<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.5) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-vcon-privacy-primer-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="privacy primer">Privacy Primer for vCon Developers</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-vcon-privacy-primer-00"/>
    <author fullname="Diana James">
      <organization>Marashlian &amp; Donahue, PLLC</organization>
      <address>
        <email>daj@commlawgroup.com</email>
      </address>
    </author>
    <author fullname="Thomas McCarthy-Howe">
      <organization>Strolid</organization>
      <address>
        <email>thomas.howe@strolid.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="21"/>
    <keyword>vcon</keyword>
    <keyword>privacy</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 53?>
<t>This document serves as a primer for technical professionals involved in the processing (which includes collecting, using, disclosure, and erasure) of personal data, including not only basic identifiers like name, age, and address, but also sensitive data contained in communications, including biometrics obtained from audio and video recordings.
It outlines key concepts in data privacy and communications privacy, addressing the ethical and legal considerations surrounding the collection, processing, sharing, access, retention, and disclosure of individuals’ data.
The document covers fundamental privacy principles, defines important roles in data processing, and explains individuals’ rights regarding their personal information.
It also discusses the scope of protected personal information, including sensitive data categories, and explores techniques like data aggregation and anonymization.
While referencing existing IETF work on privacy in Internet communications, this draft extends beyond to address individuals' data privacy in relation to organizations handling such data.
The goal is to provide a comprehensive overview of privacy considerations, aligning with fair information practices and current regulatory frameworks, to guide professionals in implementing privacy-respecting data management practices.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-vcon.github.io/draft-ietf-vcon-privacy-primer/draft-ietf-vcon-privacy-primer.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-vcon-privacy-primer/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Virtualized Conversations Working Group mailing list (<eref target="mailto:vcon@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/vcon/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/vcon/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-vcon/draft-ietf-vcon-privacy-primer"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The democratization of technology has led to a surge of new entrants in the growing market of personal data management.
These entrants, driven by various motives ranging from commerce and regulation to fraud prevention and charitable causes, are increasingly engaging with conversational data across network boundaries.
The vCon (Virtual Conversation) represents a significant step forward in this landscape, enabling the processing and ethical sharing of conversational data and fostering a rich ecosystem of services based on a novel concept: genuinely listening to what customers say.</t>
      <t>However, many of these new entrants may not inherently understand the ethical and legal complexities surrounding crucial topics such as data minimization, legal basis for processing, redaction, the right to know, and the right to erasure.
The design decisions behind the vCon framework directly address these concerns, incorporating features such as encryption capabilities, external data signing for change detection, and the creation of redacted versions that maintain a trail to the original data.</t>
      <section anchor="purpose-of-this-document">
        <name>Purpose of this Document</name>
        <t>This document serves as a primer for individuals and organizations grappling with the challenges of responsible management of personal data, including biometric information contained in audio and video recordings, or other sources of sensitive information, in messaging or other personal communications.
It aims to provide a foundational understanding of key topics, explaining their importance and how they are addressed (or not) within the vCon framework.
While the vCon is not a panacea, it offers a structure that enables well-intentioned actors to operate ethically and responsibly.
Much like the distinction between HTTP and HTTPS, where HTTPS is trusted by default and HTTP is not, the vCon framework provides a basis for trust, with legal systems managing those who operate outside its principles.
IETF standards already address privacy in Internet communications, including the principle of data minimization <xref target="RFC7258"/>.
However, those standards generally do not address the privacy of individuals' data privacy vis-à-vis organizations that collect, process, and disclose their data.</t>
      </section>
      <section anchor="intended-audience">
        <name>Intended Audience</name>
        <t>This primer is designed to cater to three primary constituencies often present in IETF discussions:</t>
        <ul spacing="normal">
          <li>
            <t>Technologists and Engineers: Often immersed in technical details, these professionals may benefit from understanding the broader ethical and legal considerations that should inform their designs.
This document aims to bridge the gap between technical implementation and important "non-technical" issues they need to consider.</t>
          </li>
          <li>
            <t>Regulators, Lawyers, and Government Representatives: Responsible for tech policy, these individuals often approach discussions with the perspectives of their constituencies but are generally open to education.
This document seeks to provide them with a clearer understanding of how their legal concerns are addressed within the vCon framework and what aspects fall outside its scope.</t>
          </li>
          <li>
            <t>Non-Governmental Organizations (NGOs): Particularly those focused on privacy, security, and human rights, these organizations represent the intersection of policy and technology.
Often skeptical of commercial and government interests, this audience will find information on how the vCon supports personal data privacy, transparency, and control.</t>
          </li>
        </ul>
      </section>
      <section anchor="goals-of-this-document">
        <name>Goals of this Document</name>
        <t>The primary objectives of this primer are:</t>
        <ul spacing="normal">
          <li>
            <t>To educate an expanding audience on the fundamental concepts of responsible customer data management.</t>
          </li>
          <li>
            <t>To foster a common understanding of the challenges involved in personal data handling.</t>
          </li>
          <li>
            <t>To provide an informed perspective on what is currently addressed by the vCon framework and what remains outside its scope.</t>
          </li>
          <li>
            <t>To encourage thoughtful consideration of ethical and legal issues in the design and implementation of systems handling personal data.</t>
          </li>
        </ul>
        <t>By achieving these goals, we aim to contribute to a more informed and responsible approach to personal data management across various sectors and disciplines.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="privacy-and-vcon-in-general">
        <name>Privacy and vCon – In General</name>
        <t>Privacy in general can be understood as "the right to be let alone" [Warren1890]. It may be helpful to think of it in four aspects:</t>
        <ol spacing="normal" type="1"><li>
            <t>personal information (or data) privacy,</t>
          </li>
          <li>
            <t>bodily privacy,</t>
          </li>
          <li>
            <t>territorial privacy, and</t>
          </li>
          <li>
            <t>communications privacy.</t>
          </li>
        </ol>
        <t>In the context of vCon, we will concentrate on <strong>data privacy</strong> and <strong>communications privacy.</strong></t>
      </section>
      <section anchor="data-privacy">
        <name>Data privacy</name>
        <t>Data privacy, also known as information privacy or data protection, refers to the practice of safeguarding individuals' personal information from unauthorized access, use, disclosure, alteration, or destruction.
It involves ensuring that individuals have control over their own personal data and that organizations that collect, store, and process personal data do so in a manner that respects individuals' privacy rights.</t>
        <t>Many countries and regions have enacted legislation to protect individuals' personal data, but their specific rules vary by jurisdiction.
Examples of data privacy laws include the General Data Protection Regulation (GDPR) in the European Union, the Health Insurance Portability and Accountability Act (HIPAA) and California Consumer Privacy Act (CCPA) in the United States, and the Personal Data Protection Act (PDPA) in Singapore.
The U.S. data privacy legal landscape is a particularly complex patchwork of federal and state laws. It includes comprehensive state-level data privacy acts, industry-specific federal laws, and intricate pre-emption relationships between them, creating a fragmented and multifaceted regulatory environment.</t>
        <t>This document outlines common privacy rights and obligations as of the time of this writing in alignment with fair information practices (FIP), which are widely recognized principles but may or may not be legally required, depending on the jurisdiction.
The framework presented here offers a general understanding of data privacy principles but does not guarantee legal compliance in any specific region.
Readers are encouraged to seek legal or technical advice for their particular jurisdiction, industry(-ies), and situations.</t>
        <section anchor="key-roles-in-data-processing">
          <name>Key Roles in Data Processing</name>
          <t>The following terms are used by the GDPR and in the privacy industry in general to define the three key roles in data processing:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Data Subject</strong>: The individual whose personal information is being processed (also referred to as “individual" in this RFC and "consumer" in some data privacy laws).</t>
            </li>
            <li>
              <t><strong>Data Controller</strong>: An organization or individual with decision-making authority over data processing who has the legal basis to process data and determines the purposes and methods of data processing, bears primary responsibility under privacy laws and is the main target of most privacy and data protection regulations.</t>
            </li>
            <li>
              <t><strong>Data Processor</strong>: Often a third-party service provider who processes data on behalf of the data controller. Under HIPAA, data processors are referred to as "business associates." Data processors may be hired for specialized tasks or to improve efficiency; can subcontract to other processors, creating a chain of responsibility; must operate within the scope defined by the data controller; and are expected to maintain trust and adhere to the controller's guidelines.</t>
            </li>
          </ol>
          <t>The relationship between these entities forms a hierarchy of responsibility and trust.
The data controller sets the parameters for data use, while processors at various levels must operate within these boundaries.
This structure ensures accountability and helps maintain data privacy throughout the information processing chain.</t>
        </section>
        <section anchor="what-data-rights-do-data-subjects-have">
          <name>What Data Rights do Data Subjects Have?</name>
          <t>Regarding individual rights in data privacy, organizations should focus on six key areas:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Notice of Data Processing</strong>: Organizations must clearly communicate their privacy policies and practices. This includes explaining what personal data is collected and for which purposes, how it is used, stored, and shared, and how individuals can exercise their data privacy rights. This ensures transparency, holds data controllers accountable, and empowers individuals to make informed choices about their personal information.</t>
            </li>
            <li>
              <t><strong>Consent</strong>: Organizations need to obtain data subjects' informed and freely given consent for collecting, using, storing, and sharing personal data. Different levels of consent consent may apply to different kinds of data or in different jurisdictions:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Consent can be affirmative ("opt-in" consent) or presumed unless stated otherwise ("opt-out" consent). Opt-in consent is usually required for sensitive data and children's data (under 13 or 16 years old).</t>
                </li>
                <li>
                  <t>Consent can be written, oral, or implied.</t>
                </li>
                <li>
                  <t>In some jurisdictions, such as California, consent must be sought at or before the point of data collection.
It should also be noted that consent can be layered (i.e. provided for one function but not others) and revoked at any time by the data subject, and data controllers/processors need to act on this expediently. Consent Management is therefore a key requirement when handling personal data.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><strong>Access</strong>: Organizations should offer mechanisms for individuals to access and correct their personal data. This empowers people to ensure their data is accurate and up-to-date.</t>
            </li>
            <li>
              <t><strong>Data Choices</strong>: In addition to rights to access and correct, data subjects often have the following data privacy rights:
              </t>
              <ul spacing="normal">
                <li>
                  <t>right to have their information deleted (also referred to as the "right to be forgotten");</t>
                </li>
                <li>
                  <t>right to download their data in a readily readable format and provide their data to a different data controller;</t>
                </li>
                <li>
                  <t>right to opt out of certain data practices, such as sale of their data, profiling, targeted/cross contextual behavioral advertising, automated decision-making.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><strong>Non-Discrimination</strong>: Organizations must not discriminate against individuals who choose to exercise their data privacy rights.</t>
            </li>
            <li>
              <t><strong>Breach Notification</strong>: The large amounts of data held by organizations attract cyber criminals, increases the risk of data breaches.
To mitigate the consequences of data breaches and incentivize advanced data security practices, most jurisdictions require reasonable security safeguards and prompt notification of affected individuals when breaches occur. Many regulatory bodies require notification from a data controller within 30 days of discovery. Controllers are also required to take prompt incident response measures to mitigate breaches and promptly inform and assist data subjects with breach mitigation.
This holds organizations accountable for data security and allows individuals to take protective actions.</t>
            </li>
          </ol>
          <t>By addressing these areas, organizations can respect individual privacy rights and build trust with their customers or users.
This approach aligns with many modern data protection regulations and best practices in privacy management.</t>
        </section>
        <section anchor="what-data-is-protected">
          <name>What Data Is Protected?</name>
          <t>Data privacy laws protect personal information, though its scope can vary across different laws. In general, the term "personal information" (also known as "personally identifiable information" or "PII") includes information that makes it possible to identify an individual or information about an "identified" or "identifiable" individual. Privacy laws may further extend the scope of PII: for example, the California Privacy Rights Act's definition of PII includes information about an individual and the individual's household, as well as employment data.</t>
          <t>In general, examples of PII include:</t>
          <ul spacing="normal">
            <li>
              <t>Basic identifiers: Name, addresses (postal and email), government-issued identification numbers</t>
            </li>
            <li>
              <t>Digital identifiers: IP address (in some jurisdictions like California).</t>
            </li>
            <li>
              <t>Financial Data: financial account number or credit or debit card number, often in combination with any required security code or password that would permit access to a data subject’s financial account.</t>
            </li>
            <li>
              <t>Health data, including mental health or substance abuse information. Many healthcare identifiers are similar to other types of personal data (like names and addresses), but others may refer to specialized information like health insurance details and medical codes.</t>
            </li>
            <li>
              <t>Characteristics protected under various civil rights and non-discrimination laws: Race, religion, disability, sexual orientation, national origin, etc.</t>
            </li>
            <li>
              <t>Consumer behavior: Purchase history, product interests, consumption patterns.</t>
            </li>
            <li>
              <t>Biometric data, including voiceprints, faceprints, fingerprints.</t>
            </li>
            <li>
              <t>Online activity: Browsing and search history, website and app interaction.</t>
            </li>
            <li>
              <t>Geolocation information</t>
            </li>
            <li>
              <t>Sensory information: Audio, visual, thermal, and olfactory data.</t>
            </li>
            <li>
              <t>Professional and educational information.</t>
            </li>
          </ul>
        </section>
        <section anchor="sensitive-data">
          <name>Sensitive Data</name>
          <t>An important subset of PII to consider in designing data privacy practices is so-called "sensitive data" which is subject to a higher standard of protection and requires additional privacy and security limitations to safeguard its collection, use, and disclosure. For example, it may require an opt-in consent for data collection and processing. In various jurisdictions sensitive information may include the following:</t>
          <ul spacing="normal">
            <li>
              <t>Government-issued identifiers.</t>
            </li>
            <li>
              <t>Physical or mental health information.</t>
            </li>
            <li>
              <t>Genetic data.</t>
            </li>
            <li>
              <t>Financial data.</t>
            </li>
            <li>
              <t>Biometric information.</t>
            </li>
            <li>
              <t>Precise geolocation data (information on an individual’s location within a 1,850-foot radius).</t>
            </li>
            <li>
              <t>Log-in credentials – a customer’s account log-in, password, or credentials allowing access to an account.</t>
            </li>
            <li>
              <t>Citizenship and immigration status.</t>
            </li>
            <li>
              <t>Sexual behavior.</t>
            </li>
            <li>
              <t>Information revealing an individual's online activities over time and across websites or online services that do not share common branding or over time on any website or online service operated by a covered high-impact social media company.</t>
            </li>
            <li>
              <t>Information about minors (17 years of age or younger, depending on the applicable law).</t>
            </li>
            <li>
              <t>Certain communications data – an individual's private communications, such as voicemails, emails, texts, direct messages or mail, or information identifying the parties to such communications, information contained in telephone bills, voice communications, and any information that pertains to the transmission of voice communications, including numbers called, numbers from which calls were placed, the time calls were made, call duration and location information of the parties to the call, unless the covered entity is an intended recipient of the communication. Communications with businesses may be awarded less protection.</t>
            </li>
          </ul>
        </section>
        <section anchor="what-data-is-not-protected">
          <name>What Data Is Not Protected?</name>
          <t>The distinction between personal and nonpersonal information hinges on identifiability, meaning that personal data is identifiable and thus protected by most privacy laws when it can be reasonably linked to a particular person (or even computer or device).
This boundary has varying interpretations across jurisdictions.
For instance, IP addresses are considered personal information by the EU and FTC, but not by U.S. federal agencies under the Privacy Act. Moreover, sometimes, deidentified data can be reidentified, introducing challenges to personal data protection.
When identifying elements are removed from data, it becomes nonpersonal information, generally falling outside the scope of privacy and data protection laws.</t>
          <t>Some methods of transforming identifiable data into nonpersonal data are deidentification, anonymization, and aggregation.
On the other hand, pseudonymization (replacing identifiable data with pseudonyms/unique codes) only temporarily removes identifiable data with the possibility of relatively easy reidentification.
In many jurisdictions, pseudonymous data falls within the scope of personal data when used in conjunction with additional information that reasonably links the data to an identified or identifiable individual.</t>
          <t>Many jurisdictions remove <strong>publicly available information</strong> from the scope of protected PI.</t>
          <t><strong>Pseudonymized data</strong>, where individuals are represented by unique codes, is temporarily nonpersonal but can be reversed to reidentify individuals.
This reversibility can be crucial in scenarios like medical trials.
In many jurisdictions pseudonymous data falls within the scope of personal data when used in conjunction with additional information that reasonably links the data to an identified or identifiable individual.</t>
          <t>Many jurisdictions remove <strong>publicly available information</strong> from the scope of protected PI.</t>
        </section>
        <section anchor="deidentificationanonymization">
          <name>Deidentification/Anonymization</name>
          <t>Deidentification is the process of removing identifiable data from the dataset/document.
It may take the form of information suppression (direct removal of identifying information), generalization (replacing a data element with a more general equivalent), or noise addition (slightly altering select data).
Noise addition is the primary mechanism of differential privacy – a mathematical framework designed to ensure the privacy of individuals within a dataset while allowing for the extraction of useful statistical information by adding carefully calibrated noise to the data.
This ensures that the inclusion or exclusion of any single individual's data does not significantly affect the outcome of the analysis and adds a level of personal data protection.
Sometimes it is possible to reidentify the deidentified data using other available information.
In this context, although it is often used interchangeably with the term “deidentification,” the term “anonymization” refers to the more comprehensive irreversible removal of identifiable data.
Rigorous deidentification or anonymization techniques are highly recommended to ensure that reidentification is either impossible or extremely difficult.</t>
        </section>
        <section anchor="aggregationanonymization">
          <name>Aggregation/Anonymization</name>
          <t>Data aggregation and anonymization are important techniques used in the context of data privacy to protect individuals' personal information while still allowing organizations to derive valuable insights. However, these methods are not without risks and limitations.</t>
          <t>Data aggregation involves combining data from multiple sources or individuals into summary form. While this can obscure individual identities, there are still privacy concerns:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Re-identification risk</strong>: With enough granular data points, it may be possible to single out individuals even from aggregated datasets. Applying multiple specific filters to aggregate data could potentially identify a unique individual.</t>
            </li>
            <li>
              <t><strong>Inference attacks</strong>: Aggregated data can reveal patterns that allow inferences about individuals or small groups, even if direct identifiers are removed.</t>
            </li>
            <li>
              <t><strong>Unintended data exposure</strong>: As aggregated data is often shared between organizations, there's increased risk of unauthorized access or misuse.</t>
            </li>
          </ol>
          <t>Anonymization aims to remove or encrypt personal identifiers from datasets. However, true anonymization is challenging:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>De-identification limitations</strong>: Simply removing obvious identifiers like names and addresses is often not sufficient to prevent re-identification. Indirect identifiers can still allow individuals to be singled out.</t>
            </li>
            <li>
              <t><strong>Data utility trade-offs</strong>: More thorough anonymization techniques tend to reduce the usefulness of the data for analysis.</t>
            </li>
            <li>
              <t><strong>Evolving re-identification techniques</strong>: As technology advances, previously anonymized data may become vulnerable to new re-identification methods.</t>
            </li>
          </ol>
          <t>To mitigate these risks, organizations should consider:</t>
          <ol spacing="normal" type="1"><li>
              <t>Implementing robust anonymization techniques beyond basic de-identification.</t>
            </li>
            <li>
              <t>Carefully assessing the granularity and specificity of aggregated data released.</t>
            </li>
            <li>
              <t>Combining anonymization with other privacy-enhancing technologies like differential privacy.</t>
            </li>
            <li>
              <t>Conducting regular privacy impact assessments to evaluate potential risks.</t>
            </li>
            <li>
              <t>Adhering to relevant privacy regulations and best practices for data handling.</t>
            </li>
          </ol>
          <t>While data aggregation and anonymization can enhance privacy protection, they should not be viewed as foolproof solutions.
Organizations must remain vigilant and adopt a comprehensive approach to data privacy that considers the evolving nature of re-identification risks and the potential for unintended consequences when working with large datasets.</t>
        </section>
      </section>
      <section anchor="communications-privacy">
        <name>Communications Privacy</name>
        <t>Communications privacy is a critical concern in our increasingly interconnected world, where various forms of communication – including audio, video, text messages, and emails – have become integral to both personal and professional interactions.
Under the applicable laws, communications are protected when in transit and at rest.</t>
        <t>Understanding the multifaceted legal and ethical frameworks around communications privacy is essential for anyone involved in capturing, storing, analyzing, or managing communications data.
Communications privacy laws across various jurisdictions often share common elements, designed to protect individuals' privacy rights while balancing the needs of law enforcement and legitimate business interests.
Here are some key provisions typically found in laws governing the recording, interception, eavesdropping, and storage of communications:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Notice:</strong> Many laws require that parties be notified if their communications are being recorded or monitored, often through audible beeps, verbal announcements, or visible signage.
The unauthorized surveillance or interception of an individual's private communications or activities is generally prohibited by law.</t>
          </li>
          <li>
            <t><strong>Consent:</strong> Most laws stipulate that at least one party must consent to the recording or interception of a communication.
Some jurisdictions require all parties to consent, known as "two-party" or "all-party" consent.
The type of consent required (explicit or implied) may vary, but it has to be obtained prior to the recording.</t>
          </li>
          <li>
            <t><strong>Distinction Between Public and Private Communications:</strong> Laws often differentiate between communications where there is a reasonable expectation of privacy (e.g., private phone calls) and those in public spaces where such expectation may not exist.</t>
          </li>
          <li>
            <t><strong>Purpose Limitations:</strong> Regulations frequently specify permissible purposes for recording or intercepting communications, such as for security, quality assurance, or with court authorization for law enforcement activities.</t>
          </li>
          <li>
            <t><strong>Storage and Retention Limitations</strong>: Rules governing how long recorded communications can be stored, how they must be protected, and when they should be destroyed are common features of privacy laws.</t>
          </li>
          <li>
            <t><strong>Exceptions for Law Enforcement:</strong> Most laws include provisions allowing for authorized interception of communications by law enforcement agencies, typically requiring judicial oversight through warrants or court orders.</t>
          </li>
          <li>
            <t><strong>Technology-Specific Provisions</strong>: As technology evolves, laws may include specific provisions for different communication media, such as landlines, mobile phones, emails, instant messaging, video calls, and internet browsing activities.</t>
          </li>
          <li>
            <t><strong>Security Measures:</strong> Requirements for securing stored communications against unauthorized access, including encryption standards and access controls, are increasingly common.
Moreover, using encryption may in some cases absolve the data processor from legal liability or at least mitigate it.</t>
          </li>
        </ol>
        <t>Understanding these common provisions is crucial for compliance with communications privacy laws, regardless of the specific jurisdiction.
However, it is important to note that the exact implementation and interpretation of these provisions can vary significantly between different legal frameworks.</t>
      </section>
      <section anchor="key-privacy-principles">
        <name>Key Privacy Principles</name>
        <t>Data privacy and communications privacy are guided by similar principles, emphasizing consent, transparency, and data minimization while balancing privacy rights with societal interests.
These areas aim to safeguard individuals' control over their personal information, whether stored or transmitted.</t>
        <t>Key principles include:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Consent</strong>:   Organizations must usually seek individuals' consent for collecting, processing, and using their sensitive data (as defined under applicable laws) or recording private communications. When required, consent must be freely given, specific, informed, unambiguous, revocable, and documented. Consent may not be valid in situations with power imbalances and may not be required when PII processing is necessary to satisfy legal obligations or implement contracts.
Many jurisdictions prohibit so-called "dark patterns," which are practices of seeking consent that effectively obscure, subvert, or impair the individuals' autonomy, decision-making or choice (for example, confusing user interfaces or hidden disclosures).</t>
          </li>
          <li>
            <t><strong>Notice/Transparency</strong>: Organizations must clearly disclose their data handling practices.
Privacy notices should be concise, transparent, and easily understandable.
Changes to privacy practices must be promptly communicated.</t>
          </li>
          <li>
            <t><strong>Purpose Limitation</strong>: Personal data should be collected for specific, explicit, and legitimate purposes, and it should not be used for purposes that are incompatible with those for which it was originally collected.</t>
          </li>
          <li>
            <t><strong>Data Minimization/Collection Limitation</strong>: Organizations should collect only the minimum amount of personal data necessary to achieve the stated purpose.
Excessive or irrelevant data should not be collected.</t>
          </li>
          <li>
            <t><strong>Storage Limitation</strong>: Personal data should be retained only for as long as necessary to fulfill the purposes for which it was collected, consistent with legal limitations and requirements.
Organizations should establish retention policies and securely dispose of data that is no longer needed.</t>
          </li>
          <li>
            <t><strong>Security</strong>: Appropriate technical, physical and administrative measures must be implemented to protect covered data from unauthorized access and other risks.
This may include encryption, access controls, and regular security assessments.</t>
          </li>
          <li>
            <t><strong>Individual Rights</strong>: Individuals have certain rights regarding their personal data, including the right to access their data, the right to request corrections or deletions ("the right to be forgotten"), the right to object to certain uses of their data, and the right to data portability (the ability to transfer their data from one organization to another).</t>
          </li>
          <li>
            <t><strong>Data Integrity</strong>: Personal data should be accurate, complete, up-to-date, and trustworthy throughout its lifecycle.
The core principles of data integrity include consistency across systems, authenticity verification, and non-repudiation mechanisms.</t>
          </li>
          <li>
            <t><strong>Accountability</strong>: Organizations are responsible for complying with data privacy laws and demonstrating compliance. Organizations are also accountable for any downstream entities with which they may share personal data for a specific defined purpose. Companies must also ensure they monitor and periodically audit third parties with which they share personal data.
This may involve conducting privacy impact assessments, appointing a data protection officer, and maintaining records of data processing activities.</t>
          </li>
          <li>
            <t><strong>Recordkeeping</strong>: Many laws require organizations to maintain accurate logs of consumers' profiles, data decisions, and data usage, including sales and marketing campaigns and instances of data disclosure to third parties.</t>
          </li>
        </ol>
        <t>While data privacy and communications privacy share many principles, there are some distinctions in their regulation.
Communications privacy laws often focus more on real-time interception and communication confidentiality, while data privacy laws address a broader range of data handling practices.</t>
        <t>As the digital landscape evolves, privacy laws must continually adapt to address emerging technologies and practices, ensuring the protection of personal information in our interconnected world.</t>
      </section>
      <section anchor="artificial-intelligence-specific-considerations">
        <name>Artificial Intelligence-Specific Considerations</name>
        <t>As vCons are likely to be used in the context of artificial intelligence (AI) applications and services, either directly or tangentially, additional considerations are necessary due to the nascent regulatory environment regarding AI.</t>
        <t>One of the most advanced regulations around AI is currently the EU AI Act. In the U.S., the Colorado AI Act contains similar principles. Various organizations, such as the National Institute of Standards and Technology (NIST), have also adopted guidance related to mitigating risks associated with AI use.</t>
        <t>The EU AI Act provides a comprehensive legal framework for the development, marketing, and use of AI in the EU to promote human-centric and trustworthy uses of AI while ensuring a high level of protection of health, safety and fundamental rights. The legislation adopts a risk-based approach, distinguishing between tiers of AI use cases: prohibited (such as behavioral manipulation and sensitive biometrics), high-risk (including critical infrastructure and medical devices), limited risk, and minimal risk, with each tier subject to regulatory requirements that scale from the strictest to the lightest, accordingly.</t>
        <t>For example, key requirements for High-Risk AI use cases under the EU AI Act include:
 - stringent impact and conformity assessments and registration
 - risk and quality management
 - human oversight
 - strong data governance practices to not only mitigate bias but also ensure adequate controls of representative data used in training as well as production applications
 - transparency through technical documentation and instructions
 - privacy and data governance</t>
        <t>As such, all of the previously discussed privacy and security measures apply to AI use cases under the EU AI Act and are supplemented with additional requirements. In particular, there is an increased emphasis on robust controls over data used for model testing and training, as well as the implementation of processes to ensure effective human oversight, including ongoing monitoring and auditing.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>vCons can contain sensitive personal and conversational data, which raises several data privacy and security concerns, particularly regarding data integrity and personal privacy.
The following points outline the key security considerations for vCons:</t>
      <ol spacing="normal" type="1"><li>
          <t>Data Integrity and Immutability  </t>
          <ul spacing="normal">
            <li>
              <t>vCons need to be protected against unauthorized modifications to ensure the authenticity of the conversational data.</t>
            </li>
            <li>
              <t>Before a vCon leaves its original security domain, it should be digitally signed to prevent alteration, as specified in Section 5.2 (Signed Form of vCon Object).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Privacy Protection  </t>
          <ul spacing="normal">
            <li>
              <t>vCons often contain personally identifiable information (PII) and sensitive data that must be safeguarded.</t>
            </li>
            <li>
              <t>Different levels of redaction may be necessary, as outlined in Section 4.1.6 (redacted):
              </t>
              <ul spacing="normal">
                <li>
                  <t>PII masking: Removing PII from text, audio, video, and transcripts.</t>
                </li>
                <li>
                  <t>De-identification: Removing segments or whole recordings to prevent voice printing or facial recognition.</t>
                </li>
              </ul>
            </li>
          </ul>
        </li>
        <li>
          <t>Encrypted Storage and Transmission
          </t>
          <ul spacing="normal">
            <li>
              <t>Unredacted versions of vCons must be encrypted to protect sensitive information, as described in Section 5.3 (Encrypted Form of vCon Object).</t>
            </li>
            <li>
              <t>vCons transmitted over non-secure channels (e.g., email) must always be in encrypted form.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Access Control
          </t>
          <ul spacing="normal">
            <li>
              <t>Externally referenced files should be transported only over HTTPS, as specified in Section 2.4 (Externally Referenced Files).</t>
            </li>
            <li>
              <t>Access to unredacted vCons and their referenced files should be restricted to authorized personnel only.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Version Management
          </t>
          <ul spacing="normal">
            <li>
              <t>Multiple versions of a vCon may exist (e.g., redacted versions, versions with added analysis).</t>
            </li>
            <li>
              <t>Each version must maintain its own integrity while providing a secure reference to its predecessor, as described in Sections 4.1.6 (redacted) and 4.1.7 (appended).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Cross-Domain Security
          </t>
          <ul spacing="normal">
            <li>
              <t>vCons may be created and modified across different security domains, as discussed in Section 4 (Unsigned Form of vCon Object).</t>
            </li>
            <li>
              <t>Each domain should sign the vCon before transferring it to maintain the chain of trust, using the method in Section 5.2 (Signed Form of vCon Object).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Redaction Processes
          </t>
          <ul spacing="normal">
            <li>
              <t>While methods exist for redacting text, audio, and video, the specific techniques are beyond the scope of the vCon standard, as noted in Section 4.1.6 (redacted).</t>
            </li>
            <li>
              <t>Implementers must ensure that redaction methods effectively remove sensitive information without compromising the vCon's integrity.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Balancing Utility and Privacy
          </t>
          <ul spacing="normal">
            <li>
              <t>There is an inherent tension between maintaining the usefulness of vCons and protecting privacy, as implied throughout Section 4 (Unsigned Form of vCon Object).</t>
            </li>
            <li>
              <t>Careful consideration is needed when deciding what information to redact or encrypt.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Encryption of Referenced Content
          </t>
          <ul spacing="normal">
            <li>
              <t>Externally referenced files that are part of a vCon should be encrypted if they contain sensitive information, as suggested in Section 2.4 (Externally Referenced Files).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Audit Trail
          </t>
          <ul spacing="normal">
            <li>
              <t>vCons should maintain a secure audit trail of modifications, especially for redactions and additions, to ensure accountability.
This is supported by the structure described in Sections 4.1.6 (redacted) and 4.1.7 (appended).</t>
            </li>
          </ul>
        </li>
      </ol>
      <t>By addressing these security concerns and following the guidelines in the vCon standard, implementers can help ensure that vCons protect the privacy of individuals involved in conversations while maintaining the integrity and utility of the conversational data.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <t>[Warren1890] Warren, S.D. and Brandeis, L.D., "The Right to Privacy", Harvard Law Review, Vol. 4, No. 5, pp. 193-220, December 1890.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC6235">
          <front>
            <title>IP Flow Anonymization Support</title>
            <author fullname="E. Boschi" initials="E." surname="Boschi"/>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <date month="May" year="2011"/>
            <abstract>
              <t>This document describes anonymization techniques for IP flow data and the export of anonymized data using the IP Flow Information Export (IPFIX) protocol. It categorizes common anonymization schemes and defines the parameters needed to describe them. It provides guidelines for the implementation of anonymized data export and storage over IPFIX, and describes an information model and Options- based method for anonymization metadata export within the IPFIX protocol or storage in IPFIX Files. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6235"/>
          <seriesInfo name="DOI" value="10.17487/RFC6235"/>
        </reference>
        <reference anchor="RFC6462">
          <front>
            <title>Report from the Internet Privacy Workshop</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>On December 8-9, 2010, the IAB co-hosted an Internet privacy workshop with the World Wide Web Consortium (W3C), the Internet Society (ISOC), and MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL). The workshop revealed some of the fundamental challenges in designing, deploying, and analyzing privacy-protective Internet protocols and systems. Although workshop participants and the community as a whole are still far from understanding how best to systematically address privacy within Internet standards development, workshop participants identified a number of potential next steps. For the IETF, these included the creation of a privacy directorate to review Internet-Drafts, further work on documenting privacy considerations for protocol developers, and a number of exploratory efforts concerning fingerprinting and anonymized routing. Potential action items for the W3C included investigating the formation of a privacy interest group and formulating guidance about fingerprinting, referrer headers, data minimization in APIs, usability, and general considerations for non-browser-based protocols.</t>
              <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect the views of the IAB, W3C, ISOC, or MIT CSAIL. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6462"/>
          <seriesInfo name="DOI" value="10.17487/RFC6462"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC7624">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Schneier" initials="B." surname="Schneier"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="RFC7844">
          <front>
            <title>Anonymity Profiles for DHCP Clients</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>Some DHCP options carry unique identifiers. These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses. The anonymity profiles are designed for clients that wish to remain anonymous to the visited network. The profiles provide guidelines on the composition of DHCP or DHCPv6 messages, designed to minimize disclosure of identifying information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7844"/>
          <seriesInfo name="DOI" value="10.17487/RFC7844"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8165">
          <front>
            <title>Design Considerations for Metadata Insertion</title>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>The IAB published RFC 7624 in response to several revelations of pervasive attacks on Internet communications. This document considers the implications of protocol designs that associate metadata with encrypted flows. In particular, it asserts that designs that share metadata only by explicit actions at the host are preferable to designs in which middleboxes insert metadata.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8165"/>
          <seriesInfo name="DOI" value="10.17487/RFC8165"/>
        </reference>
        <reference anchor="RFC8280">
          <front>
            <title>Research into Human Rights Protocol Considerations</title>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
            <author fullname="C. Cath" initials="C." surname="Cath"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973). The other parts of this document explain the background of the guidelines and how they were developed.</t>
              <t>This document is the first milestone in a longer-term research effort. It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8280"/>
          <seriesInfo name="DOI" value="10.17487/RFC8280"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
    </references>
    <?line 406?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Thank you to Andy Newton for his review, suggestions and improvements</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
