<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Meeting_notes_from_July_7%2C_2014</id>
	<title>Meeting notes from July 7, 2014 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Meeting_notes_from_July_7%2C_2014"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Meeting_notes_from_July_7,_2014&amp;action=history"/>
	<updated>2026-05-09T16:49:22Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=Meeting_notes_from_July_7,_2014&amp;diff=4754&amp;oldid=prev</id>
		<title>Omaerz: 1 revision imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Meeting_notes_from_July_7,_2014&amp;diff=4754&amp;oldid=prev"/>
		<updated>2018-06-28T04:02:17Z</updated>

		<summary type="html">&lt;p&gt;1 revision imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;7/7/14 [[Privacy Requirements]] Working Group Meeting Notes&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
* 4:00-4:05 - Call begins, call for notetaker&lt;br /&gt;
* 4:05-4:20 - Review Requirement: &amp;quot;Organizations shall be accountable for how information is actually used and provide mechanisms for compliance, audit, and verification.&amp;quot;&lt;br /&gt;
** Is &amp;quot;data&amp;quot; and &amp;quot;misuse&amp;quot; too limiting of a scope for redress? It could, for example, include asking for too much data.&lt;br /&gt;
** Redress should be available to correct a wider range of concerns about the relationship between individuals and organizations&lt;br /&gt;
* 4:20-4:35 - Review Requirement: &amp;quot;Where individuals make choices regarding the use of their data (such as to restrict particular uses), those choices shall be automatically applied to all parties with whom that individual interacts.&amp;quot;&lt;br /&gt;
* 4:35-4:50 - Review Requirement: &amp;quot;Organizations shall utilize identity solutions that enable a variety of transactions, including anonymous, anonymous with validated attributes, pseudonymous, and uniquely identified.&amp;quot;&lt;br /&gt;
* 4:50-5:00 - Wrap-up&lt;br /&gt;
&lt;br /&gt;
== Meeting Notes ==&lt;br /&gt;
* Requirement: &amp;quot;Organizations shall be accountable for how information is actually used and provide mechanisms for compliance, audit, and verification.&amp;quot;&lt;br /&gt;
** Edit: &amp;quot;Organizations shall be accountable for conformance to these requirements, and provide mechanisms for auditing, validation, and verification.&amp;quot;&lt;br /&gt;
** Will need to provide definitions for the auditing, validation, and verification.&lt;br /&gt;
* Requirement: &amp;quot;Organizations shall provide effective redress mechanisms for, and advocacy on behalf of, individuals who believe their data may have been misused.&amp;quot;&lt;br /&gt;
** Edit: &amp;quot;Organizations shall provide effective redress mechanisms for, and advocacy on behalf of, individuals who believe their rights under these requriements have been violated.&amp;quot;&lt;br /&gt;
** See Requirement 6 comments.&lt;br /&gt;
** Is &amp;quot;data&amp;quot; and &amp;quot;misuse&amp;quot; too limiting of a scope for redress? It could, for example, include asking for too much data.&lt;br /&gt;
** Redress should be available to correct a wider range of concerns about the relationship between individuals and organizations&amp;quot;&lt;br /&gt;
* Requirement: &amp;quot;Where individuals make choices regarding the use of their data (such as to restrict particular uses), those choices shall be automatically applied to all parties with whom that individual interacts.&amp;quot;&lt;br /&gt;
** Edit: &amp;quot;Where individuals make choices regarding the treatment of their information (such as to restrict particular uses), those choices shall be automatically applied to all parties downstream from the initial transaction.&amp;quot;&lt;br /&gt;
** There will need to be recognition in the functional requirements for different choices across contexts.&lt;br /&gt;
*Requirement: &amp;quot;Organizations shall utilize identity solutions that enable a variety of transactions, including anonymous, anonymous with validated attributes, pseudonymous, and uniquely identified.&amp;quot;&lt;br /&gt;
** Edit: &amp;quot;Organizations shall, where feasible, utilize identity solutions that enable transactions that are anonymous, anonymous with validated attributes, pseudonymous, and/or uniquely identified.&amp;quot;&lt;br /&gt;
** &amp;quot;Feasible&amp;quot; will need to be defined, including a method for justifying why organizations chose not to include this functionality (beyond just basic cost-benefit analysis).&lt;br /&gt;
**Decision tree can be used to illustrate these justifications.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Actions:&lt;br /&gt;
** Stuart Shapiro to provide additional Derived Requirements&lt;br /&gt;
** Sean Brooks to develop comment format for Functional Requirements &lt;br /&gt;
&lt;br /&gt;
== Attendees ==&lt;br /&gt;
* Sean Brooks&lt;br /&gt;
* Sarah Branam&lt;br /&gt;
* Jim Zok&lt;br /&gt;
* Jim Fenton&lt;br /&gt;
* Stuart Shapiro&lt;br /&gt;
* Edmund Jay&lt;br /&gt;
* Jeff Brennan&lt;br /&gt;
* Jennifer Behrens&lt;br /&gt;
* David Bruggeman&lt;br /&gt;
* Michael Garcia&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
</feed>