[Openid-specs-heart] Taking Privacy engineering to HEART
Don Thibeau
don at oidf.org
Tue May 5 09:10:48 UTC 2015
Thanks Adrian
I'm reading your email while Eve is presenting HEART here at the European Identity Conference.
Your proposal goes to the heart of the charter of the OpenID Foundation HEART Work Group
All puns aside, focus is a critical success factor for the HEART WG as it deliberates in a particularly crowded and noisy landscape.
Your note points to the tension between the proscriptive clarity of a MUST requirement versus the inherent optionality of open standards.
A privacy engineering approach, running concurrently with related procurements, pilots and standards development holds the promise of advancing the important conversations on consent, control and permissioning. MIT KIT and others are promising venues for those discussions.
In a related note:
One value of self certification and registration is that it can help make a component of a spec ( like OpenID Connect in HEART), as reliable/trusted as possible (e.g. its legal assurance of technical conformance).
Don Thibeau
The OpenID Foundation <http://openid.net/>
On May 5, 2015, at 3:55 AM, Adrian Gropper <agropper at healthurl.com> wrote:
I propose we apply NIST Privacy Engineering principles to the HEART profiles. This would mean designing the profiles to allow policy to be introduced at the appropriate layer in the protocols and no sooner.
The most important aspects of Privacy Engineering in the HEART context are (in rough order of importance) open source, anonymity, pairwise pseudonymous identity, transparency, notice, data minimization, persistence minimization, and subject-centrality.
0 - Open Source - HEART MUST allow for implementation by open source Clients and open source authorization servers as built by the Subject.
1 - Anonymity - HEART MUST allow for anonymous access when policy allows.
2 - Pairwise Pseudonymous Identity - HEART MUST support pairwise pseudonymous identity for longitudinal aggregation of data by a single Resource Server. For the purpose of the Privacy Engineering exercise, we need a definition of "known to the practice" as the in-person identification of the Subject without recourse to external verification or ID proofing. The requirement for verified identity or other policy-dependent attributes such as a discoverable pseudonym are to be separate from the core design of HEART profiles.
3 - Transparency - HEART MUST allow for the Subject to get an on-line Accounting for Disclosures while preserving a pairwise pseudonymous identity.
4 - Notice - HEART MUST allow for notice to Subjects that are willing to share a voluntary and possibly insecure notification address.
5 - Data Minimization - HEART MUST not impose minimum information disclosure requirements by design.
6 - Persistence Minimization - HEART SHOULD support automated, limited access to data by reference in order to reduce the incentive for Clients to persist unnecessary copies of the subject's data.
7 - Subject Centrality - aka the Multiple Portals Problem - HEART SHOULD allow for Subjects to specify their preferred Authorization Server in a domain-neutral (across legal, finance, health, education domains) unless expressly prohibited by law.
I've copied two NIST folks involved in privacy engineering and the NSTIC principles in order to make sure I'm interpreting these correctly.
Adrian
--
Adrian Gropper MD
Ensure Health Information Privacy. Support Patient Privacy Rights.
http://patientprivacyrights.org/donate-2/ <http://patientprivacyrights.org/donate-2/>
_______________________________________________
Openid-specs-heart mailing list
Openid-specs-heart at lists.openid.net
http://lists.openid.net/mailman/listinfo/openid-specs-heart
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-heart/attachments/20150505/ba3b4cc7/attachment-0001.html>
More information about the Openid-specs-heart
mailing list