined in regulations like GDPR, including consent, contract, legal obligation, vital interests, public task, and legitimate interests.</t>
      <t>Key features include automated lawful basis detection during conversation processing, auditable records with cryptographic proofs, granular purpose-based permissions for all lawful bases, documented justifications for other lawful bases, and integration with privacy regulations including GDPR, CCPA, and HIPAA.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://vcon-dev.github.io/draft-howe-vcon-consent/draft-howe-vcon-lawful-basis-latest.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-howe-vcon-lawful-basis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        vCon Working Group mailing list (<eref target="mailto:vcon@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/vcon/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/vcon/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/vcon-dev/draft-howe-vcon-lawful-basis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 159?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Conversations originating from all modes (voice, video, email, fax and messaging), contain sensitive information that requires a documented lawful basis for processing to comply with privacy regulations and ethical standards. This document defines a lawful basis extension for Virtualized Conversations (vCon) that enables automated lawful basis detection, structured recording, and cryptographic proof mechanisms.</t>
      <t>A vCon (Virtualized Conversation) is a standardized container format for storing conversation data, including metadata, participants, and conversation content, as defined in <xref target="I-D.draft-ietf-vcon-core-00"/>. The vCon specification supports extensible attachments that can carry additional structured data related to the conversation.</t>
      <t>This lawful basis extension provides a Compatible vCon extension (as defined in Section 2.5 of <xref target="I-D.draft-ietf-vcon-core-00"/>) that introduces lawful basis management capabilities through a standardized "lawful_basis" attachment type. The extension captures essential metadata including:</t>
      <ul spacing="normal">
        <li>
          <t>The specific lawful basis being asserted for processing</t>
        </li>
        <li>
          <t>Party identification (for consent-based processing)</t>
        </li>
        <li>
          <t>Temporal validity periods (where applicable)</t>
        </li>
        <li>
          <t>Granular purpose-based permissions</t>
        </li>
        <li>
          <t>Documented justifications for non-consent-based lawful bases</t>
        </li>
        <li>
          <t>Cryptographic proof mechanisms and external verification</t>
        </li>
        <li>
          <t>Integration with SCITT transparency services for audit trails</t>
        </li>
      </ul>
      <t>The lawful basis extension addresses key privacy and compliance challenges while maintaining compatibility with existing vCon implementations. Implementations that do not recognize the lawful basis extension can safely ignore lawful basis attachments while maintaining valid processing of other vCon content.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>
      <section anchor="core-terms">
        <name>Core Terms</name>
        <t><strong>Lawful Basis</strong>: A valid justification, as defined by applicable law (e.g., GDPR), for the processing of personal data. One of six potential bases must be identified prior to processing.</t>
        <t><strong>Data Subject</strong>: The identified or identifiable natural person to whom personal data relates <xref target="GDPR"/>.</t>
        <t><strong>Lawful Basis Attachment</strong>: A vCon attachment with type "lawful_basis" that contains structured information documenting the lawful basis for processing conversation data.</t>
        <t><strong>Attestation Registry</strong>: An external transparency service that maintains an authoritative, verifiable log of attestations about a vCon, which can include attestations of a lawful basis. This document defines integration with registries using the SCITT protocol.</t>
        <t><strong>Compatible Extension</strong>: A vCon extension that introduces additional data without altering the meaning or structure of existing elements, as defined in <xref target="I-D.draft-ietf-vcon-core-00"/>.</t>
      </section>
    </section>
    <section anchor="overview-of-lawful-bases">
      <name>Overview of Lawful Bases</name>
      <t>While this document defines an extension for recording any lawful basis for processing, it is important to understand the distinctions between them. Under regulations like the GDPR, there are six lawful bases for processing personal data. Consent is unique in that it is a permission granted by the data subject, while the other five are justifications asserted by the data controller. Understanding this distinction is critical for correctly implementing this extension.</t>
      <t>The six lawful bases for processing under GDPR are:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Consent</strong>: The data subject has given clear, unambiguous consent for their personal data to be processed for a specific purpose. This basis is unique because it originates with the data subject.</t>
        </li>
        <li>
          <t><strong>Contract</strong>: The processing is necessary for a contract that the data subject has with the organization, or because they have asked the organization to take specific steps before entering into a contract. For example, processing a customer's address to deliver a purchased product.</t>
        </li>
        <li>
          <t><strong>Legal Obligation</strong>: The processing is necessary for the organization to comply with the law (not including contractual obligations). For example, a financial institution may be legally required to report certain transactions to prevent fraud.</t>
        </li>
        <li>
          <t><strong>Vital Interests</strong>: The processing is necessary to protect someone's life. For example, sharing a patient's medical history with emergency services.</t>
        </li>
        <li>
          <t><strong>Public Task</strong>: The processing is necessary for the organization to perform a task in the public interest or for its official functions, and the task or function has a clear basis in law. For example, a local authority processing data to provide public services.</t>
        </li>
        <li>
          <t><strong>Legitimate Interests</strong>: The processing is necessary for the organization's legitimate interests or the legitimate interests of a third party, unless there is a good reason to protect the individual's personal data which overrides those legitimate interests. For example, a business using customer data for marketing analysis to improve its services, provided it does not infringe on the customer's privacy rights.</t>
        </li>
      </ol>
      <t>This lawful basis extension for vCon provides a standardized way to record and verify any of these lawful bases. The presence and content of a <tt>lawful_basis</tt> attachment are intended to be the primary mechanism for determining the authorized uses of a vCon's data.</t>
    </section>
    <section anchor="vcon-lawful-basis-extension-definition">
      <name>vCon Lawful Basis Extension Definition</name>
      <section anchor="extension-classification">
        <name>Extension Classification</name>
        <t>The lawful basis extension is a <strong>Compatible Extension</strong> as defined in Section 2.5 of <xref target="I-D.draft-ietf-vcon-core-00"/>. This extension:</t>
        <ul spacing="normal">
          <li>
            <t>Introduces additional lawful basis metadata without altering existing vCon semantics</t>
          </li>
          <li>
            <t>Can be safely ignored by implementations that don't support lawful basis processing</t>
          </li>
          <li>
            <t>Does not require listing in the <tt>must_support</tt> parameter</t>
          </li>
          <li>
            <t>Maintains backward compatibility with existing vCon implementations</t>
          </li>
        </ul>
      </section>
      <section anchor="extension-registration">
        <name>Extension Registration</name>
        <t>This document defines the "lawful_basis" extension token for registration in the vCon Extensions Names Registry:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Extension Name</strong>: lawful_basis</t>
          </li>
          <li>
            <t><strong>Extension Description</strong>: Lawful basis management for conversation participants with cryptographic proof mechanisms and regulatory compliance support</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document</strong>: This document</t>
          </li>
        </ul>
      </section>
      <section anchor="extension-usage">
        <name>Extension Usage</name>
        <t>vCon instances that include lawful basis attachments SHOULD include "lawful_basis" in the <tt>extensions</tt> array:</t>
        <t><tt>json
{
  "uuid": "01234567-89ab-cdef-0123-456789abcdef",
  "extensions": ["lawful_basis"],
  "created_at": "2025-01-02T12:00:00Z",
  "parties": [...],
  "dialog": [...],
  "attachments": [
    {
      "type": "lawful_basis",
      "start": "2025-01-02T12:15:30Z",
      "party": 0,
      "dialog": 0,
      "encoding": "json",
      "body": {
        // Lawful basis data structure defined below
      }
    }
  ]
}
</tt></t>
      </section>
    </section>
    <section anchor="lawful-basis-attachment-structure">
      <name>Lawful Basis Attachment Structure</name>
      <section anchor="attachment-container">
        <name>Attachment Container</name>
        <t>Lawful basis information MUST be included as vCon attachments using the standard attachment object structure defined in Section 4.4 of <xref target="I-D.draft-ietf-vcon-core-00"/>.</t>
        <t>The lawful basis attachment MUST include:</t>
        <ul spacing="normal">
          <li>
            <t><strong>type</strong>: MUST be set to "lawful_basis"</t>
          </li>
          <li>
            <t><strong>encoding</strong>: MUST be set to "json" for structured lawful basis data</t>
          </li>
          <li>
            <t><strong>body</strong>: MUST contain the lawful basis data structure as defined below</t>
          </li>
        </ul>
        <t>The lawful basis attachment SHOULD include:</t>
        <ul spacing="normal">
          <li>
            <t><strong>start</strong>: ISO 8601 timestamp when lawful basis was recorded</t>
          </li>
          <li>
            <t><strong>party</strong>: Index of the party in the vCon parties array</t>
          </li>
          <li>
            <t><strong>dialog</strong>: Index of the associated dialog in the vCon dialog array</t>
          </li>
        </ul>
      </section>
      <section anchor="lawful-basis-body-structure">
        <name>Lawful Basis Body Structure</name>
        <t>The <tt>body</tt> field of the lawful basis attachment MUST contain a JSON object with the following structure:</t>
        <section anchor="required-fields">
          <name>Required Fields</name>
          <ul spacing="normal">
            <li>
              <t><strong>lawful_basis</strong>: String enum from <tt>consent</tt>, <tt>contract</tt>, <tt>legal_obligation</tt>, <tt>vital_interests</tt>, <tt>public_task</tt>, <tt>legitimate_interests</tt></t>
            </li>
            <li>
              <t><strong>expiration</strong>: ISO 8601 timestamp indicating when the lawful basis expires, or <tt>null</tt> for indefinite</t>
            </li>
            <li>
              <t><strong>purpose_grants</strong>: Array of purpose grant objects specifying permissions</t>
            </li>
          </ul>
        </section>
        <section anchor="optional-fields">
          <name>Optional Fields</name>
          <ul spacing="normal">
            <li>
              <t><strong>terms_of_service</strong>: URL reference to applicable terms of service document</t>
            </li>
            <li>
              <t><strong>status_interval</strong>: Duration string for revalidation intervals (e.g., "30d")</t>
            </li>
            <li>
              <t><strong>content_hash</strong>: An object containing content integrity information for the lawful basis attachment. The object has the following fields:
              </t>
              <ul spacing="normal">
                <li>
                  <t><strong>algorithm</strong>: (string, required) The hash algorithm used. This document defines initial values of "sha-256", "sha-3-256", and "blake2b-256". Other values may be registered in an IANA registry.</t>
                </li>
                <li>
                  <t><strong>canonicalization</strong>: (string, required) The canonicalization method used. This document defines an initial value of "jcs" (JSON Canonicalization Scheme per RFC 8785). Other values may be registered in an IANA registry.</t>
                </li>
                <li>
                  <t><strong>value</strong>: (string, required) The hexadecimal-encoded hash value of the canonicalized lawful basis attachment body.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><strong>registry</strong>: An object containing information about an external attestation registry for audit trails. The object has the following fields:
              </t>
              <ul spacing="normal">
                <li>
                  <t><strong>type</strong>: (string, required) The type of the attestation registry service. This document defines an initial value of "scitt". Other values may be registered in an IANA registry.</t>
                </li>
                <li>
                  <t><strong>url</strong>: (string, required) The URL endpoint for the attestation registry service.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><strong>proof_mechanisms</strong>: Array of proof objects supporting the lawful basis</t>
            </li>
            <li>
              <t><strong>metadata</strong>: Additional implementation-specific metadata</t>
            </li>
          </ul>
        </section>
        <section anchor="purpose-grant-objects">
          <name>Purpose Grant Objects</name>
          <t>Each object in the <tt>purpose_grants</tt> array MUST contain:</t>
          <ul spacing="normal">
            <li>
              <t><strong>purpose</strong>: String identifying the processing purpose (e.g., "recording", "transcription", "analysis")</t>
            </li>
            <li>
              <t><strong>granted</strong>: Boolean indicating whether permission is granted (true) or denied (false)</t>
            </li>
            <li>
              <t><strong>granted_at</strong>: ISO 8601 timestamp when this specific permission was granted</t>
            </li>
            <li>
              <t><strong>conditions</strong>: Optional array of strings describing conditions or restrictions</t>
            </li>
          </ul>
        </section>
        <section anchor="proof-mechanism-objects">
          <name>Proof Mechanism Objects</name>
          <t>Each object in the <tt>proof_mechanisms</tt> array MUST contain:</t>
          <ul spacing="normal">
            <li>
              <t><strong>proof_type</strong>: String identifying the proof mechanism type</t>
            </li>
            <li>
              <t><strong>timestamp</strong>: ISO 8601 timestamp when proof was created</t>
            </li>
            <li>
              <t><strong>proof_data</strong>: Object containing proof-type-specific data</t>
            </li>
          </ul>
          <t>Supported proof types include:</t>
          <ul spacing="normal">
            <li>
              <t><strong>verbal_confirmation</strong>: Lawful basis given verbally within the conversation</t>
            </li>
            <li>
              <t><strong>signed_document</strong>: External signed lawful basis form or agreement</t>
            </li>
            <li>
              <t><strong>cryptographic_signature</strong>: Digital signature using COSE standards</t>
            </li>
            <li>
              <t><strong>external_system</strong>: Lawful basis recorded in external system with API verification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="example-lawful-basis-attachment">
        <name>Example Lawful Basis Attachment</name>
        <t><tt>json
{
  "type": "lawful_basis",
  "start": "2025-01-02T12:15:30Z",
  "party": 0,
  "dialog": 0,
  "encoding": "json",
  "body": {
    "lawful_basis": "consent",
    "expiration": "2026-01-02T12:00:00Z",
    "purpose_grants": [
      {
        "purpose": "recording",
        "granted": true,
        "granted_at": "2025-01-02T12:15:30Z"
      },
      {
        "purpose": "transcription",
        "granted": true,
        "granted_at": "2025-01-02T12:15:30Z"
      },
      {
        "purpose": "sentiment_analysis",
        "granted": false,
        "granted_at": "2025-01-02T12:15:30Z"
      }
    ],
    "proof_mechanisms": [
      {
        "proof_type": "verbal_confirmation",
        "timestamp": "2025-01-02T12:15:30Z",
        "proof_data": {
          "dialog_reference": 0,
          "time_offset": "00:01:23",
          "confirmation_text": "Yes, I consent to recording this call"
        }
      }
    ],
    "terms_of_service": "https://example.com/terms/v2024.1",
    "status_interval": "30d",
    "content_hash": {
      "algorithm": "sha-256",
      "canonicalization": "jcs",
      "value": "a1b2c3d4e5f6789abcdef0123456789abcdef0123456789abcdef0123456789ab"
    },
    "registry": {
      "type": "scitt",
      "url": "https://transparency.example.com/lawful_purpose/registry"
    }
  }
}
</tt></t>
      </section>
    </section>
    <section anchor="lawful-basis-processing-requirements">
      <name>Lawful Basis Processing Requirements</name>
      <section anchor="content-hash-validation">
        <name>Content Hash Validation</name>
        <t>Implementations MUST validate content hashes when present in lawful basis attachments:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Canonicalization</strong>: Apply the specified canonicalization method to the lawful basis attachment body
            </t>
            <ul spacing="normal">
              <li>
                <t>For "jcs" canonicalization: Use JSON Canonicalization Scheme per RFC 8785</t>
              </li>
              <li>
                <t>Sort object keys lexicographically</t>
              </li>
              <li>
                <t>Remove insignificant whitespace</t>
              </li>
              <li>
                <t>Ensure consistent number representations</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Hash Computation</strong>: Compute the hash using the specified algorithm
            </t>
            <ul spacing="normal">
              <li>
                <t>For "sha-256": Use SHA-256 algorithm</t>
              </li>
              <li>
                <t>For "sha-3-256": Use SHA-3-256 algorithm</t>
              </li>
              <li>
                <t>For "blake2b-256": Use BLAKE2b-256 algorithm</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Hash Verification</strong>: Compare computed hash with the provided value
            </t>
            <ul spacing="normal">
              <li>
                <t>Reject processing if hashes do not match</t>
              </li>
              <li>
                <t>Log hash validation results for audit purposes</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Error Handling</strong>: Provide specific error reporting for hash validation failures
            </t>
            <ul spacing="normal">
              <li>
                <t><strong>ContentHashMismatchError</strong>: Computed hash does not match provided value</t>
              </li>
              <li>
                <t><strong>UnsupportedHashAlgorithmError</strong>: Hash algorithm not supported by implementation</t>
              </li>
              <li>
                <t><strong>UnsupportedCanonicalizationError</strong>: Canonicalization method not supported by implementation</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
      <section anchor="temporal-validity">
        <name>Temporal Validity</name>
        <t>Implementations MUST validate lawful basis expiration before processing:</t>
        <ol spacing="normal" type="1"><li>
            <t>Compare current time against <tt>expiration</tt> timestamp</t>
          </li>
          <li>
            <t>Account for reasonable clock skew (maximum 5 minutes recommended)</t>
          </li>
          <li>
            <t>Reject processing if lawful basis has expired</t>
          </li>
          <li>
            <t>Support <tt>null</tt> expiration for indefinite validity subject to revalidation intervals</t>
          </li>
        </ol>
      </section>
      <section anchor="reference-validation">
        <name>Reference Validation</name>
        <t>Implementations MUST validate attachment references:</t>
        <ol spacing="normal" type="1"><li>
            <t>Verify <tt>party</tt> index exists in vCon parties array</t>
          </li>
          <li>
            <t>Verify <tt>dialog</tt> indices exist in vCon dialog array</t>
          </li>
        </ol>
      </section>
      <section anchor="granular-permission-evaluation">
        <name>Granular Permission Evaluation</name>
        <t>When processing vCon content, implementations MUST:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for applicable lawful basis attachments for the requested processing purpose</t>
          </li>
          <li>
            <t>Evaluate all relevant purpose grants for the specific purpose</t>
          </li>
          <li>
            <t>Apply most restrictive permission when multiple grants apply</t>
          </li>
          <li>
            <t>Deny processing if no valid permission exists or if it is explicitly denied</t>
          </li>
        </ol>
      </section>
      <section anchor="proof-verification">
        <name>Proof Verification</name>
        <t>Implementations SHOULD verify proof mechanisms when present:</t>
        <ol spacing="normal" type="1"><li>
            <t>Validate cryptographic signatures using appropriate algorithms</t>
          </li>
          <li>
            <t>Verify external document integrity using content hashes</t>
          </li>
          <li>
            <t>Check external system lawful basis status via API calls</t>
          </li>
          <li>
            <t>Log proof verification results for audit purposes</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="transparency-service-integration">
      <name>Transparency Service Integration</name>
      <section anchor="registry-services">
        <name>Registry Services</name>
        <t>The optional <tt>registry</tt> field enables integration with external attestation registries for audit trails. The <tt>registry</tt> object's <tt>type</tt> field specifies the protocol to be used.</t>
        <t>When the <tt>registry</tt> object is present and its <tt>type</tt> is "scitt", the <tt>url</tt> field MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Reference a SCITT (Supply Chain Integrity, Transparency, and Trust) Transparency Service implementing SCRAPI <xref target="I-D.draft-ietf-scitt-scrapi-05"/></t>
          </li>
          <li>
            <t>Provide cryptographic receipts for state changes</t>
          </li>
          <li>
            <t>Support status queries and updates</t>
          </li>
          <li>
            <t>Implement appropriate access controls and privacy protections</t>
          </li>
        </ul>
        <t>Other transparency service types may be used if they are registered with IANA. The documentation for each registered type must specify the necessary protocols and interaction models.</t>
      </section>
      <section anchor="registry-integration-requirements">
        <name>Registry Integration Requirements</name>
        <t>Implementations that support registries MUST:</t>
        <ol spacing="normal" type="1"><li>
            <t>Use HTTPS with TLS 1.2 or higher for all communications</t>
          </li>
          <li>
            <t>Implement appropriate authentication mechanisms</t>
          </li>
          <li>
            <t>Validate SCITT receipts using standard verification procedures</t>
          </li>
          <li>
            <t>Handle service unavailability gracefully</t>
          </li>
          <li>
            <t>Cache lawful basis state within configured intervals</t>
          </li>
        </ol>
      </section>
      <section anchor="privacy-considerations-for-registries">
        <name>Privacy Considerations for Registries</name>
        <t>Registry services SHOULD:</t>
        <ul spacing="normal">
          <li>
            <t>Store only lawful basis metadata, not full conversation content</t>
          </li>
          <li>
            <t>Implement privacy-preserving query mechanisms</t>
          </li>
          <li>
            <t>Maintain audit logs for regulatory compliance</t>
          </li>
          <li>
            <t>Support deletion and other personal data compliance responsibilities</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="error-handling">
      <name>Error Handling</name>
      <t>Implementations SHOULD provide specific error reporting:</t>
      <ul spacing="normal">
        <li>
          <t><strong>LawfulBasisExpiredError</strong>: Lawful basis has expired and cannot be used</t>
        </li>
        <li>
          <t><strong>PermissionDeniedError</strong>: Permission explicitly denies the requested processing</t>
        </li>
        <li>
          <t><strong>LawfulBasisMissingError</strong>: No valid lawful basis found for the requested processing</t>
        </li>
        <li>
          <t><strong>ProofVerificationError</strong>: Lawful basis proof mechanisms failed validation</t>
        </li>
        <li>
          <t><strong>ReferenceValidationError</strong>: Attachment references invalid vCon elements</t>
        </li>
        <li>
          <t><strong>ContentHashMismatchError</strong>: Computed hash does not match provided value</t>
        </li>
        <li>
          <t><strong>UnsupportedHashAlgorithmError</strong>: Hash algorithm not supported by implementation</t>
        </li>
        <li>
          <t><strong>UnsupportedCanonicalizationError</strong>: Canonicalization method not supported by implementation</t>
        </li>
      </ul>
    </section>
    <section anchor="interoperability">
      <name>Interoperability</name>
      <t>To ensure interoperability across implementations:</t>
      <ul spacing="normal">
        <li>
          <t>Use only standard JSON data types in lawful basis body structures</t>
        </li>
        <li>
          <t>Support graceful degradation when advanced features are unavailable</t>
        </li>
        <li>
          <t>Implement lawful basis attachment format negotiation for multi-party exchanges</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The <tt>vcon-core</tt> specification provides general-purpose security mechanisms, such as digital signatures, designed to ensure the basic integrity of the vCon container. These mechanisms answer the question, "Has this vCon been tampered with?" However, managing lawful basis requires addressing a more specific and legally significant question: "Did this specific person provide a valid basis for this specific action at a specific time?" Answering this question requires a higher level of security and contextual awareness. The following sections detail the additional security considerations that are critical for a lawful basis mechanism to be considered trustworthy and compliant with privacy regulations.</t>
      <section anchor="cryptographic-protection-and-forgery">
        <name>Cryptographic Protection and Forgery</name>
        <t><strong>Background:</strong> Forgery is the act of creating a fake record or altering an existing one—for instance, by changing the expiration date, expanding the scope of what was agreed to, or faking the identity of the party. The ability to prove that a lawful basis is authentic and unaltered is the bedrock of any privacy compliance framework like GDPR or CCPA. A forged record is equivalent to having no lawful basis at all and carries severe legal and financial penalties. While <tt>vcon-core</tt> provides a <tt>signature</tt> field, this extension adds the necessary business rules to ensure that a signature represents a trusted, verifiable, and legally binding act.</t>
        <t><strong>Requirements:</strong> Implementations MUST prevent forgery through:</t>
        <ul spacing="normal">
          <li>
            <t>Cryptographic signature verification for digital proof mechanisms.</t>
          </li>
          <li>
            <t>External document integrity validation using content hashes.</t>
          </li>
          <li>
            <t>Secure communication channels for external verification.</t>
          </li>
          <li>
            <t>Audit logging of all validation activities.</t>
          </li>
        </ul>
      </section>
      <section anchor="replay-attack-prevention">
        <name>Replay Attack Prevention</name>
        <t><strong>Background:</strong> A replay attack involves an attacker copying a valid lawful basis attachment from one vCon and maliciously inserting it into a different vCon that the user never actually provided a basis for. Without replay protection, a user's lawful basis for a non-sensitive inquiry could be "replayed" to appear as if they provided it for the recording and analysis of a highly sensitive conversation. This would be a massive privacy violation and would render the mechanism meaningless.</t>
        <t><strong>Requirements:</strong> The lawful basis attachment design MUST prevent replay attacks through:</t>
        <ul spacing="normal">
          <li>
            <t>Cryptographic binding to specific vCon instances.</t>
          </li>
          <li>
            <t>Timestamp validation with appropriate clock skew tolerance.</t>
          </li>
          <li>
            <t>Nonce inclusion in proof mechanisms where applicable.</t>
          </li>
          <li>
            <t>Reference validation to ensure lawful basis applies to correct content.</t>
          </li>
        </ul>
      </section>
      <section anchor="secure-communication-channels">
        <name>Secure Communication Channels</name>
        <t><strong>Background:</strong> Lawful basis records are themselves sensitive personal data. It is critical that they are protected while in transit between systems. An attacker in a "man-in-the-middle" position could intercept a vCon and alter it before it reaches its destination, potentially stripping or modifying lawful basis information.</t>
        <t><strong>Requirements:</strong> All lawful basis attachments MUST be integrity protected using vCon signing mechanisms as defined in <xref target="I-D.draft-ietf-vcon-core-00"/>. Lawful basis attachments containing sensitive information SHOULD be encrypted when transmitted outside secure environments, for instance by using TLS 1.2 or higher for all communications.</t>
      </section>
      <section anchor="audit-logging">
        <name>Audit Logging</name>
        <t><strong>Background:</strong> Lawful basis is a matter of legal and regulatory compliance. If a dispute arises, the organization processing the data must be able to <em>prove</em> it had a valid lawful basis at the time of the action. An audit log provides this crucial, non-repudiable evidence for regulators, auditors, and courts. It is a cornerstone of the "accountability" principle in modern privacy law.</t>
        <t><strong>Requirements:</strong> Systems that process or manage lawful basis attachments SHOULD maintain a secure, immutable record of all related activities (e.g., when a lawful basis was given, checked, revoked, or expired). When a <tt>registry</tt> is used, this requirement may be fulfilled by the registry service.</t>
      </section>
    </section>
    <section anchor="privacy-and-regulatory-compliance">
      <name>Privacy and Regulatory Compliance</name>
      <section anchor="data-minimization">
        <name>Data Minimization</name>
        <t>Lawful basis attachments MUST implement data minimization principles by:</t>
        <ul spacing="normal">
          <li>
            <t>Including only information necessary for verification</t>
          </li>
          <li>
            <t>Avoiding duplication of personal data already in vCon elements</t>
          </li>
          <li>
            <t>Supporting attachment redaction while maintaining verifiability</t>
          </li>
          <li>
            <t>Implementing privacy-preserving verification mechanisms</t>
          </li>
        </ul>
      </section>
      <section anchor="regulatory-alignment">
        <name>Regulatory Alignment</name>
        <t>The lawful basis extension addresses requirements from major privacy regulations:</t>
        <ul spacing="normal">
          <li>
            <t><strong>GDPR Article 7</strong>: Conditions for lawful basis including withdrawal mechanisms</t>
          </li>
          <li>
            <t><strong>CCPA Section 1798.135</strong>: Requirements for personal information processing</t>
          </li>
          <li>
            <t><strong>HIPAA Privacy Rule</strong>: Requirements for protected health information</t>
          </li>
        </ul>
        <t>Implementers MUST ensure their implementations comply with applicable regulations in their jurisdiction.</t>
      </section>
      <section anchor="data-subject-rights">
        <name>Data Subject Rights</name>
        <t>Implementations MUST support data subject rights including:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Right of Access</strong>: Enable data subjects to access their records</t>
          </li>
          <li>
            <t><strong>Right of Rectification</strong>: Allow correction of inaccurate information</t>
          </li>
          <li>
            <t><strong>Right to be Forgotten</strong>: Support deletion and data erasure</t>
          </li>
          <li>
            <t><strong>Right of Portability</strong>: Enable export of data in interoperable formats</t>
          </li>
          <li>
            <t><strong>Withdrawal</strong>: Provide mechanisms for revocation of a lawful basis</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>This document defines a comprehensive lawful basis extension for vCon that balances privacy protection with practical implementation requirements. The extension provides a foundation for lawful basis-aware conversation processing while maintaining compatibility with existing vCon infrastructure.</t>
    </section>
    <section anchor="security-and-privacy-considerations-summary">
      <name>Security and Privacy Considerations Summary</name>
      <t>This lawful basis extension addresses several critical security and privacy concerns:</t>
      <t><strong>Integrity</strong>: Cryptographic protection prevents unauthorized modification of records while maintaining verifiability across system boundaries.</t>
      <t><strong>Temporal Security</strong>: Expiration controls and revalidation intervals ensure a lawful basis cannot be misused beyond its intended temporal scope.</t>
      <t><strong>Audit Transparency</strong>: SCITT integration provides cryptographic audit trails for operations while maintaining privacy protections.</t>
      <t><strong>Regulatory Compliance</strong>: Structured management supports compliance with GDPR, CCPA, HIPAA and other privacy regulations through standardized metadata and processing controls.</t>
      <t><strong>Data Minimization</strong>: Privacy-preserving design minimizes data collection and supports lawful basis-driven access controls throughout the conversation lifecycle.</t>
      <t>Implementers should conduct thorough security reviews and ensure compliance with applicable privacy regulations in their deployment environments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3339" target="https://www.rfc-editor.org/rfc/rfc3339.html">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author initials="G." surname="Klyne" fullname="G. Klyne">
              <organization/>
            </author>
            <date year="2002" month="July"/>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-vcon-core-00" target="I-D.draft-ietf-vcon-core-00">
          <front>
            <title>Virtualized Conversation (vCon) Container</title>
            <author initials="D." surname="Petrie" fullname="Daniel Petrie">
              <organization>SIPez LLC</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-vcon-core-00"/>
        </reference>
        <reference anchor="I-D.draft-ietf-scitt-scrapi-05" target="I-D.draft-ietf-scitt-scrapi-05">
          <front>
            <title>SCITT Receipt API</title>
            <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date year="2025" month="February"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-scrapi-05"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/rfc/rfc8949.html">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC8785" target="https://www.rfc-editor.org/rfc/rfc8785.html">
          <front>
            <title>JSON Canonicalization Scheme (JCS)</title>
            <author initials="A." surname="Rundgren" fullname="A. Rundgren">
              <organization>Independent</organization>
            </author>
            <date year="2020" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC7693" target="https://www.rfc-editor.org/rfc/rfc7693.html">
          <front>
            <title>The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)</title>
            <author initials="M." surname="Saarinen" fullname="M. Saarinen">
              <organization>Independent</organization>
            </author>
            <date year="2015" month="November"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-vcon-overview" target="I-D.draft-ietf-vcon-overview-00">
          <front>
            <title>The vCon - Conversation Data Container - Overview</title>
            <author initials="T." surname="McCarthy-Howe" fullname="Thomas McCarthy-Howe">
              <organization>Strolid</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-vcon-overview-00"/>
        </reference>
        <reference anchor="GDPR" target="https://gdpr.eu/">
          <front>
            <title>General Data Protection Regulation</title>
            <author>
              <organization>European Union</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="CCPA" target="https://oag.ca.gov/privacy/ccpa">
          <front>
            <title>California Consumer Privacy Act</title>
            <author>
              <organization>State of California</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="HIPAA" target="https://www.hhs.gov/hipaa/index.html">
          <front>
            <title>Health Insurance Portability and Accountability Act</title>
            <author>
              <organization>U.S. Department of Health and Human Services</organization>
            </author>
            <date year="1996"/>
          </front>
        </reference>
        <reference anchor="NIST-PRIVACY" target="https://www.nist.gov/privacy-framework">
          <front>
            <title>NIST Privacy Framework</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="COSE-ALG" target="https://www.iana.org/assignments/cose/cose.xhtml">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="September"/>
          </front>
        </reference>
        <reference anchor="FIPS-180-4" target="https://csrc.nist.gov/publications/detail/fips/180/4/final">
          <front>
            <title>Secure Hash Standard (SHS)</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="FIPS-202" target="https://csrc.nist.gov/publications/detail/fips/202/final">
          <front>
            <title>SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 586?>

<section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="vcon-extensions-names-registry">
        <name>vCon Extensions Names Registry</name>
        <t>This document requests IANA to register the following extension in the vCon Extensions Names Registry established by <xref target="I-D.draft-ietf-vcon-core-00"/>:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Extension Name</strong>: lawful_basis</t>
          </li>
          <li>
            <t><strong>Extension Description</strong>: Lawful basis management for conversation participants with cryptographic proof mechanisms and regulatory compliance support</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document(s)</strong>: RFC XXXX</t>
          </li>
        </ul>
      </section>
      <section anchor="attachment-object-parameter-names-registry">
        <name>Attachment Object Parameter Names Registry</name>
        <t>This document requests IANA to register the following parameter in the Attachment Object Parameter Names Registry:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Parameter Name</strong>: type</t>
          </li>
          <li>
            <t><strong>Parameter Description</strong>: Semantic type identifier for attachment content</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document(s)</strong>: RFC XXXX, Section 4</t>
          </li>
        </ul>
        <t>Note: This addresses the "TODO: type or purpose" noted in Section 6.3.6 of <xref target="I-D.draft-ietf-vcon-core-00"/>.</t>
      </section>
      <section anchor="lawful-basis-attachment-type-values-registry">
        <name>Lawful Basis Attachment Type Values Registry</name>
        <t>This document requests IANA to establish a new registry for lawful basis attachment type values with the following initial registration:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Type Value</strong>: lawful_basis</t>
          </li>
          <li>
            <t><strong>Description</strong>: Structured lawful purpose records with temporal validity and cryptographic proof mechanisms</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document(s)</strong>: RFC XXXX</t>
          </li>
        </ul>
        <t>Registration Template:</t>
        <t><strong>Type Value</strong>: The string value used as the attachment type identifier</t>
        <t><strong>Description</strong>: Brief description of the attachment type and its purpose</t>
        <t><strong>Change Controller</strong>: For Standards Track RFCs, list "IESG". For others, give the name of the responsible party.</t>
        <t><strong>Specification Document(s)</strong>: Reference to defining documents with URIs where available
## Lawful Basis Registry Type Values Registry</t>
        <t>This document requests IANA to establish a new registry for lawful basis registry type values with the following initial registration:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Type Value</strong>: scitt</t>
          </li>
          <li>
            <t><strong>Description</strong>: A transparency service implementing the SCITT (Supply Chain Integrity, Transparency, and Trust) protocol.</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document(s)</strong>: RFC XXXX, <xref target="I-D.draft-ietf-scitt-scrapi-05"/></t>
          </li>
        </ul>
        <t>Registration Template:</t>
        <t><strong>Type Value</strong>: The string value used as the registry type identifier</t>
        <t><strong>Description</strong>: Brief description of the registry type and its purpose</t>
        <t><strong>Change Controller</strong>: For Standards Track RFCs, list "IESG". For others, give the name of the responsible party.</t>
        <t><strong>Specification Document(s)</strong>: Reference to defining documents with URIs where available</t>
      </section>
      <section anchor="lawful-basis-content-hash-algorithm-values-registry">
        <name>Lawful Basis Content Hash Algorithm Values Registry</name>
        <t>This document requests IANA to establish a new registry for lawful basis content hash algorithm values with the following initial registrations:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Algorithm Value</strong>: sha-256</t>
          </li>
          <li>
            <t><strong>Description</strong>: SHA-256 hash algorithm as defined in FIPS 180-4</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document(s)</strong>: RFC XXXX, <xref target="FIPS-180-4"/></t>
          </li>
          <li>
            <t><strong>Algorithm Value</strong>: sha-3-256</t>
          </li>
          <li>
            <t><strong>Description</strong>: SHA-3-256 hash algorithm as defined in FIPS 202</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document(s)</strong>: RFC XXXX, <xref target="FIPS-202"/></t>
          </li>
          <li>
            <t><strong>Algorithm Value</strong>: blake2b-256</t>
          </li>
          <li>
            <t><strong>Description</strong>: BLAKE2b-256 hash algorithm as defined in RFC 7693</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document(s)</strong>: RFC XXXX, <xref target="RFC7693"/></t>
          </li>
        </ul>
        <t>Registration Template:</t>
        <t><strong>Algorithm Value</strong>: The string value used as the hash algorithm identifier</t>
        <t><strong>Description</strong>: Brief description of the hash algorithm and its purpose</t>
        <t><strong>Change Controller</strong>: For Standards Track RFCs, list "IESG". For others, give the name of the responsible party.</t>
        <t><strong>Specification Document(s)</strong>: Reference to defining documents with URIs where available</t>
      </section>
      <section anchor="lawful-basis-content-hash-canonicalization-values-registry">
        <name>Lawful Basis Content Hash Canonicalization Values Registry</name>
        <t>This document requests IANA to establish a new registry for lawful basis content hash canonicalization values with the following initial registration:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Canonicalization Value</strong>: jcs</t>
          </li>
          <li>
            <t><strong>Description</strong>: JSON Canonicalization Scheme as defined in RFC 8785</t>
          </li>
          <li>
            <t><strong>Change Controller</strong>: IESG</t>
          </li>
          <li>
            <t><strong>Specification Document(s)</strong>: RFC XXXX, <xref target="RFC8785"/></t>
          </li>
        </ul>
        <t>Registration Template:</t>
        <t><strong>Canonicalization Value</strong>: The string value used as the canonicalization method identifier</t>
        <t><strong>Description</strong>: Brief description of the canonicalization method and its purpose</t>
        <t><strong>Change Controller</strong>: For Standards Track RFCs, list "IESG". For others, give the name of the responsible party.</t>
        <t><strong>Specification Document(s)</strong>: Reference to defining documents with URIs where available</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <ul spacing="normal">
        <li>
          <t>Appreciation to Vinnie Micciche for his unwavering support during the development of this lawful basis attachment in particular, and vCons in general.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
