<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-james-privacy-primer-vcon-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="vcon primer">Privacy Primer for vCon Developers</title>
    <seriesInfo name="Internet-Draft" value="draft-james-privacy-primer-vcon-00"/>
    <author fullname="Diana James">
      <organization>Marashlian &amp; Donahue, PLLC</organization>
      <address>
        <email>daj@commlawgroup.com</email>
      </address>
    </author>
    <author fullname="Thomas McCarthy-Howe">
      <organization>Strolid</organization>
      <address>
        <email>thomas.howe@strolid.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="06"/>
    <keyword>vcon</keyword>
    <keyword>privacy</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 42?>

<t>This document serves as a primer for technical professionals involved in managing personal data, including biometric information from audio and video recordings, and other sensitive information in messaging or personal communications. It outlines key concepts in data privacy and communications privacy, addressing the ethical and legal considerations surrounding the collection, processing, and disclosure of consumer data. The document covers fundamental privacy principles, defines important roles in data processing, and explains consumer rights regarding their personal information. It also discusses the scope of protected personal information, including sensitive data categories, and explores techniques like data aggregation and anonymization. While referencing existing IETF work on privacy in Internet communications, this draft extends beyond to address consumer data privacy in relation to organizations handling such data. The goal is to provide a comprehensive overview of privacy considerations, aligning with fair information practices and current regulatory frameworks, to guide professionals in implementing privacy-respecting data management practices.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://howethomas.github.io/privacy-primer-vcon/draft-james-privacy-primer-vcon.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-james-privacy-primer-vcon/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/howethomas/privacy-primer-vcon"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The democratization of technology has led to a surge of new entrants in the growing market of personal data management. These entrants, driven by various motives ranging from commerce and regulation to fraud prevention and charitable causes, are increasingly engaging with conversational data across network boundaries. The vCon (Virtual Conversation) represents a significant step forward in this landscape, enabling the ethical sharing of conversational data and fostering a rich ecosystem of services based on a novel concept: genuinely listening to what customers say.</t>
      <t>However, many of these new entrants may not inherently understand the ethical and legal complexities surrounding crucial topics such as data minimization, redaction, the right to know, and the right to erasure. The design decisions behind the vCon framework directly address these concerns, incorporating features such as encryption capabilities, external data signing for change detection, and the creation of redacted versions that maintain a trail to the original data.</t>
      <section anchor="purpose-of-this-document">
        <name>Purpose of this Document</name>
        <t>This document serves as a primer for individuals and organizations grappling with the challenges of responsible management of personal data, including biometric information contained in audio and video recordings, or other sources of sensitive information, in messaging or other personal communications. It aims to provide a foundational understanding of key topics, explaining their importance and how they are addressed (or not) within the vCon framework. While the vCon is not a panacea, it offers a structure that enables well-intentioned actors to operate ethically and responsibly. Much like the distinction between HTTP and HTTPS, where HTTPS is trusted by default and HTTP is not, the vCon framework provides a basis for trust, with legal systems managing those who operate outside its principles.
IETF standards already address privacy in Internet communications, including the principle of data minimization [RFC 7258]. However, those standards generally do not address the privacy of consumer data privacy vis-à-vis organizations that collect, process, and disclose consumer data¶</t>
      </section>
      <section anchor="intended-audience">
        <name>Intended Audience</name>
        <t>This primer is designed to cater to three primary constituencies often present in IETF discussions:</t>
        <ul spacing="normal">
          <li>
            <t>Technologists and Engineers: Often immersed in technical details, these professionals may benefit from understanding the broader ethical and legal considerations that should inform their designs. This document aims to bridge the gap between technical implementation and important "non-technical" issues they need to consider.</t>
          </li>
          <li>
            <t>Regulators, Lawyers, and Government Representatives: Responsible for tech policy, these individuals often approach discussions with the perspectives of their constituencies but are generally open to education. This document seeks to provide them with a clearer understanding of how their legal concerns are addressed within the vCon framework and what aspects fall outside its scope.</t>
          </li>
          <li>
            <t>Non-Governmental Organizations (NGOs): Particularly those focused on privacy, security, and human rights, these organizations represent the intersection of policy and technology. Often skeptical of commercial and government interests, this audience will find information on how the vCon supports personal data privacy, transparency, and control.</t>
          </li>
        </ul>
      </section>
      <section anchor="goals-of-this-document">
        <name>Goals of this Document</name>
        <t>The primary objectives of this primer are:</t>
        <ul spacing="normal">
          <li>
            <t>To educate an expanding audience on the fundamental concepts of responsible customer data management.</t>
          </li>
          <li>
            <t>To foster a common understanding of the challenges involved in personal data handling.</t>
          </li>
          <li>
            <t>To provide an informed perspective on what is currently addressed by the vCon framework and what remains outside its scope.</t>
          </li>
          <li>
            <t>To encourage thoughtful consideration of ethical and legal issues in the design and implementation of systems handling personal data.</t>
          </li>
        </ul>
        <t>By achieving these goals, we aim to contribute to a more informed and responsible approach to personal data management across various sectors and disciplines.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="privacy-and-vcon-in-general">
        <name>Privacy and vCon – In General</name>
        <t>Privacy in general can be understood as “the right to be let alone” [Warren, S. D., &amp; Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193-220]. It may be helpful to think of it in four aspects:</t>
        <ol spacing="normal" type="1"><li>
            <t>personal information (or data) privacy,</t>
          </li>
          <li>
            <t>bodily privacy,</t>
          </li>
          <li>
            <t>territorial privacy, and</t>
          </li>
          <li>
            <t>communications privacy.</t>
          </li>
        </ol>
        <t>In the context of vCon, we will concentrate on <strong>data privacy</strong> and <strong>communications privacy.</strong></t>
      </section>
      <section anchor="data-privacy">
        <name>Data privacy</name>
        <t>Data privacy, also known as information privacy or data protection, refers to the practice of safeguarding individuals' personal information from unauthorized access, use, disclosure, alteration, or destruction. It involves ensuring that individuals have control over their own personal data and that organizations that collect, store, and process personal data do so in a manner that respects individuals' privacy rights.</t>
        <t>Data privacy laws and regulations vary by jurisdiction, but many countries and regions have enacted legislation to protect individuals' personal data. Examples of data privacy laws include the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act (CCPA) in the United States, and the Personal Data Protection Act (PDPA) in Singapore. The U.S. data privacy legal landscape is a particularly complex patchwork of federal and state laws. It includes comprehensive state-level consumer privacy acts, industry-specific federal laws, and intricate pre-emption relationships between them, creating a fragmented and multifaceted regulatory environment.</t>
        <t>This document outlines common privacy rights and obligations as of the time of this writing (September, 2024) in alignment with fair information practices (FIP), which are widely recognized principles but may or may not be legally required, depending on the jurisdiction. The framework presented here offers a general understanding of data privacy principles but does not guarantee legal compliance in any specific region. Readers are encouraged to seek legal advice for their particular situations.</t>
        <section anchor="key-roles-in-data-processing">
          <name>Key Roles in Data Processing</name>
          <t>The following terms are used by the GDPR and in the privacy industry in general to define the three key roles in data processing:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Data Subject</strong>: The individual whose personal information is being processed (also referred to as “consumer” in this RFC and many personal data privacy laws).</t>
            </li>
            <li>
              <t><strong>Data Controller</strong>: An organization or individual with decision-making authority over data processing who determines the purposes and methods of data processing, bears primary responsibility under privacy laws and is the main target of most privacy and data protection regulations.</t>
            </li>
            <li>
              <t><strong>Data Processor</strong>: Often a third-party service provider who processes data on behalf of the data controller. Under Health Insurance Portability and Accountability Act (HIPAA), data processors are referred to as "business associates." Data processors may be hired for specialized tasks or to improve efficiency; can subcontract to other processors, creating a chain of responsibility; must operate within the scope defined by the data controller; and are expected to maintain trust and adhere to the controller's guidelines.</t>
            </li>
          </ol>
          <t>The relationship between these entities forms a hierarchy of responsibility and trust. The data controller sets the parameters for data use, while processors at various levels must operate within these boundaries. This structure ensures accountability and helps maintain data privacy throughout the information processing chain.</t>
        </section>
        <section anchor="what-rights-in-their-data-do-consumers-have">
          <name>What Rights in Their Data do Consumers Have?</name>
          <t>Regarding individual rights in data privacy, organizations should focus on six key areas:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Notice of Data Processing</strong>: Organizations must clearly communicate their privacy policies and practices. This includes explaining what personal data is collected and for which purposes, how it is used, stored, and shared, and how consumers can exercise their data privacy rights. This ensures transparency, holds data controllers accountable, and empowers individuals to make informed choices about their personal information.</t>
            </li>
            <li>
              <t><strong>Consent</strong>: Organizations need to obtain data subjects’ informed and freely given consent for collecting, using, storing, and sharing personal data. Different levels of consent may apply to different kinds of data or in different jurisdictions:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Consent can be affirmative (“opt-in” consent) or presumed unless stated otherwise (“opt-out” consent). Opt-in consent is usually required for sensitive data processing.</t>
                </li>
                <li>
                  <t>Consent can be written, oral, or implied.</t>
                </li>
                <li>
                  <t>In some jurisdictions, such as California, consent must be sought at or before the point of data collection.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><strong>Access</strong>: Organizations should offer mechanisms for consumers to access and correct their personal data. This empowers people to ensure their data is accurate and up-to-date.</t>
            </li>
            <li>
              <t><strong>Data Choices</strong>: In addition to rights to access and correct, data subjects often have the following data privacy rights:
              </t>
              <ul spacing="normal">
                <li>
                  <t>right to have their information deleted (also referred to as the “right to be forgotten”);</t>
                </li>
                <li>
                  <t>right to port their data to a different data controller;</t>
                </li>
                <li>
                  <t>right opt out of certain data practices, such as sale of their data, profiling, targeted/cross contextual behavioral advertising, automated decision-making.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><strong>Non-Discrimination</strong>: Organizations must not discriminate against consumers who choose to exercise their data privacy rights.</t>
            </li>
            <li>
              <t><strong>Breach Notification</strong>: The large amounts of data held by organizations attracts cybercriminals, increasing the risk of data breaches. To mitigate the consequences of data breaches and incentivize advanced data security practices, most jurisdictions require prompt notification of affected individuals when breaches occur (within 30 days of discovery being the industry practice in the U.S.). This holds organizations accountable for data security and allows individuals to take protective actions.</t>
            </li>
          </ol>
          <t>By addressing these areas, organizations can respect individual privacy rights and build trust with their customers or users. This approach aligns with many modern data protection regulations and best practices in privacy management.</t>
        </section>
        <section anchor="what-data-is-protected">
          <name>What Data Is Protected?</name>
          <t>Data privacy laws protect personal information, though its scope can vary across different laws. In general, the term “personal information” (also known as “personally identifiable information” or “PII”) includes information that makes it possible to identify an individual or information about an “identified” or “identifiable” individual. California extends the scope of PII to include information about a consumer and the consumer’s household, as well as employment data. Examples of PII include:</t>
          <ul spacing="normal">
            <li>
              <t>Basic identifiers: Name, addresses (postal and email), government-issued identification numbers</t>
            </li>
            <li>
              <t>Digital identifiers: IP address (in some jurisdictions like California).</t>
            </li>
            <li>
              <t>Financial Data: financial account number or credit or debit card number, often in combination with any required security code or password that would permit access to a data subject’s financial account.</t>
            </li>
            <li>
              <t>Protected characteristics: Race, religion, disability, sexual orientation, national origin, etc.</t>
            </li>
            <li>
              <t>Consumer behavior: Purchase history, product interests, consumption patterns.</t>
            </li>
            <li>
              <t>Biometric data, including voiceprints, faceprints, fingerprints.</t>
            </li>
            <li>
              <t>Online activity: Browsing and search history, website and app interaction.</t>
            </li>
            <li>
              <t>Geolocation information</t>
            </li>
            <li>
              <t>Sensory information: Audio, visual, thermal, and olfactory data.</t>
            </li>
            <li>
              <t>Professional and educational information.</t>
            </li>
          </ul>
        </section>
        <section anchor="sensitive-data">
          <name>Sensitive Data</name>
          <t>An important subset of PII to consider in designing data privacy practices is so-called “sensitive data” which is subject to a higher standard of protection and requires additional privacy and security limitations to safeguard its collection, use and disclosure. For example, it may require an opt-in consent for data collection and processing. In various jurisdictions sensitive information may may now or in the near future (with regard to current bills, such as the American Privacy Rights Act) include the following:</t>
          <ul spacing="normal">
            <li>
              <t>Government-issued identifiers.</t>
            </li>
            <li>
              <t>Physical or mental health information.</t>
            </li>
            <li>
              <t>Genetic data.</t>
            </li>
            <li>
              <t>Financial data.</t>
            </li>
            <li>
              <t>Biometric information, including faceprints and voiceprints used for identity recognition or verification.</t>
            </li>
            <li>
              <t>Precise geolocation data (information on a customer’s location within a 1,850-foot radius around the consumer, as defined by California Consumer Privacy Rights Act).</t>
            </li>
            <li>
              <t>Certain communications data – an individual's private communications, such as voicemails, emails, texts, direct messages or mail, or information identifying the parties to such communications, information contained in telephone bills, voice communications, and any information that pertains to the transmission of voice communications, including numbers called, numbers from which calls were placed, the time calls were made, call duration and location information of the parties to the call, unless the covered entity is an intended recipient of the communication. Communications with businesses may be awarded less protection.</t>
            </li>
            <li>
              <t>Log-in credentials – a customer’s account log-in, password, or credentials allowing access to an account.</t>
            </li>
            <li>
              <t>Citizenship and immigration status.</t>
            </li>
            <li>
              <t>Sexual behavior.</t>
            </li>
            <li>
              <t>Information revealing an individual's online activities over time and across websites or online services that do not share common branding or over time on any website or online service operated by a covered high-impact social media company.</t>
            </li>
            <li>
              <t>Information about minors (17 years of age or younger).</t>
            </li>
            <li>
              <t>Certain communications data – an individual's private communications, such as voicemails, emails, texts, direct messages or mail, or information identifying the parties to such communications, information contained in telephone bills, voice communications, and any information that pertains to the transmission of voice communications, including numbers called, numbers from which calls were placed, the time calls were made, call duration and location information of the parties to the call, unless the covered entity is an intended recipient of the communication. Communications with businesses may be awarded less protection.</t>
            </li>
            <li>
              <t>Online activity - information revealing an individual's online activities over time and across websites or online services that do not share common branding or over time on any website or online service operated by a covered high-impact social media company.</t>
            </li>
            <li>
              <t>Calendars, address book information, phone or text logs, photos, audio recordings, or videos intended for private use** typically stored on smartphones and tablets that reveal personal information about an individual's daily habits and social interactions.</t>
            </li>
            <li>
              <t>Transferred video viewing habit information - information revealing the extent or content of any individual's access, viewing or other use of any video programming, including by a provider of broadcast television service, cable service, satellite service or streaming media service, but only concerning the transfer of such information to a third party and excluding any such data used solely for transfers for independent video measurement.</t>
            </li>
          </ul>
        </section>
        <section anchor="what-data-isnt-protected">
          <name>What Data Isn’t Protected?</name>
          <t>The distinction between personal and nonpersonal information hinges on identifiability, meaning that personal data is identifiable and thus protected by most privacy laws when it can be reasonably linked to a particular person (or even computer or device). This boundary can be ambiguous, with varying interpretations across jurisdictions. For instance, IP addresses are considered personal information by the EU and FTC, but not by U.S. federal agencies under the Privacy Act.¶ Moreover, sometimes, deidentified data can be reidentified, introducing challenges to personal data protection.
When identifying elements are removed from data, it becomes nonpersonal information, generally falling outside the scope of privacy and data protection laws.</t>
          <t>Some methods of transforming identifiable data into nonpersonal data are deidentification, anonymization, and aggregation. On the other hand, pseudonymization (replacing identifiable data with pseudonyms/unique codes) only temporarily removes identifiable data with the possibility of relatively easy reidentification. In many jurisdictions pseudonymous data falls within the scope of personal data when used in conjunction with additional information that reasonably links the data to an identified or identifiable individual.</t>
          <t>Many jurisdictions remove <strong>publicly available information</strong> from the scope of protected PI.</t>
          <t><strong>Pseudonymized data</strong>, where individuals are represented by unique codes, is temporarily nonpersonal but can be reversed to reidentify individuals. This reversibility can be crucial in scenarios like medical trials. In many jurisdictions pseudonymous data falls within the scope of personal data when used in conjunction with additional information that reasonably links the data to an identified or identifiable individual.</t>
          <t>Many jurisdictions remove <strong>publicly available information</strong> from the scope of protected PI.</t>
        </section>
        <section anchor="deidentificationanonymization">
          <name>Deidentification/Anonymization</name>
          <t>Deidentification is the process of removing identifiable data from the dataset/document. It may take the form of information suppression (direct removal of identifying information), generalization (replacing a data element with a more general equivalent), or noise addition (slightly altering select data).  Noise addition is the primary mechanism of differential privacy – a mathematical framework designed to ensure the privacy of individuals within a dataset while allowing for the extraction of useful statistical information by adding carefully calibrated noise to the data. This ensures that the inclusion or exclusion of any single individual's data does not significantly affect the outcome of the analysis and adds a level of personal data protection.
Sometimes it is possible to reidentify the deidentified data using other available information. In this context, although it is often used interchangeably with the term “deidentification,” the term “anonymization” refers to the more comprehensive irreversible removal of identifiable data. Rigorous deidentification or anonymization techniques should be employed to ensure that reidentification is either impossible or extremely difficult.¶</t>
        </section>
        <section anchor="aggregationanonymization">
          <name>Aggregation/Anonymization</name>
          <t>In the data privacy context, data aggregation is a data analytics process whereby combined data from multiple sources or individuals containing PII information is summarized, effectively removing PII from the final product. It can be used to protect individuals' personal information while still allowing organizations to derive valuable insights. While aggregation can obscure individual identities, there are still privacy concerns that should be considered:¶</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Re-identification risk</strong>: With enough granular data points, it may be possible to single out individuals even from aggregated datasets. Applying multiple specific filters to aggregate data could potentially identify a unique individual.</t>
            </li>
            <li>
              <t><strong>Inference attacks</strong>: Aggregated data can reveal patterns that allow inferences about individuals or small groups, even if direct identifiers are removed.</t>
            </li>
            <li>
              <t><strong>Unintended data exposure</strong>: As aggregated data is often shared between organizations, there's increased risk of unauthorized access or misuse.</t>
            </li>
          </ol>
          <t>Anonymization aims to remove or encrypt personal identifiers from datasets. However, true anonymization is challenging:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>De-identification limitations</strong>: Simply removing obvious identifiers like names and addresses is often not sufficient to prevent re-identification. Indirect identifiers can still allow individuals to be singled out.</t>
            </li>
            <li>
              <t><strong>Data utility trade-offs</strong>: More thorough anonymization techniques tend to reduce the usefulness of the data for analysis.</t>
            </li>
            <li>
              <t><strong>Evolving re-identification techniques</strong>: As technology advances, previously anonymized data may become vulnerable to new re-identification methods.</t>
            </li>
          </ol>
          <t>To mitigate these risks, organizations should consider:</t>
          <ol spacing="normal" type="1"><li>
              <t>Implementing robust anonymization techniques beyond basic de-identification.</t>
            </li>
            <li>
              <t>Carefully assessing the granularity and specificity of aggregated data released.</t>
            </li>
            <li>
              <t>Combining anonymization with other privacy-enhancing technologies like differential privacy.</t>
            </li>
            <li>
              <t>Conducting regular privacy impact assessments to evaluate potential risks.</t>
            </li>
            <li>
              <t>Adhering to relevant privacy regulations and best practices for data handling.</t>
            </li>
          </ol>
          <t>While data aggregation and anonymization can enhance privacy protection, they should not be viewed as foolproof solutions. Organizations must remain vigilant and adopt a comprehensive approach to data privacy that considers the evolving nature of re-identification risks and the potential for unintended consequences when working with large datasets.</t>
        </section>
      </section>
      <section anchor="communications-privacy">
        <name>Communications Privacy</name>
        <t>Communications privacy is a critical concern in our increasingly interconnected world, where various forms of communication – including audio, video, text messages, and emails – have become integral to both personal and professional interactions. Under the applicable laws, communications are protected when in transit and when stored.</t>
        <t>Understanding the multifaceted legal and ethical frameworks around communications privacy is essential for anyone involved in capturing, storing, analyzing, or managing communications data. Communications privacy laws across various jurisdictions often share common elements, designed to protect individuals' privacy rights while balancing the needs of law enforcement and legitimate business interests. Here are some key provisions typically found in laws governing the recording, interception, eavesdropping, and storage of communications:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Notice:</strong> Many laws require that parties be notified if their communications are being recorded or monitored, often through audible beeps, verbal announcements, or visible signage. The unauthorized surveillance or interception of an individual's private communications or activities is generally prohibited by law.</t>
          </li>
          <li>
            <t><strong>Consent:</strong> Most laws stipulate that at least one party must consent to the recording or interception of a communication. Some jurisdictions require all parties to consent, known as "two-party" or "all-party" consent. The type of consent required (explicit or implied) may vary, but it has to be obtained prior to the recording.</t>
          </li>
          <li>
            <t><strong>Distinction Between Public and Private Communications:</strong> Laws often differentiate between communications where there is a reasonable expectation of privacy (e.g., private phone calls) and those in public spaces where such expectation may not exist.</t>
          </li>
          <li>
            <t><strong>Purpose Limitations:</strong> Regulations frequently specify permissible purposes for recording or intercepting communications, such as for security, quality assurance, or with court authorization for law enforcement activities.</t>
          </li>
          <li>
            <t><strong>Storage and Retention Limitations</strong>: Rules governing how long recorded communications can be stored, how they must be protected, and when they should be destroyed are common features of privacy laws.</t>
          </li>
          <li>
            <t><strong>Exceptions for Law Enforcement:</strong> Most laws include provisions allowing for authorized interception of communications by law enforcement agencies, typically requiring judicial oversight through warrants or court orders.</t>
          </li>
          <li>
            <t><strong>Technology-Specific Provisions</strong>: As technology evolves, laws may include specific provisions for different communication media, such as landlines, mobile phones, emails, instant messaging, video calls, and Internet browsing activities.</t>
          </li>
          <li>
            <t><strong>Security Measures:</strong> Requirements for securing stored communications against unauthorized access, including encryption standards and access controls, are increasingly common. Moreover, using encryption may in some cases absolve the data processor from legal liability or at least mitigate it.¶</t>
          </li>
        </ol>
        <t>Understanding these common provisions is crucial for compliance with communications privacy laws, regardless of the specific jurisdiction. However, it is important to note that the exact implementation and interpretation of these provisions can vary significantly between different legal frameworks.</t>
        <section anchor="key-privacy-principles">
          <name>Key Privacy Principles</name>
          <t>Data privacy and communications privacy are guided by similar principles, emphasizing consent, transparency, and data minimization while balancing privacy rights with societal interests. These areas aim to safeguard individuals' control over their personal information, whether stored or transmitted. Key principles include:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Consent</strong>:   Must be freely given, specific, informed, unambiguous, revocable, and documented. Consent may not be valid in situations with power imbalances or required when processing is necessary to satisfy legal obligations or implement contracts. So-called “dark patterns,” which are practices of seeking consent that effectively obscure, subvert, or impair the consumer’s autonomy, decision-making or choice (for example, confusing user interfaces or hidden disclosures) are prohibited in many jurisdictions.</t>
            </li>
            <li>
              <t><strong>Notice/Transparency</strong>: Organizations must clearly disclose their data handling practices. Privacy notices should be concise, transparent, and easily understandable. Changes to privacy practices must be promptly communicated.</t>
            </li>
            <li>
              <t><strong>Purpose Limitation</strong>: Personal data should be collected for specific, explicit, and legitimate purposes, and it should not be used for purposes that are incompatible with those for which it was originally collected.</t>
            </li>
            <li>
              <t><strong>Data Minimization/Collection Limitation</strong>: Organizations should collect only the minimum amount of personal data necessary to achieve the stated purpose. Excessive or irrelevant data should not be collected.</t>
            </li>
            <li>
              <t><strong>Storage Limitation</strong>: Personal data should be retained only for as long as necessary to fulfill the purposes for which it was collected, consistent with legal limitations and requirements. Organizations should establish retention policies and securely dispose of data that is no longer needed.</t>
            </li>
            <li>
              <t><strong>Security</strong>: Appropriate technical, physical and administrative measures must be implemented to protect covered data from unauthorized access and other risks. This may include encryption, access controls, and regular security assessments.</t>
            </li>
            <li>
              <t><strong>Individual Rights</strong>: Individuals have certain rights regarding their personal data, including the right to access their data, the right to request corrections or deletions (”the right to be forgotten”), the right to object to certain uses of their data, and the right to data portability (the ability to transfer their data from one organization to another).</t>
            </li>
            <li>
              <t><strong>Data Integrity</strong>: Personal data should be accurate, complete, up-to-date, and trustworthy throughout its lifecycle. The core principles of data integrity include consistency across systems, authenticity verification, and non-repudiation mechanisms.¶</t>
            </li>
            <li>
              <t><strong>Accountability</strong>: Organizations are responsible for complying with data privacy laws and demonstrating compliance. This may involve conducting privacy impact assessments, appointing a data protection officer, and maintaining records of data processing activities.</t>
            </li>
            <li>
              <t><strong>Recordkeeping</strong>: Maintain accurate logs of consumers' profiles, data decisions, and data usage, including sales and marketing campaigns and instances of data disclosure to third parties.</t>
            </li>
          </ol>
          <t>While data privacy and communications privacy share many principles, there are some distinctions in their regulation. Communications privacy laws often focus more on real-time interception and communication confidentiality, while data privacy laws address a broader range of data handling practices.</t>
          <t>As the digital landscape evolves, privacy laws must continually adapt to address emerging technologies and practices, ensuring the protection of personal information in our interconnected world.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>vCons contain sensitive conversational data, which raises several data privacy and security concerns, particularly regarding data integrity and personal privacy. The following points outline the key security considerations for vCons:</t>
      <ol spacing="normal" type="1"><li>
          <t>Data Integrity and Immutability
          </t>
          <ul spacing="normal">
            <li>
              <t>vCons need to be protected against unauthorized modifications to ensure the authenticity of the conversational data.</t>
            </li>
            <li>
              <t>Before a vCon leaves its original security domain, it should be digitally signed to prevent alteration, as specified in Section 5.2 (Signed Form of vCon Object).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Privacy Protection
          </t>
          <ul spacing="normal">
            <li>
              <t>vCons often contain personally identifiable information (PII) and sensitive data that must be safeguarded.</t>
            </li>
            <li>
              <t>Different levels of redaction may be necessary, as outlined in Section 4.1.6 (redacted):
a) PII masking: Removing PII from text, audio, video, and transcripts
b) De-identification: Removing segments or whole recordings to prevent voice printing or facial recognition</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Encrypted Storage and Transmission
          </t>
          <ul spacing="normal">
            <li>
              <t>Unredacted versions of vCons must be encrypted to protect sensitive information, as described in Section 5.3 (Encrypted Form of vCon Object).</t>
            </li>
            <li>
              <t>vCons transmitted over non-secure channels (e.g., email) must always be in encrypted form.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Access Control
          </t>
          <ul spacing="normal">
            <li>
              <t>Externally referenced files should be transported only over HTTPS, as specified in Section 2.4 (Externally Referenced Files).</t>
            </li>
            <li>
              <t>Access to unredacted vCons and their referenced files should be restricted to authorized personnel only.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Version Management
          </t>
          <ul spacing="normal">
            <li>
              <t>Multiple versions of a vCon may exist (e.g., redacted versions, versions with added analysis).</t>
            </li>
            <li>
              <t>Each version must maintain its own integrity while providing a secure reference to its predecessor, as described in Sections 4.1.6 (redacted) and 4.1.7 (appended).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Cross-Domain Security
          </t>
          <ul spacing="normal">
            <li>
              <t>vCons may be created and modified across different security domains, as discussed in Section 4 (Unsigned Form of vCon Object).</t>
            </li>
            <li>
              <t>Each domain should sign the vCon before transferring it to maintain the chain of trust, using the method in Section 5.2 (Signed Form of vCon Object).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Redaction Processes
          </t>
          <ul spacing="normal">
            <li>
              <t>While methods exist for redacting text, audio, and video, the specific techniques are beyond the scope of the vCon standard, as noted in Section 4.1.6 (redacted).</t>
            </li>
            <li>
              <t>Implementers must ensure that redaction methods effectively remove sensitive information without compromising the vCon's integrity.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Balancing Utility and Privacy
          </t>
          <ul spacing="normal">
            <li>
              <t>There's an inherent tension between maintaining the usefulness of vCons and protecting privacy, as implied throughout Section 4 (Unsigned Form of vCon Object).</t>
            </li>
            <li>
              <t>Careful consideration is needed when deciding what information to redact or encrypt.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Encryption of Referenced Content
          </t>
          <ul spacing="normal">
            <li>
              <t>Externally referenced files that are part of a vCon should be encrypted if they contain sensitive information, as suggested in Section 2.4 (Externally Referenced Files).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Audit Trail
          </t>
          <ul spacing="normal">
            <li>
              <t>vCons should maintain a secure audit trail of modifications, especially for redactions and additions, to ensure accountability. This is supported by the structure described in Sections 4.1.6 (redacted) and 4.1.7 (appended).</t>
            </li>
          </ul>
        </li>
      </ol>
      <t>By addressing these security concerns and following the guidelines in the vCon standard, implementers can help ensure that vCons protect the privacy of individuals involved in conversations while maintaining the integrity and utility of the conversational data.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <t>[RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May 2014, <eref target="https://www.rfc-editor.org/info/rfc7258">https://www.rfc-editor.org/info/rfc7258</eref>.</t>
      <t>[Warren1890] Warren, S. D., &amp; Brandeis, L. D., "The Right to Privacy", Harvard Law Review, 4(5), 193-220, 1890.</t>
      <t>[RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M., and R. Smith, "Privacy Considerations for Internet Protocols", RFC 6973, DOI 10.17487/RFC6973, July 2013, <eref target="https://www.rfc-editor.org/info/rfc6973">https://www.rfc-editor.org/info/rfc6973</eref>.</t>
      <t>[RFC8280] ten Oever, N. and C. Cath, "Research into Human Rights Protocol Considerations", RFC 8280, DOI 10.17487/RFC8280, October 2017, <eref target="https://www.rfc-editor.org/info/rfc8280">https://www.rfc-editor.org/info/rfc8280</eref>.</t>
      <t>[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC Text on Security Considerations", BCP 72, RFC 3552, DOI 10.17487/RFC3552, July 2003, <eref target="https://www.rfc-editor.org/info/rfc3552">https://www.rfc-editor.org/info/rfc3552</eref>.</t>
      <t>[RFC7624] Barnes, R., Schneier, B., Jennings, C., Hardie, T., Trammell, B., Huitema, C., and D. Borkmann, "Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement", RFC 7624, DOI 10.17487/RFC7624, August 2015, <eref target="https://www.rfc-editor.org/info/rfc7624">https://www.rfc-editor.org/info/rfc7624</eref>.</t>
      <t>[RFC6462] Cooper, A., "Report from the Internet Privacy Workshop", RFC 6462, DOI 10.17487/RFC6462, January 2012, <eref target="https://www.rfc-editor.org/info/rfc6462">https://www.rfc-editor.org/info/rfc6462</eref>.</t>
      <t>[RFC7844] Huitema, C., Mrugalski, T., and S. Krishnan, "Anonymity Profiles for DHCP Clients", RFC 7844, DOI 10.17487/RFC7844, May 2016, <eref target="https://www.rfc-editor.org/info/rfc7844">https://www.rfc-editor.org/info/rfc7844</eref>.</t>
      <t>[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, <eref target="https://www.rfc-editor.org/info/rfc8446">https://www.rfc-editor.org/info/rfc8446</eref>.</t>
      <t>[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., and P. Hoffman, "Specification for DNS over Transport Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May 2016, <eref target="https://www.rfc-editor.org/info/rfc7858">https://www.rfc-editor.org/info/rfc7858</eref>.</t>
      <t>[RFC6235] Boschi, E. and B. Trammell, "IP Flow Anonymization Support", RFC 6235, DOI 10.17487/RFC6235, May 2011, <eref target="https://www.rfc-editor.org/info/rfc6235">https://www.rfc-editor.org/info/rfc6235</eref>.</t>
      <t>[RFC8165] Hardie, T., "Design Considerations for Metadata Insertion", RFC 8165, DOI 10.17487/RFC8165, May 2017, <eref target="https://www.rfc-editor.org/info/rfc8165">https://www.rfc-editor.org/info/rfc8165</eref>.</t>
      <t>[RFC7011] Claise, B., Ed., Trammell, B., Ed., and P. Aitken, "Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information", STD 77, RFC 7011, DOI 10.17487/RFC7011, September 2013, <eref target="https://www.rfc-editor.org/info/rfc7011">https://www.rfc-editor.org/info/rfc7011</eref>.</t>
      <t>[RFC6973]   Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
            Morris, J., Hansen, M., and R. Smith, "Privacy
            Considerations for Internet Protocols", RFC 6973,
            July 2013, <eref target="https://www.rfc-editor.org/info/rfc6973">https://www.rfc-editor.org/info/rfc6973</eref>.</t>
      <t>[RFC7258]   Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an
            Attack", BCP 188, RFC 7258, May 2014,
            <eref target="https://www.rfc-editor.org/info/rfc7258">https://www.rfc-editor.org/info/rfc7258</eref>.</t>
      <t>[RFC8280]   ten Oever, N. and C. Cath, "Research into Human Rights
            Protocol Considerations", RFC 8280, October 2017,
            <eref target="https://www.rfc-editor.org/info/rfc8280">https://www.rfc-editor.org/info/rfc8280</eref>.</t>
      <t>[RFC3552]   Rescorla, E. and B. Korver, "Guidelines for Writing RFC
            Text on Security Considerations", BCP 72, RFC 3552,
            July 2003, <eref target="https://www.rfc-editor.org/info/rfc3552">https://www.rfc-editor.org/info/rfc3552</eref>.</t>
      <t>[RFC7624]   Barnes, R., Schneier, B., Jennings, C., Hardie, T.,
            Trammell, B., Huitema, C., and D. Borkmann,
            "Confidentiality in the Face of Pervasive Surveillance:
            A Threat Model and Problem Statement", RFC 7624,
            August 2015, <eref target="https://www.rfc-editor.org/info/rfc7624">https://www.rfc-editor.org/info/rfc7624</eref>.</t>
      <t>[RFC6462]   Cooper, A., "Report from the Internet Privacy Workshop",
            RFC 6462, January 2012,
            <eref target="https://www.rfc-editor.org/info/rfc6462">https://www.rfc-editor.org/info/rfc6462</eref>.</t>
      <t>[RFC7844]   Huitema, C., Mrugalski, T., and S. Krishnan, "Anonymity
            Profiles for DHCP Clients", RFC 7844, May 2016,
            <eref target="https://www.rfc-editor.org/info/rfc7844">https://www.rfc-editor.org/info/rfc7844</eref>.</t>
      <t>[RFC8446]   Rescorla, E., "The Transport Layer Security (TLS) Protocol
            Version 1.3", RFC 8446, August 2018,
            <eref target="https://www.rfc-editor.org/info/rfc8446">https://www.rfc-editor.org/info/rfc8446</eref>.</t>
      <t>[RFC7858]   Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D.,
            and P. Hoffman, "Specification for DNS over Transport
            Layer Security (TLS)", RFC 7858, May 2016,
            <eref target="https://www.rfc-editor.org/info/rfc7858">https://www.rfc-editor.org/info/rfc7858</eref>.</t>
      <t>[RFC6235]   Boschi, E. and B. Trammell, "IP Flow Anonymization
            Support", RFC 6235, May 2011,
            <eref target="https://www.rfc-editor.org/info/rfc6235">https://www.rfc-editor.org/info/rfc6235</eref>.</t>
      <t>[RFC8165]   Hardie, T., "Design Considerations for Metadata
            Insertion", RFC 8165, May 2017,
            <eref target="https://www.rfc-editor.org/info/rfc8165">https://www.rfc-editor.org/info/rfc8165</eref>.</t>
      <t>[RFC7011]   Claise, B., Ed., Trammell, B., Ed., and P. Aitken,
            "Specification of the IP Flow Information Export (IPFIX)
            Protocol for the Exchange of Flow Information", STD 77,
            RFC 7011, September 2013,
            <eref target="https://www.rfc-editor.org/info/rfc7011">https://www.rfc-editor.org/info/rfc7011</eref>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 401?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
