<html><head></head><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px"><div><span>Good morning All,</span></div><div id="yui_3_16_0_ym19_1_1460979808519_50217"><span><br></span></div><div id="yui_3_16_0_ym19_1_1460979808519_50233">Here are my summaries.&nbsp;</div><div id="yui_3_16_0_ym19_1_1460979808519_50233"><br></div><div id="yui_3_16_0_ym19_1_1460979808519_52114"><b id="yui_3_16_0_ym19_1_1460979808519_52115">Privacy and Proxy
Services<o:p id="yui_3_16_0_ym19_1_1460979808519_52116"></o:p></b></div><div style="margin: 0in 0in 0.0001pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52117"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif;" id="yui_3_16_0_ym19_1_1460979808519_52118">P/P services should remain available to registrants irrespective
of their status as commercial or non-commercial organizations or as
individuals. Further, P/P registrations should not be limited to private
individuals who use their domains for non-commercial purposes....<o:p id="yui_3_16_0_ym19_1_1460979808519_52119"></o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52120"><span style="font-size: 10pt; line-height: 107%; font-family: 'Segoe UI', sans-serif;" id="yui_3_16_0_ym19_1_1460979808519_52121">P/P customer data is to be validated and
verified in a manner consistent with the requirements outlined in the WHOIS
Accuracy Program Specification of the 2013 RAA<o:p id="yui_3_16_0_ym19_1_1460979808519_52122"></o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52123"><span style="font-size: 10pt; line-height: 107%; font-family: 'Segoe UI', sans-serif;" id="yui_3_16_0_ym19_1_1460979808519_52124"><o:p id="yui_3_16_0_ym19_1_1460979808519_52125">&nbsp;</o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52126"><b id="yui_3_16_0_ym19_1_1460979808519_52127"><span style="font-size: 10pt; line-height: 107%; font-family: 'Segoe UI', sans-serif;" id="yui_3_16_0_ym19_1_1460979808519_52128">Presentation-EWG-Final Presentation-23jun14<o:p id="yui_3_16_0_ym19_1_1460979808519_52129"></o:p></span></b></div><div id="yui_3_16_0_ym19_1_1460979808519_52130"><o:p id="yui_3_16_0_ym19_1_1460979808519_52131">&nbsp;</o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52132"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52133">EWG’s Final
Report <o:p id="yui_3_16_0_ym19_1_1460979808519_52134"></o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52135">•Details a proposed next-generation Registration
Directory Service (RDS) <o:p id="yui_3_16_0_ym19_1_1460979808519_52136"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52137">•Strikes a balance between accuracy, access, and
accountability <o:p id="yui_3_16_0_ym19_1_1460979808519_52138"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52139">•Collects, validates and discloses gTLD data for
permissible purposes only <o:p id="yui_3_16_0_ym19_1_1460979808519_52140"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52141">•Leaves minimum data publicly available <o:p id="yui_3_16_0_ym19_1_1460979808519_52142"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52143">•Safeguards the rest through a new paradigm:
purpose-driven gated access <o:p id="yui_3_16_0_ym19_1_1460979808519_52144"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52145">•Introduces new contracted parties to <o:p id="yui_3_16_0_ym19_1_1460979808519_52146"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52147"><span style="font-family:&quot;Courier New&quot;" id="yui_3_16_0_ym19_1_1460979808519_52148">o</span>Validate
Contact Data <o:p id="yui_3_16_0_ym19_1_1460979808519_52149"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52150"><span style="font-family:&quot;Courier New&quot;" id="yui_3_16_0_ym19_1_1460979808519_52151">o</span>Accredit
RDS Users <o:p id="yui_3_16_0_ym19_1_1460979808519_52152"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52153"><o:p id="yui_3_16_0_ym19_1_1460979808519_52154">&nbsp;</o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52155">Contact Data can contain <o:p id="yui_3_16_0_ym19_1_1460979808519_52156"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52157">•Third-party PBC’s information, authorized for use by
this Domain Name <o:p id="yui_3_16_0_ym19_1_1460979808519_52158"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52159">•Forwarding addresses, supplied by an accredited Privacy
Service <o:p id="yui_3_16_0_ym19_1_1460979808519_52160"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52161">•Proxy’s information, supplied by an accredited Proxy
Service <o:p id="yui_3_16_0_ym19_1_1460979808519_52162"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52163">•Registrant’s own information, if no other choice is made
<o:p id="yui_3_16_0_ym19_1_1460979808519_52164"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52165">•Each Contact Holder can opt to gate data not needed for
purpose(s) <o:p id="yui_3_16_0_ym19_1_1460979808519_52166"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52167"><o:p id="yui_3_16_0_ym19_1_1460979808519_52168">&nbsp;</o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52169">Data Protection Principles <o:p id="yui_3_16_0_ym19_1_1460979808519_52170"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52171">•Compliance challenges growing rapidly for WHOIS,
exacerbated by new gTLDs <o:p id="yui_3_16_0_ym19_1_1460979808519_52172"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52173">•Mechanisms must be adopted to facilitate routine legally
compliant data collection and transfer between RDS ecosystem actors handling
personal data, including <o:p id="yui_3_16_0_ym19_1_1460979808519_52174"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52175">1.Standard Contract Clauses that are harmonized with
privacy and data protection laws, codified in a policy and enforced through
contracts <o:p id="yui_3_16_0_ym19_1_1460979808519_52176"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52177">2.“Rules Engine” to apply data protection laws <o:p id="yui_3_16_0_ym19_1_1460979808519_52178"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52179">3.RDS Storage Localization to implement a high level of
data protection <o:p id="yui_3_16_0_ym19_1_1460979808519_52180"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52181"><o:p id="yui_3_16_0_ym19_1_1460979808519_52182">&nbsp;</o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52183">Privacy Principles <o:p id="yui_3_16_0_ym19_1_1460979808519_52184"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52185">•In addition to compliance with data protection laws, the
RDS ecosystem must accommodate needs for privacy by including: <o:p id="yui_3_16_0_ym19_1_1460979808519_52186"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52187">oAn
accredited <b id="yui_3_16_0_ym19_1_1460979808519_52188">Privacy/Proxy Service </b><o:p id="yui_3_16_0_ym19_1_1460979808519_52189"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52190">oAn
accredited <b id="yui_3_16_0_ym19_1_1460979808519_52191">Secure Protected Credentials Service </b><o:p id="yui_3_16_0_ym19_1_1460979808519_52192"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52193">•There Accreditation and rules for the provision and use
of accredited Privacy/Proxy services <o:p id="yui_3_16_0_ym19_1_1460979808519_52194"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52195">•Outside of domain names registered via accredited
Privacy/Proxy Services, Registrants must assume responsibility for the domain
names they register <o:p id="yui_3_16_0_ym19_1_1460979808519_52196"></o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52197"><o:p id="yui_3_16_0_ym19_1_1460979808519_52198">&nbsp;</o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52199"><o:p id="yui_3_16_0_ym19_1_1460979808519_52200">&nbsp;</o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52201"><span style="font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52202">Secure Protected Credentials&nbsp;&nbsp; (Slide 30) <o:p id="yui_3_16_0_ym19_1_1460979808519_52203"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52204"><span style="font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52205">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; At-Risk
Entity <o:p id="yui_3_16_0_ym19_1_1460979808519_52206"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52207"><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52208">8) SC Registered<o:p id="yui_3_16_0_ym19_1_1460979808519_52209"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52210"><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52211">Domain Name&nbsp; </span><span style="font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52212">↓&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ↑ </span><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52213">1) SC Application<o:p id="yui_3_16_0_ym19_1_1460979808519_52214"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52215"><span style="font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52216">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52217"><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52218">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Attestor(s) <o:p id="yui_3_16_0_ym19_1_1460979808519_52219"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52220"><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52221">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; </span><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52222">7)&nbsp; </span><span style="font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52223">↓&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ↓ </span><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52224">2)</span><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52225">&nbsp; <o:p id="yui_3_16_0_ym19_1_1460979808519_52226"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52227"><span style="font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52228">&nbsp;&nbsp;&nbsp;&nbsp; Secure
Credential Recipient <o:p id="yui_3_16_0_ym19_1_1460979808519_52229"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52230"><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52231">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52232"><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52233">Privacy/Proxy Provider &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52234">3) SC Application =&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52235">Secure Credential (SC) Approver</span><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52236"><o:p id="yui_3_16_0_ym19_1_1460979808519_52237"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52238"><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52239">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &lt;= </span><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52240">6) Credential and DomainName&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><span style="font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52241">↓↑
</span><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52242">4)
Credential</span><span style="font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52243">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ↑↓ </span><span style="font-size:8.0pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52244">5) DN<o:p id="yui_3_16_0_ym19_1_1460979808519_52245"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52246"><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52247">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;Secure Credential Issuer &nbsp;&nbsp;&nbsp;&nbsp;P/P Provider<o:p id="yui_3_16_0_ym19_1_1460979808519_52248"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52249"><span style="font-size:11.5pt;font-family:&quot;Arial&quot;,sans-serif" id="yui_3_16_0_ym19_1_1460979808519_52250">&nbsp;<o:p id="yui_3_16_0_ym19_1_1460979808519_52251"></o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52252"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52253"><o:p id="yui_3_16_0_ym19_1_1460979808519_52254">&nbsp;</o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52255"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52256">For persons at
risk, and in instances where free-speech rights may be denied or speakers
persecuted<o:p id="yui_3_16_0_ym19_1_1460979808519_52257"></o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52258"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52259"><o:p id="yui_3_16_0_ym19_1_1460979808519_52260">&nbsp;</o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52261"><b id="yui_3_16_0_ym19_1_1460979808519_52262"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52263"><o:p id="yui_3_16_0_ym19_1_1460979808519_52264">&nbsp;</o:p></span></b></div><div id="yui_3_16_0_ym19_1_1460979808519_52265"><b id="yui_3_16_0_ym19_1_1460979808519_52266"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52267">EWG-FAQs-2014-Update-26June<o:p id="yui_3_16_0_ym19_1_1460979808519_52268"></o:p></span></b></div><div id="yui_3_16_0_ym19_1_1460979808519_52269"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52270">Summary: P/P
services with accreditation and rules to provide anonymity. Contact ID publicly
available. Rules engine. Validation zand authentication of Registrants, and
Purpose-based Contatcs (PBC) with gated access. <o:p id="yui_3_16_0_ym19_1_1460979808519_52271"></o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52272"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52273"><o:p id="yui_3_16_0_ym19_1_1460979808519_52274">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52275">There
should be accreditation for privacy/proxy service providers and rules regarding
provision and use of accredited privacy/privacy services. The RDS has been
designed to leverage accredited privacy/proxy services to address routine
privacy needs, incorporating new data elements to facilitate provider
identification, customer contact, and abuse reporting. <o:p id="yui_3_16_0_ym19_1_1460979808519_52276"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52277"><span style="font-size: 12pt;" id="yui_3_16_0_ym19_1_1460979808519_52278">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52279">The
RDS accommodates needs for anonymity by offering an accredited “secure
protected credentials” service for persons at risk, and in instances where
free-speech rights may be denied or speakers persecuted. <o:p id="yui_3_16_0_ym19_1_1460979808519_52280"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52281"><span style="font-size: 12pt;" id="yui_3_16_0_ym19_1_1460979808519_52282">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52283">As
with other systems that collect personal data, proper system design, security
measures, audits and oversight would be needed to minimize data breach risk.
Insider abuse should be deterred through security policy, implementation,
enforcement and third-party auditing. <o:p id="yui_3_16_0_ym19_1_1460979808519_52284"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52285"><span style="font-size: 12pt;" id="yui_3_16_0_ym19_1_1460979808519_52286">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52287">Mechanisms
should be adopted to facilitate routine legally compliant data collection and
transfer between actors within the RDS ecosystem. To accomplish this, RDS
actors will be held to standard contract clauses that are harmonized with data
protection and privacy laws, codified in RDS policy, and implemented through a
“rules engine” that applies policy as appropriate for each jurisdiction. <o:p id="yui_3_16_0_ym19_1_1460979808519_52288"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52289"><span style="font-size: 12pt;" id="yui_3_16_0_ym19_1_1460979808519_52290">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52291">To
improve both accountability and reachability, validated Registrant,
Administrative, Technical, Abuse, and Legal Contacts would be required for all
new domain names. However, Registrants would have many ways to be accountable
without publishing personal data, including inexpensive/free accredited Privacy
Services and new third-party contact options. To deter identity theft, a
Contact ID could not be used within a domain name registration without
authorization. <o:p id="yui_3_16_0_ym19_1_1460979808519_52292"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52293"><span style="font-size: 12pt;" id="yui_3_16_0_ym19_1_1460979808519_52294">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52295">While
the RDS would require every registered domain name to be associated with
Contact IDs as needed to satisfy permissible purposes, Purpose-Based Contact
(PBC) data elements would NOT be publicly available to everyone. The Contact ID
for each PBC would be publicly accessible to all, but PBC names and addresses
would only be accessible to authenticated requestors, authorized to access RDS
data for the specific purpose associated with each Contact. <o:p id="yui_3_16_0_ym19_1_1460979808519_52296"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52297"><span style="font-size: 12pt;" id="yui_3_16_0_ym19_1_1460979808519_52298">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52299">No
requestor would ever have unfettered access to the entire data set. The RDS
does not use a one-size-fits-all “gate.” Requestors and their registration data
needs vary; so would gated access policies. Like most on-line services that
hold private data, the RDS would apply policy-defined permissions, driven by
requestor identity and stated purpose, with uniformly-enforced terms of
service, backed by more consistent measures to deter and mitigate abuse. <o:p id="yui_3_16_0_ym19_1_1460979808519_52300"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52301"><span style="font-size: 12pt;" id="yui_3_16_0_ym19_1_1460979808519_52302">&nbsp;</span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52303">The
RDS should store data in jurisdiction(s) where law enforcement is globally
trusted. Interpol should accredit its own members.<o:p id="yui_3_16_0_ym19_1_1460979808519_52304"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52305"><o:p id="yui_3_16_0_ym19_1_1460979808519_52306">&nbsp;</o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52307"><b id="yui_3_16_0_ym19_1_1460979808519_52308">Blog Ajayi<o:p id="yui_3_16_0_ym19_1_1460979808519_52309"></o:p></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52310">Concerned
with data accuracy. Nothing on privacy.<o:p id="yui_3_16_0_ym19_1_1460979808519_52311"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52312"><o:p id="yui_3_16_0_ym19_1_1460979808519_52313">&nbsp;</o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52314"><b id="yui_3_16_0_ym19_1_1460979808519_52315">Perrin-Statement-24jun14-en <o:p id="yui_3_16_0_ym19_1_1460979808519_52316"></o:p></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52317"><b id="yui_3_16_0_ym19_1_1460979808519_52318">&nbsp;</b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52319">&nbsp;<span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52320">There are three questionable
basic outcomes:<o:p id="yui_3_16_0_ym19_1_1460979808519_52321"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52322"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52323">1) Legal
contact requirement: address and phone number<o:p id="yui_3_16_0_ym19_1_1460979808519_52324"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52325"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52326">are mandatory
to provide, and published outside the gate, in the publically<o:p id="yui_3_16_0_ym19_1_1460979808519_52327"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52328"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52329">available
data.<o:p id="yui_3_16_0_ym19_1_1460979808519_52330"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52331"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52332">2) The
default, if one is a simple registrant who does not want to hire a lawyer<o:p id="yui_3_16_0_ym19_1_1460979808519_52333"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52334"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52335">or other actor
to assume the role of legal contact and publish their details in<o:p id="yui_3_16_0_ym19_1_1460979808519_52336"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52337"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52338">the RDS, to
publishing registrant information, notably address and phone<o:p id="yui_3_16_0_ym19_1_1460979808519_52339"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52340"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52341">number in the
RDS outside the gate.<o:p id="yui_3_16_0_ym19_1_1460979808519_52342"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52343"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52344">3) The inclusion
of a principle of consent (28), whereby a registrant may<o:p id="yui_3_16_0_ym19_1_1460979808519_52345"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52346"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52347">consent to the
use or processing of her gated information for the permissible<o:p id="yui_3_16_0_ym19_1_1460979808519_52348"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52349"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52350">purposes
enumerated for accredited actors behind the gate.<o:p id="yui_3_16_0_ym19_1_1460979808519_52351"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52352"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52353"><o:p id="yui_3_16_0_ym19_1_1460979808519_52354">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52355"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52356">Rules engine
that enforces jurisdiction, with respect to the privacy rights of individuals
who are protected by personal data protection law. <o:p id="yui_3_16_0_ym19_1_1460979808519_52357"></o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: -0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52358"><!--[if !supportLists]--><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-fareast-font-family:Cambria;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52359">1)<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52360">&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52361">But
it only protects individuals, and occasionally legal persons in some<o:p id="yui_3_16_0_ym19_1_1460979808519_52362"></o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: 0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52363"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52364">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; jurisdictions, and only where data
protection is in place, and would find the<o:p id="yui_3_16_0_ym19_1_1460979808519_52365"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52366"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52367">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; presence of name, address and
phone number in a public directory to be in conflict<o:p id="yui_3_16_0_ym19_1_1460979808519_52368"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52369"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52370">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; with data protection law.&nbsp; <o:p id="yui_3_16_0_ym19_1_1460979808519_52371"></o:p></span></div><div style="margin: 0in 0in 0.0001pt 0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52372"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52373">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Not
all data protection regimes would find, or have found, that directory &nbsp;&nbsp;&nbsp;&nbsp;<o:p id="yui_3_16_0_ym19_1_1460979808519_52374"></o:p></span></div><div style="margin: 0in 0in 0.0001pt 0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52375"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52376">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; information
must be protected. <o:p id="yui_3_16_0_ym19_1_1460979808519_52377"></o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: -0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52378"><!--[if !supportLists]--><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-fareast-font-family:Cambria;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52379">2)<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52380">&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52381">Secondly,
it is not clear enough for me how that rules engine would<o:p id="yui_3_16_0_ym19_1_1460979808519_52382"></o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: 0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52383"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52384">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; encode rights.. <o:p id="yui_3_16_0_ym19_1_1460979808519_52385"></o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: -0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52386"><!--[if !supportLists]--><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-fareast-font-family:Cambria;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52387">3)<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52388">&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52389">A
third problem with the rules engine, is that it proposes to address regimes
with data protection law only….what happens to organizations that have a constitutional
right to privacy for the purposes of free speech and freedom of association,
such as in the United States? <o:p id="yui_3_16_0_ym19_1_1460979808519_52390"></o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: -0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52391"><!--[if !supportLists]--><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-fareast-font-family:Cambria;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52392">4)<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52393">&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52394">Finally,
is it fair to individuals in jurisdictions where their countries<o:p id="yui_3_16_0_ym19_1_1460979808519_52395"></o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: 0.5in;" id="yui_3_16_0_ym19_1_1460979808519_52396"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52397">have
not enacted data protection law? Does ICANN, in the monopoly administration<o:p id="yui_3_16_0_ym19_1_1460979808519_52398"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52399"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52400">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of a public resource, not have a
responsibility to set standards on an ethical basis,<o:p id="yui_3_16_0_ym19_1_1460979808519_52401"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52402"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52403">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; based on sound best practice? <o:p id="yui_3_16_0_ym19_1_1460979808519_52404"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52405"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52406"><o:p id="yui_3_16_0_ym19_1_1460979808519_52407">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52408"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52409">Two inadequate
remedies:<o:p id="yui_3_16_0_ym19_1_1460979808519_52410"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52411"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52412">1) Hire a
privacy proxy/service provider, or proxy contact, if you do not want<o:p id="yui_3_16_0_ym19_1_1460979808519_52413"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52414"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52415">your contact
data published in the public portion of the RDS<o:p id="yui_3_16_0_ym19_1_1460979808519_52416"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52417"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52418">2) The rules
engine will enforce data protection rights, and place this data<o:p id="yui_3_16_0_ym19_1_1460979808519_52419"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52420"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52421">behind the
gate.</span><span style="font-size:8.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52422"><o:p id="yui_3_16_0_ym19_1_1460979808519_52423"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52424"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52425"><o:p id="yui_3_16_0_ym19_1_1460979808519_52426">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52427"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52428">Consent
principle. <o:p id="yui_3_16_0_ym19_1_1460979808519_52429"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52430"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52431">1) Consent
must be read in the context of legitimacy of purpose, proportionality, rights
to refuse, rights to withdraw consent, specificity of purpose and use, and so
on. To offer individuals and organizations the opportunity to consent to the
use of their sensitive, gated data, for all the permissible purposes, that can
be read as providing blanket consent to accredited users behind the gate.</span><span style="font-size:8.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52432">
</span><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52433">If you understand the risks, you will hire a proxy service. From the
perspective of an elite North American, this looks like a nobrainer, just hire
a proxy.<o:p id="yui_3_16_0_ym19_1_1460979808519_52434"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52435"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52436">2) However, we
have a responsibility to examine this from the perspective of a<o:p id="yui_3_16_0_ym19_1_1460979808519_52437"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52438"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52439">global
eco-system.<o:p id="yui_3_16_0_ym19_1_1460979808519_52440"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52441"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52442">Recommendations:</span><o:p id="yui_3_16_0_ym19_1_1460979808519_52443"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52444"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52445">1. Gate the
legal contact information for individuals and organizations who<o:p id="yui_3_16_0_ym19_1_1460979808519_52446"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52447"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52448">wish to
protect their private data<o:p id="yui_3_16_0_ym19_1_1460979808519_52449"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52450"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52451">2. Consent
needs to be meaningful, specific, explicit and for legitimate purposes.<o:p id="yui_3_16_0_ym19_1_1460979808519_52452"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52453"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52454">A blanket
consent as envisioned here does not meet these requirements<o:p id="yui_3_16_0_ym19_1_1460979808519_52455"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52456"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52457"><o:p id="yui_3_16_0_ym19_1_1460979808519_52458">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52459"><b id="yui_3_16_0_ym19_1_1460979808519_52460"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52461">Next-generation-rds-framework-26apr15-en <o:p id="yui_3_16_0_ym19_1_1460979808519_52462"></o:p></span></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52463"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52464">Input to
PDP WG<o:p id="yui_3_16_0_ym19_1_1460979808519_52465"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52466"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52467">Privacy<o:p id="yui_3_16_0_ym19_1_1460979808519_52468"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52469"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52470">-EWG
Principles Sect 6&amp;7<o:p id="yui_3_16_0_ym19_1_1460979808519_52471"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52472"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52473">-P/P
Provider Survey<o:p id="yui_3_16_0_ym19_1_1460979808519_52474"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52475"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52476">-WHOIS P/P
Abuse Study-Data Protect/Privacy Memo<o:p id="yui_3_16_0_ym19_1_1460979808519_52477"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52478"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52479">-GNSO PPSAI
WG Report<o:p id="yui_3_16_0_ym19_1_1460979808519_52480"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52481"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52482"><o:p id="yui_3_16_0_ym19_1_1460979808519_52483">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52484"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52485">PDP WG<o:p id="yui_3_16_0_ym19_1_1460979808519_52486"></o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: -0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52487"><!--[if !supportLists]--><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-fareast-font-family:Calibri;mso-hansi-font-family:Calibri;mso-bidi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52488">1)<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52489">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><!--[endif]--><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52490">Phase 1: Policy Requirements<o:p id="yui_3_16_0_ym19_1_1460979808519_52491"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52492"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52493">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Privacy Reqs<o:p id="yui_3_16_0_ym19_1_1460979808519_52494"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52495"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52496">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -Privacy/Proxy Needs-At-Risk
RegNeeds-Data Protection Laws<o:p id="yui_3_16_0_ym19_1_1460979808519_52497"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52498"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52499"><o:p id="yui_3_16_0_ym19_1_1460979808519_52500">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: -0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52501"><!--[if !supportLists]--><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-fareast-font-family:Calibri;mso-hansi-font-family:Calibri;mso-bidi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52502">2)<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52503">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><!--[endif]--><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52504">Phase 2: Policy Functional Design<o:p id="yui_3_16_0_ym19_1_1460979808519_52505"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52506"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52507">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Privacy Design<o:p id="yui_3_16_0_ym19_1_1460979808519_52508"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52509"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52510">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -Overarching DP Policy-DP Law
Compliance-Privacy/Proxy Policies-Secure Protected Creds<o:p id="yui_3_16_0_ym19_1_1460979808519_52511"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52512"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52513"><o:p id="yui_3_16_0_ym19_1_1460979808519_52514">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt; text-indent: -0.25in;" id="yui_3_16_0_ym19_1_1460979808519_52515"><!--[if !supportLists]--><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-fareast-font-family:Calibri;mso-hansi-font-family:Calibri;mso-bidi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52516">3)<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52517">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><!--[endif]--><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52518">Phase 3: Implementation and Coexistence
Guidance<o:p id="yui_3_16_0_ym19_1_1460979808519_52519"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52520"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52521">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Privacy Guidance on<o:p id="yui_3_16_0_ym19_1_1460979808519_52522"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52523"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52524">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -RDS Privacy Policy
Needs-Detailed Legal Analysis<o:p id="yui_3_16_0_ym19_1_1460979808519_52525"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52526"><span style="font-size:10.0pt;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52527">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
-P/P Accreditation Needs-SPC Provider Criteria</span><b id="yui_3_16_0_ym19_1_1460979808519_52528"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52529"><o:p id="yui_3_16_0_ym19_1_1460979808519_52530"></o:p></span></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52531"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52532"><o:p id="yui_3_16_0_ym19_1_1460979808519_52533">&nbsp;</o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52534"><b id="yui_3_16_0_ym19_1_1460979808519_52535"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52536"><o:p id="yui_3_16_0_ym19_1_1460979808519_52537">&nbsp;</o:p></span></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52538"><b id="yui_3_16_0_ym19_1_1460979808519_52539"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52540"><o:p id="yui_3_16_0_ym19_1_1460979808519_52541">&nbsp;</o:p></span></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52542"><b id="yui_3_16_0_ym19_1_1460979808519_52543"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52544">Human Rights Council - Report by the UN Special
Rapporteur on the right to privacy<o:p id="yui_3_16_0_ym19_1_1460979808519_52545"></o:p></span></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52546"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52547">The
balance between privacy and security might start to tip again in favor of privacy,
across borders. &nbsp;<o:p id="yui_3_16_0_ym19_1_1460979808519_52548"></o:p></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52549"><span id="yui_3_16_0_ym19_1_1460979808519_52550"><b id="yui_3_16_0_ym19_1_1460979808519_52551"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52552">&nbsp;<o:p id="yui_3_16_0_ym19_1_1460979808519_52553"></o:p></span></b></span></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52554">In the resolution the Council emphasizes that Human Rights need to be
protected under all circumstances, at all times and in all environments.<o:p id="yui_3_16_0_ym19_1_1460979808519_52555"></o:p></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52556">In a world which
benefits greatly from <i id="yui_3_16_0_ym19_1_1460979808519_52557">an Internet without
borders</i>, the SRP’s consultations indicate widespread support for a general
principle of<span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52558"><o:p id="yui_3_16_0_ym19_1_1460979808519_52559"></o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_52560"><!--[if !supportLists]--><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52561">•<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52562">&nbsp;&nbsp;
</span></span><!--[endif]--><i id="yui_3_16_0_ym19_1_1460979808519_52563"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52564">Safeguards without borders<o:p id="yui_3_16_0_ym19_1_1460979808519_52565"></o:p></span></i></div><div id="yui_3_16_0_ym19_1_1460979808519_52566"><!--[if !supportLists]--><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52567">•<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52568">&nbsp;&nbsp;
</span></span><!--[endif]--><i id="yui_3_16_0_ym19_1_1460979808519_52569"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52570">Remedies across borders<o:p id="yui_3_16_0_ym19_1_1460979808519_52571"></o:p></span></i></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52572"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52573">Positing privacy as an enabling right as
opposed to being an end in itself, the SRP is pursuing an analysis of privacy
as an essential right which enables the achievement of an over-arching
fundamental right to the free, unhindered development of one’s personality.<o:p id="yui_3_16_0_ym19_1_1460979808519_52574"></o:p></span></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52575"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52576">The vast revenues derived from the
monetisation of personal data to the extent that it has become a marketable and
tradable commodity mean that the incentive for changing the business model
simply on account of privacy concerns is not very high.<o:p id="yui_3_16_0_ym19_1_1460979808519_52577"></o:p></span></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52578"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52579">While not necessarily the primary target of
cyber-security and cyber-espionage measures, the ordinary citizen may often get
caught in the cross-fire and his or her personal data and on-line activities
may end up being monitored in the name of national security in a way which is
unnecessary, disproportionate and excessive.<o:p id="yui_3_16_0_ym19_1_1460979808519_52580"></o:p></span></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52581"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52582">Importance of determining the balance, on the
one hand, use of data for the benefit of society under the principles of Open
Data and, on the other hand, the established principles we have developed to
date with a view to protecting fundamental rights like privacy, autonomy and
the free development of one’s personality. It will be seen that, in many cases,
the debate on privacy cannot be usefully divorced from that on the value of
autonomy or self-determination. Germany: since 1983, &nbsp;rise to a constitutional right to
“informational self-determination”.<o:p id="yui_3_16_0_ym19_1_1460979808519_52583"></o:p></span></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52584"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52585">Individual complaints: Every so often, and as
the mandate will become known, the SRP has received and will presumably
continue to receive complaints from individual members of the public residing
in a given national territory or from civil society actors of alleged
infringements of privacy rights.<o:p id="yui_3_16_0_ym19_1_1460979808519_52586"></o:p></span></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52587"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52588">There is no binding and universally accepted
definition of privacy. As reaffirmed by the Human Rights Council in resolution
28/16 article 12 of the Universal Declaration of Human Rights (UDHR) and
article 17 of the International Covenant on Civil and Political Rights (ICCPR)
constitute the basis of the right to privacy in international human rights law.
For the passage of time and the impact of technology, taken together with the
different rate of economic development and technology deployment in different
geographical locations means that legal principles established fifty years ago
(ICCPR) or even thirty-five years ago (e.g. the European Convention on Data
Protection) let alone seventy years ago (UDHR) may need to be re-visited,
further developed and possibly supplemented and complemented to make them more
relevant and useful to the realities of 2016.<o:p id="yui_3_16_0_ym19_1_1460979808519_52589"></o:p></span></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52590"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52591">Properly speaking, it is not helpful to talk
of “privacy vs. security” but rather of “privacy <b id="yui_3_16_0_ym19_1_1460979808519_52592"><u id="yui_3_16_0_ym19_1_1460979808519_52593">and </u></b>security” since both privacy and security are desiderata
... and both can be taken to be enabling rights rather than ends in themselves.<o:p id="yui_3_16_0_ym19_1_1460979808519_52594"></o:p></span></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52595"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52596">Brazil and Germany have the right to privacy
written into their constitution and it is the SRP’s contention that a) such a
right to dignity and the free, unhindered development of one’s personality
should be considered to be universally applicable and b) that
already-recognised rights such as privacy, freedom of expression and freedom of
access to information constitute a tripod of enabling rights which are best
considered in the context of their usefulness in enabling a human being to
develop his or her personality in the freest of manners.<o:p id="yui_3_16_0_ym19_1_1460979808519_52597"></o:p></span></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52598"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52599">Conclusions:<o:p id="yui_3_16_0_ym19_1_1460979808519_52600"></o:p></span></div><div style="text-indent:0in;mso-list:l1 level1 lfo4;tab-stops:right 56.7pt" id="yui_3_16_0_ym19_1_1460979808519_52601"><!--[if !supportLists]--><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52602">1.<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52603">&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><b id="yui_3_16_0_ym19_1_1460979808519_52604"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52605">Privacy has never been
more at the forefront of political, judicial and personal consciousness than in
2016;<o:p id="yui_3_16_0_ym19_1_1460979808519_52606"></o:p></span></b></div><div style="text-indent:0in;mso-list:l1 level1 lfo4;tab-stops:right 56.7pt" id="yui_3_16_0_ym19_1_1460979808519_52607"><!--[if !supportLists]--><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52608">2.<span style="font-stretch: normal; font-size: 7pt; font-family: 'Times New Roman';" id="yui_3_16_0_ym19_1_1460979808519_52609">&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><b id="yui_3_16_0_ym19_1_1460979808519_52610"><span lang="EN-GB" id="yui_3_16_0_ym19_1_1460979808519_52611">The tensions between
security, corporate business models and privacy continue to take centre stage
but the last twelve months have been marked by contradictory indicators: some
governments have continued, in practice and/or in their parliaments to take privacy-hostile
attitudes while courts world-wide but especially in the USA and Europe have
struck clear blows in favour of privacy and especially against
disproportionate, privacy-intrusive&nbsp;
measures such as mass surveillance or breaking of encryption. <o:p id="yui_3_16_0_ym19_1_1460979808519_52612"></o:p></span></b></div><div style="margin-left:0in;text-indent:0in;mso-list:none;tab-stops:.5in" id="yui_3_16_0_ym19_1_1460979808519_52613"><span lang="EN-GB" style="background:yellow;mso-highlight:yellow" id="yui_3_16_0_ym19_1_1460979808519_52614"><o:p id="yui_3_16_0_ym19_1_1460979808519_52615">&nbsp;</o:p></span></div><div style="margin-bottom: 12pt; margin-left: 60.45pt; text-align: justify; text-indent: -28.35pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52616"><b id="yui_3_16_0_ym19_1_1460979808519_52617"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52618">Judgement on preliminary ruling under Article 267 TFEU from
Audiencia Nacional (Spain)<o:p id="yui_3_16_0_ym19_1_1460979808519_52619"></o:p></span></b></div><div style="margin-bottom: 12pt; margin-left: 60.45pt; text-align: justify; text-indent: -28.35pt; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52620"><b id="yui_3_16_0_ym19_1_1460979808519_52621"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52622">Summary:</span></b><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52623"> The right to be forgotten. In
May 2014, the<span id="yui_3_16_0_ym19_1_1460979808519_52624">&nbsp;</span></span><a href="https://en.wikipedia.org/wiki/European_Court_of_Justice" title="European Court of Justice" style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52625"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(11, 0, 128); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52626">European Court of Justice</span></a><span id="yui_3_16_0_ym19_1_1460979808519_52627"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52628"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52629">&nbsp;</span></span><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52630">ruled against<span id="yui_3_16_0_ym19_1_1460979808519_52631">&nbsp;</span></span></span><a href="https://en.wikipedia.org/wiki/Google" title="Google" style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52632"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(11, 0, 128); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52633">Google</span></a><span id="yui_3_16_0_ym19_1_1460979808519_52634"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52635"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52636">&nbsp;</span></span><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52637">in<span id="yui_3_16_0_ym19_1_1460979808519_52638">&nbsp;</span></span><i style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52639"><a href="https://en.wikipedia.org/wiki/Google_v_Gonz%C3%A1lez" title="Google v González" id="yui_3_16_0_ym19_1_1460979808519_52640"><span style="color:#0B0080" id="yui_3_16_0_ym19_1_1460979808519_52641">Costeja</span></a></i><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52642">, a case brought by a Spanish man, Mario Costeja
González, who requested the removal of a link to a digitized 1998 article in<span id="yui_3_16_0_ym19_1_1460979808519_52643">&nbsp;</span></span><i style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52644">La
Vanguardia</i><span id="yui_3_16_0_ym19_1_1460979808519_52645"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52646">&nbsp;</span>newspaper about an auction for his foreclosed
home, for a debt that he had subsequently paid.</span></span><sup style="unicode-bidi: isolate; text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52647"><span style="font-size: 8.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52648"><a href="https://en.wikipedia.org/wiki/Right_to_be_forgotten#cite_note-40" id="yui_3_16_0_ym19_1_1460979808519_52649"><span style="color:#0B0080" id="yui_3_16_0_ym19_1_1460979808519_52650">[40]</span></a></span></sup><span id="yui_3_16_0_ym19_1_1460979808519_52651"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52652"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52653">&nbsp;</span></span><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52654">He initially attempted to have the article removed by
complaining to the<span id="yui_3_16_0_ym19_1_1460979808519_52655">&nbsp;</span></span></span><a href="https://en.wikipedia.org/wiki/Spanish_Data_Protection_Agency" title="Spanish Data Protection Agency" style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52656"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(11, 0, 128); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52657">Spanish Data Protection Agency</span></a><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52658"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52659">, which rejected
the claim on the grounds that it was lawful and accurate, but accepted a
complaint against Google and asked Google to remove the results.</span></span><sup style="unicode-bidi: isolate; text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52660"><span style="font-size: 8.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52661"><a href="https://en.wikipedia.org/wiki/Right_to_be_forgotten#cite_note-41" id="yui_3_16_0_ym19_1_1460979808519_52662"><span style="color:#0B0080" id="yui_3_16_0_ym19_1_1460979808519_52663">[41]</span></a></span></sup><span id="yui_3_16_0_ym19_1_1460979808519_52664"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52665"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52666">&nbsp;</span></span><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52667">Google sued in the<span id="yui_3_16_0_ym19_1_1460979808519_52668">&nbsp;</span></span></span><a href="https://en.wikipedia.org/wiki/Audiencia_Nacional_(Spain)" title="Audiencia Nacional (Spain)" style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52669"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(11, 0, 128); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52670">Spanish</span><span id="yui_3_16_0_ym19_1_1460979808519_52671"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(11, 0, 128); text-decoration: none; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52672">&nbsp;</span></span><i id="yui_3_16_0_ym19_1_1460979808519_52673"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(11, 0, 128); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52674">Audiencia Nacional</span></i></a><span id="yui_3_16_0_ym19_1_1460979808519_52675"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52676"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52677">&nbsp;</span></span><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52678">(National High Court) which referred a series of questions to
the European Court of Justice.</span></span><sup style="unicode-bidi: isolate; text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52679"><span style="font-size: 8.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52680"><a href="https://en.wikipedia.org/wiki/Right_to_be_forgotten#cite_note-42" id="yui_3_16_0_ym19_1_1460979808519_52681"><span style="color:#0B0080" id="yui_3_16_0_ym19_1_1460979808519_52682">[42]</span></a></span></sup><span id="yui_3_16_0_ym19_1_1460979808519_52683"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52684"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52685">&nbsp;</span></span><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52686">The court ruled in<span id="yui_3_16_0_ym19_1_1460979808519_52687">&nbsp;</span></span><i style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52688">Costeja</i><span id="yui_3_16_0_ym19_1_1460979808519_52689"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52690">&nbsp;</span>that search engines are responsible
for the content they point to and thus, Google was required to comply with EU
data privacy laws.</span></span><sup style="unicode-bidi: isolate; text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52691"><span style="font-size: 8.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52692"><a href="https://en.wikipedia.org/wiki/Right_to_be_forgotten#cite_note-43" id="yui_3_16_0_ym19_1_1460979808519_52693"><span style="color:#0B0080" id="yui_3_16_0_ym19_1_1460979808519_52694">[43]</span></a><a href="https://en.wikipedia.org/wiki/Right_to_be_forgotten#cite_note-44" id="yui_3_16_0_ym19_1_1460979808519_52695"><span style="color:#0B0080" id="yui_3_16_0_ym19_1_1460979808519_52696">[44]</span></a><a href="https://en.wikipedia.org/wiki/Right_to_be_forgotten#cite_note-45" id="yui_3_16_0_ym19_1_1460979808519_52697"><span style="color:#0B0080" id="yui_3_16_0_ym19_1_1460979808519_52698">[45]</span></a></span></sup><span id="yui_3_16_0_ym19_1_1460979808519_52699"><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52700"><span style="text-align: start;" id="yui_3_16_0_ym19_1_1460979808519_52701">&nbsp;</span></span><span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(37, 37, 37); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52702">On its first day of compliance only (May 30, 2014), Google
received 12,000 requests to have personal details removed from its search
engine.</span></span><b id="yui_3_16_0_ym19_1_1460979808519_52703"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52704"><o:p id="yui_3_16_0_ym19_1_1460979808519_52705"></o:p></span></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52706"><b id="yui_3_16_0_ym19_1_1460979808519_52707"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52708"><o:p id="yui_3_16_0_ym19_1_1460979808519_52709">&nbsp;</o:p></span></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52710"><b id="yui_3_16_0_ym19_1_1460979808519_52711"><span style="font-size: 10pt; font-family: 'Segoe UI', sans-serif; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;" id="yui_3_16_0_ym19_1_1460979808519_52712">-WorldLII Database of National Data Privacy
Legislation (do not need to review the database, just summarize its relevance
to this PDP)</span></b><b id="yui_3_16_0_ym19_1_1460979808519_52713"><span style="font-size:12.0pt;font-family:&quot;Cambria&quot;,serif;mso-bidi-font-family:Cambria" id="yui_3_16_0_ym19_1_1460979808519_52714"><o:p id="yui_3_16_0_ym19_1_1460979808519_52715"></o:p></span></b></div><div style="margin-bottom: 0.0001pt;" id="yui_3_16_0_ym19_1_1460979808519_52716"><o:p id="yui_3_16_0_ym19_1_1460979808519_52717">&nbsp;</o:p></div><div id="yui_3_16_0_ym19_1_1460979808519_52718"><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52719">Important
database for the construction of the ‘rules engine’. </span><span style="font-family:&quot;Calibri&quot;,sans-serif;mso-bidi-font-family:Calibri" id="yui_3_16_0_ym19_1_1460979808519_52720">RDS
actors will be held to standard contract clauses that are harmonized with data
protection and privacy laws, codified in RDS policy, and implemented through a
“rules engine” that applies policy as appropriate for each jurisdiction. (EWG)</span><span style="font-size:11.0pt;color:windowtext" id="yui_3_16_0_ym19_1_1460979808519_52721"><o:p id="yui_3_16_0_ym19_1_1460979808519_52722"></o:p></span></div><div id="yui_3_16_0_ym19_1_1460979808519_50233">





















































































































































































































































































































































</div><div dir="ltr" id="yui_3_16_0_ym19_1_1460979808519_52723"><o:p id="yui_3_16_0_ym19_1_1460979808519_52724">&nbsp;</o:p></div><div></div><div>&nbsp;</div><div class="signature" id="yui_3_16_0_ym19_1_1460979808519_50820">Nathalie Coupet&nbsp;</div> <div class="qtdSeparateBR"><br><br></div><div class="yahoo_quoted" style="display: block;"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;"> <div dir="ltr"><font size="2" face="Arial"> On Monday, April 18, 2016 10:03 AM, Lisa Phifer &lt;lisa@corecom.com&gt; wrote:<br></font></div>  <br><br> <div class="y_msg_container">Dear privacy team,<br><br>Today's updated privay team checklist is attached and also posted to <br>the wiki at:<br><a href="https://community.icann.org/x/p4xlAw" target="_blank">https://community.icann.org/x/p4xlAw</a><br><br>Thanks to those who volunteered to review additional documents.<br><br>David will be following up on pending assignmenta and next steps for <br>this team to discuss questions listed here: <br><a href="https://community.icann.org/x/iTeAAw" target="_blank">https://community.icann.org/x/iTeAAw</a><br><br>Best,<br>Lisa <br>_______________________________________________<br>Gnso-rds-pdp-privacy mailing list<br><a ymailto="mailto:Gnso-rds-pdp-privacy@icann.org" href="mailto:Gnso-rds-pdp-privacy@icann.org">Gnso-rds-pdp-privacy@icann.org</a><br><a href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-privacy" target="_blank">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-privacy</a><br><br></div>  </div> </div>  </div></div></body></html>