{"id":204,"date":"2017-11-01T18:23:30","date_gmt":"2017-11-01T17:23:30","guid":{"rendered":"http:\/\/www.julienrossi.com\/blog\/?page_id=204"},"modified":"2019-04-01T11:48:12","modified_gmt":"2019-04-01T09:48:12","slug":"privacy-in-standard-setting-organisations","status":"publish","type":"page","link":"https:\/\/www.julienrossi.com\/blog\/les-institutions\/privacy-in-standard-setting-organisations\/","title":{"rendered":"Privacy in standard setting organisations"},"content":{"rendered":"<p>This page provides a list of groups within technical standard-setting organisations involved in privacy.<\/p>\n<p>For more information on privacy in standard setting organisations, I highly recommend <a href=\"http:\/\/www.jthtl.org\/content\/articles\/V11I1\/JTHTLv11i1_MulliganDoty.PDF\">Nick Doty and Deirdre K. Mulligan&#8217;s article called &#8220;Internet multistakeholder processes and techno-policy standards&#8221;<\/a>.<\/p>\n<p>If you know about other fora for privacy in standard setting organisations, please write to julien DOT rossi AT utc DOT fr<\/p>\n<table width=\"100%\" cellspacing=\"0\" cellpadding=\"5\">\n<tbody>\n<tr valign=\"top\">\n<td style=\"border-top: 1px solid #000000; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0.1cm 0cm 0.1cm 0.1cm;\" width=\"33%\"><b>Organisation<\/b><\/td>\n<td style=\"border-top: 1px solid #000000; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0.1cm 0cm 0.1cm 0.1cm;\" width=\"33%\"><b>Forum<\/b><\/td>\n<td style=\"border: 1px solid #000000; padding: 0.1cm;\" width=\"33%\"><b>Documents<\/b><\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"7\" width=\"33%\">W3C<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">\n<p style=\"font-weight: normal;\">Techical Architecture Group<\/p>\n<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">\n<p style=\"font-weight: normal;\">Self-Review Questionnaire: Security<br \/>\nand Privacy<\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"3\" width=\"33%\">Privacy Interest Group<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">Fingerprinting Guidance for Web Specification Authors<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">Privacy Considerations for Web Protocols<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">Specification Privacy Assessment (SPA)<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"2\" width=\"33%\">Tracking Protection Working Group (defunct)<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">Tracking Compliance and Scope<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">Tracking Preference Expression (DNT)<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">Platform for Privacy Preferences (defunct)<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">The Platform for Privacy Preferences 1.0 (P3P1.0) Specification<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"6\" width=\"33%\">IETF<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"4\" width=\"33%\"><\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">RFC 1087 &#8211; Ethics and the Internet<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">RFC 6973 &#8211; Privacy Considerations for Internet Protocols<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">RFC 7258 &#8211; Pervasive Monitoring Is an Attack<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">RFC 3041 &#8211; Privacy Extensions for Stateless Address Autoconfiguration in IPv6 (draft)<br \/>\nRFC 4941 &#8211; Privacy Extensions for Stateless Address Autoconfiguration in IPv6 (draft)<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">Mailing list on pervasive monitoring (perpass)<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\"><\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">IETF Privacy and Security Program<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\"><\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"2\" width=\"33%\">OASIS<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">OASIS Privacy Management Reference Model (PMRM) TC<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">Privacy Management Reference Model and Methodology (PMRM)<br \/>\nVersion 1.0<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">OASIS Privacy by Design Documentation for Software Engineers<br \/>\n(PbD-SE) TC<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">Privacy by Design Documentation for Software Engineers Version<br \/>\n1.0<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"3\" width=\"33%\">IRTF<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">Privacy and Security Research Group (defunct)<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" rowspan=\"3\" width=\"33%\"><\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">Human Rights Protocol Considerations Research Group<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">Privacy Enhancements and Assessments Research Group<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"3\" width=\"33%\">IEEE<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">IEEE 802 EC Privacy Recommendation Study Group (defunct)<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">802E &#8211; Recommended Practice for Privacy Considerations for IEEE<br \/>\n802 Technologies<\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">IEEE Global Initiative on Ethics and Autonomous and Intelligent Systems<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">IEEE Ethically Aligned Design v2<\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">IEEE P 7006 &#8211; WG-PDAI &#8211; Personal Data AI Agent Working Group<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\">Standard for Personal Data Artificial Intelligence (AI) Agent (not released yet (?) )<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">Kantara Initiative<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">Kantara Identity and Privacy Incubator<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\"><\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">ICANN<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">PDP Privacy &amp; Proxy Services Accreditation Issues Working<br \/>\nGroup<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" width=\"33%\"><\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" rowspan=\"2\" width=\"33%\">ISO<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">ISO\/IEC JTC 1\/SC 27 IT Security techniques<\/td>\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: 1px solid #000000; padding: 0cm 0.1cm 0.1cm 0.1cm;\" rowspan=\"2\" width=\"33%\">ISO 29134:2017 on PIA&#8217;s<br \/>\nThe ISO 27000 series on security<br \/>\nISO 29190:2015 on processes with regards to privacy<br \/>\nISO 27018 on cloud computing<br \/>\nISO 15408 section 7<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border-top: none; border-bottom: 1px solid #000000; border-left: 1px solid #000000; border-right: none; padding: 0cm 0cm 0.1cm 0.1cm;\" width=\"33%\">ISO\/IEC JTC 1\/SC 27\/WG 5 Identity management and privacy<br \/>\ntechnologies<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Last updated: Apr 1st, 2019<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page provides a list of groups within technical standard-setting organisations involved in privacy. For more information on privacy in standard setting organisations, I highly recommend Nick Doty and Deirdre K. Mulligan&#8217;s article called &#8220;Internet multistakeholder processes and techno-policy standards&#8221;&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":21,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-204","page","type-page","status-publish","hentry","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/pages\/204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/comments?post=204"}],"version-history":[{"count":14,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/pages\/204\/revisions"}],"predecessor-version":[{"id":484,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/pages\/204\/revisions\/484"}],"up":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/pages\/21"}],"wp:attachment":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/media?parent=204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}