<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>Im sorry but i don't see the logic here (or the legal constraint)</div><div id="AppleMailSignature"><br></div><div id="AppleMailSignature">Privacy laws protect personal data of INDIVIDUALS. &nbsp;They do t protect non-personal data or data from non-individuals.</div><div id="AppleMailSignature"><br></div><div id="AppleMailSignature">Nothing on the list below is personal data. &nbsp;And no e of the principles given by Natalie apply.</div><div id="AppleMailSignature"><br></div><div id="AppleMailSignature">The fact that i could use the data to obtain other data is irrelevant. &nbsp;I can use a car to rob a bank but that itself is not a reason to restrict access to automobiles.</div><div id="AppleMailSignature"><br></div><div id="AppleMailSignature">Me thinks you are trying to create a scarcity for some reason.<br><br>Sent from my iPad</div><div><br>On 30 May 2017, at 23:22, Chris Pelling &lt;<a href="mailto:chris@netearth.net">chris@netearth.net</a>&gt; wrote:<br><br></div><blockquote type="cite"><div><div style="font-family: Arial; font-size: 12pt; color: #000000"><div>ok - a thought :<br></div><div><br data-mce-bogus="1"></div><div>Thin data includes nameservers, being able to <strong><u>mass</u></strong> collect thin data gaining NS information then allows you to do a DIG of a SOA record on the DNS service to gain the email address of the hostmaster : <br data-mce-bogus="1"></div><div><br data-mce-bogus="1"></div><div>Some examples (radomly picked from the list)&nbsp; :<br data-mce-bogus="1"></div><div><a href="http://gmail.com">gmail.com</a> :<br data-mce-bogus="1"></div><div>SOA&nbsp;&nbsp;&nbsp;&nbsp; <a href="http://ns1.google.com">ns1.google.com</a>. <a href="http://dns-admin.google.com">dns-admin.google.com</a>. 157458041 900 900 1800 60<br><a href="http://netearthone.com">netearthone.com</a><br></div><div>SOA&nbsp;&nbsp;&nbsp;&nbsp; <a href="http://ns1.netearth.net">ns1.netearth.net</a>. <a href="http://root.netearthone.com">root.netearthone.com</a>. 2016090201 14400 3600 1209600 86400<br></div><div><a href="http://law.es">law.es</a><br></div><div>SOA&nbsp;&nbsp;&nbsp;&nbsp; <a href="http://ns1.eurodns.com">ns1.eurodns.com</a>. <a href="http://hostmaster.eurodns.com">hostmaster.eurodns.com</a>. 2016061402 43200 7200 1209600 86400<br></div><div><a href="http://riskiq.net">riskiq.net</a><br data-mce-bogus="1"></div><div>SOA&nbsp;&nbsp;&nbsp;&nbsp; <a href="http://ns-1754.awsdns-27.co.uk">ns-1754.awsdns-27.co.uk</a>. <a href="http://awsdns-hostmaster.amazon.com">awsdns-hostmaster.amazon.com</a>. 1 7200 900 1209600 86400<br></div><div><br data-mce-bogus="1"></div><div>Now as you can see - those above examples allow you to get (or build) an email list.&nbsp; Most will normally point to the providers service, but, some that are DIY'ing their hosting, it might not be.<br data-mce-bogus="1"></div><div><br></div><div data-marker="__SIG_PRE__">Kind regards,<br><br>Chris</div><div><br></div><hr id="zwchr" data-marker="__DIVIDER__"><div data-marker="__HEADERS__"><b>From: </b>"allison nixon" &lt;<a href="mailto:elsakoo@gmail.com">elsakoo@gmail.com</a>&gt;<br><b>To: </b>"nathalie coupet" &lt;<a href="mailto:nathaliecoupet@yahoo.com">nathaliecoupet@yahoo.com</a>&gt;<br><b>Cc: </b>"gnso-rds-pdp-wg" &lt;<a href="mailto:gnso-rds-pdp-wg@icann.org">gnso-rds-pdp-wg@icann.org</a>&gt;<br><b>Sent: </b>Tuesday, 30 May, 2017 21:52:32<br><b>Subject: </b>Re: [gnso-rds-pdp-wg] Principle on Proportionality for "Thin&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Data"access<br></div><div><br></div><div data-marker="__QUOTED_TEXT__"><div dir="ltr">so can you name one specific example of how someone could abuse thin data?</div><div class="gmail_extra"><br><div class="gmail_quote">On Tue, May 30, 2017 at 4:50 PM, nathalie coupet via gnso-rds-pdp-wg <span dir="ltr">&lt;<a href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div style="color:#000;background-color:#fff;font-family:Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:13px"><div id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287437" dir="ltr"><b style="color:rgb(34,34,34);font-family:sans-serif;font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287679">Abuse</b><span style="color:rgb(34,34,34);font-family:sans-serif;font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287680">&nbsp;is the improper usage or treatment of an&nbsp;</span><a href="https://en.wikipedia.org/wiki/Entity" title="Entity" style="text-decoration-line:none;color:rgb(11,0,128);background-image:none;background-color:rgb(255,255,255);font-family:sans-serif;font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287681" target="_blank">entity</a><span style="color:rgb(34,34,34);font-family:sans-serif;font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287682">, often to&nbsp;</span><a href="https://en.wikipedia.org/wiki/Distributive_justice" title="Distributive justice" style="text-decoration-line:none;color:rgb(11,0,128);background-image:none;background-color:rgb(255,255,255);font-family:sans-serif;font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287683" target="_blank">unfairly</a><span style="color:rgb(34,34,34);font-family:sans-serif;font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287684">&nbsp;or improperly gain benefit. In our context, abuse is the improper usage of WHOIS/RDS to unfairly or improperly gain access to information or to game the system.&nbsp;</span></div><div id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287437" dir="ltr"><span style="color:rgb(34,34,34);font-family:sans-serif;font-size:14px"><br></span></div><div id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287437" dir="ltr"><span style="color:rgb(34,34,34);font-family:sans-serif;font-size:14px">Here are some of the overarching principles which should guide us when building RDS:&nbsp;</span><br></div><div id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287437" dir="ltr"><span style="color:rgb(34,34,34);font-family:sans-serif;font-size:14px"><br></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287894"><span id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287895" data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287896">DATA LIFECYCLE &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;PRIVACY PRINCIPLE &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; PROTECTION MEASURE</span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287897"><span id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287898" data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287899">Collection &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Proportionality and purpose specification &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Data minimisation, Data quality</span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287900"><span id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287901" data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287902">Storage &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Accountability, Security measures, Sensitive data &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Confidentiality, Encryption, Pseudonomisation</span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287903"><span id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287904" data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287905">Sharing and processing Lawfulness and fairness, Consent, Right of access &nbsp;Data access control, Data leakage prevention</span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287906"><span id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287907" data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287908">Deletion &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Openness, Right to erasure &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Retention, Archival, Erasure</span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287906"><span data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px"><br></span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287906"><span data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px"><br></span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287906"><span id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_291686" data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_291685">If such principles are not respected, ICANN will be liable. Consumers don't need to have all the thin data when making a query. This could protect them and enable them to have access to the RDS without raising much opposition. &nbsp;</span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287906"><span data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px"><br></span></span></div><div dir="ltr" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287906"><span id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_292975" data-mce-style="color: #222222; font-family: sans-serif;" style="color: #222222; font-family: sans-serif;" face="sans-serif" color="#222222"><span style="font-size:14px" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_292974">Now, we could discuss the possibility for broader query types. These principles would still apply, but would be contextualized in order to take into account new sets of parameters for each broader query. By increasing granularity as much as possible, while applying these aformentioned principles, we just might find a way to accomodate everyone. &nbsp;</span></span></div><div id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287437"><span><br></span></div><div id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287437"><span><br></span></div><div id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287435">&nbsp;</div><div class="m_-1108286820301507687signature" id="m_-1108286820301507687yui_3_16_0_ym19_1_1496151286812_287433">Nathalie&nbsp;</div> <div class="m_-1108286820301507687qtdSeparateBR"><br><br></div><div class="m_-1108286820301507687yahoo_quoted" style="display:block"> <div style="font-family:Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:13px"> <div style="font-family:HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:16px"><span class=""> <div dir="ltr"><span data-mce-style="font-family: Arial; font-size: small;" style="font-family: Arial; font-size: small;" size="2" face="Arial"> On Tuesday, May 30, 2017 4:00 PM, John Horton &lt;<a href="mailto:john.horton@legitscript.com" target="_blank">john.horton@legitscript.com</a>&gt; wrote:<br></span></div>  <br><br> </span><div class="m_-1108286820301507687y_msg_container"><div id="m_-1108286820301507687yiv8771876093"><div><span class=""><div dir="ltr"><div class="m_-1108286820301507687yiv8771876093gmail_default" style="font-family:arial,helvetica,sans-serif;color:#444444">I was going to reply to Natalie's email as well, but Paul's comments capture my thoughts, so: <b>+1.&nbsp;</b></div></div></span><div class="m_-1108286820301507687yiv8771876093gmail_extra"><span class=""><br clear="all"><div><div class="m_-1108286820301507687yiv8771876093gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><span data-mce-style="color: #073763; font-family: arial,helvetica,sans-serif;" style="color: #073763; font-family: arial,helvetica,sans-serif;" face="arial, helvetica, sans-serif" color="#073763">John Horton<br clear="none">President and CEO, LegitScript</span><div><img width="96" height="36" src="cid:"><br clear="none"><div><div><div style="margin:0.0px 0.0px 0.0px 0.0px;font:12.0px Helvetica"><br clear="none"></div><div style="margin:0px;font-style:normal;font-variant:normal;font-size:12px;line-height:normal;font-family:Helvetica"><b><span data-mce-style="color: #444444;" style="color: #444444;" color="#444444">Follow</span><span data-mce-style="color: #0b5394;" style="color: #0b5394;" color="#0b5394"> </span><span data-mce-style="color: #000000;" style="color: #000000;" color="#000000">Legit</span><span data-mce-style="color: #0b5394;" style="color: #0b5394;" color="#0b5394">Script</span></b>: <a rel="nofollow" shape="rect" href="http://www.linkedin.com/company/legitscript-com" style="font-weight:normal" target="_blank"><span data-mce-style="color: #cc0000;" style="color: #cc0000;" color="#cc0000">LinkedIn</span></a>&nbsp; | &nbsp;<a rel="nofollow" shape="rect" href="https://www.facebook.com/LegitScript" style="font-weight:normal" target="_blank"><span data-mce-style="color: #6aa84f;" style="color: #6aa84f;" color="#6aa84f">Facebook</span></a>&nbsp; | &nbsp;<a rel="nofollow" shape="rect" href="https://twitter.com/legitscript" style="font-weight:normal" target="_blank"><span data-mce-style="color: #674ea7;" style="color: #674ea7;" color="#674ea7">Twitter</span></a>&nbsp; | &nbsp;<span data-mce-style="color: #ff9900;" style="color: #ff9900;" color="#ff9900"><span data-mce-style="text-decoration: underline;" style="text-decoration: underline;"><a rel="nofollow" shape="rect" href="http://blog.legitscript.com/" target="_blank">Blog</a></span></span> &nbsp;|<span data-mce-style="color: #ff9900;" style="color: #ff9900;" color="#ff9900"> &nbsp;<span data-mce-style="font-weight: normal;" style="font-weight: normal;"><a rel="nofollow" shape="rect" href="https://plus.google.com/112436813474708014933/posts" target="_blank">Google+</a></span></span><br data-mce-bogus="1"></div><div style="margin:0px;font-style:normal;font-variant:normal;font-size:12px;line-height:normal;font-family:Helvetica"><span data-mce-style="color: #ff9900;" style="color: #ff9900;" color="#ff9900"><br clear="none"></span></div><div style="text-align:left;margin:0px;font-style:normal;font-variant:normal;font-size:12px;line-height:normal;font-family:Helvetica"><span data-mce-style="color: #ff9900;" style="color: #ff9900;" color="#ff9900"><img width="46" height="96" src="cid:"><img width="47" height="96" src="cid:"><br clear="none"></span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
<br clear="none"></span><div class="m_-1108286820301507687yiv8771876093gmail_quote"><span class="">On Tue, May 30, 2017 at 12:57 PM, Paul Keating <span dir="ltr">&lt;<a rel="nofollow" shape="rect" href="mailto:paul@law.es" target="_blank">paul@law.es</a>&gt;</span> wrote:<br clear="none"></span><blockquote class="m_-1108286820301507687yiv8771876093gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="m_-1108286820301507687yiv8771876093yqt3775885078" id="m_-1108286820301507687yiv8771876093yqt77589"><div><span class=""><div>Natalie,</div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature"><br clear="none"></div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature">Thank you for the email.&nbsp; Im copying the list because i see others have replied to your comment.</div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature"><br clear="none"></div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature">I strenuously object to the concept.&nbsp; We are discussing THIN DATA ONLY HERE.&nbsp; Unless someone can explain to me why any of this data set has privacy concerns this is a non-issue.&nbsp; I would certainly appreciate someone explaining what, if any, privacy issues are perceived to be at issue here.</div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature"><br clear="none"></div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature">Moreover, while you suggest that the idea escapes the need to declare a purpose, it does nothing but reinforce a subjective criteria based system in which the declared purpose is used to somehow limit the data being retrieved.</div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature"><br clear="none"></div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature">If i am missing something please let me know.&nbsp;</div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature"><br clear="none">Paul</div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945AppleMailSignature"><br clear="none">Sent from my iPad</div></span><div><div class="m_-1108286820301507687yiv8771876093h5"><span class=""><div><br clear="none">On 30 May 2017, at 21:08, nathalie coupet via gnso-rds-pdp-wg &lt;<a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>&gt; wrote:<br clear="none"><br clear="none"></div></span><blockquote><div><div style="color:#000;background-color:#fff;font-family:Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:13px"><span class=""><div dir="ltr" id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yui_3_16_0_ym19_1_1496151286812_239556">Hi Paul,</div><div dir="ltr" id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yui_3_16_0_ym19_1_1496151286812_239556"><br clear="none"></div><div dir="ltr" id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yui_3_16_0_ym19_1_1496151286812_239556">In the context of thin data, in view of the opposition of some to allow unauthenticated access to all the thin data, the principle of proportionality serves as an over-arching principle at this particular phase in our work in order to protect data from abuse while not restricting access. &nbsp;&nbsp;</div><div dir="ltr" id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yui_3_16_0_ym19_1_1496151286812_239556">Thin data must be proportionate to the query, be useful for that particular query. All and any other thin data foreign to this query should not be shared. This principle potentially avoids having to resort to 'legitimate purposes' which cannot be verified for unauthenticated access. &nbsp;&nbsp;</div><div dir="ltr" id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yui_3_16_0_ym19_1_1496151286812_239556">&nbsp;</div><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yui_3_16_0_ym19_1_1496151286812_239558">&nbsp;</div><div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945signature" id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yui_3_16_0_ym19_1_1496151286812_239560">Nathalie&nbsp;</div> <div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945qtdSeparateBR"><br clear="none"><br clear="none"></div></span><div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yahoo_quoted" style="display:block"> <div style="font-family:Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:13px"> <div style="font-family:HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:16px"><span class=""> <div dir="ltr"><span data-mce-style="font-family: Arial; font-size: small;" style="font-family: Arial; font-size: small;" size="2" face="Arial"> On Tuesday, May 30, 2017 2:44 PM, "Gomes, Chuck via gnso-rds-pdp-wg" &lt;<a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>&gt; wrote:<br clear="none"></span></div>  <br clear="none"><br clear="none"> </span><div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945y_msg_container"><div id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320"><div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320WordSection1"><span class="">
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:11.0pt">Because Nathalie was the originator and was unable to speak on the call, I encourage her to describe the nature of the issue on this thread.</span></div> 
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:11.0pt"> &nbsp;</span></div> 
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:11.0pt">Chuck</span></div> 
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><a rel="nofollow" shape="rect" name="m_-1108286820301507687_m_-2551964071040587945__MailEndCompose"><span style="font-size:11.0pt"> &nbsp;</span></a><br data-mce-bogus="1"></div> 
<span></span>
</span><div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320yqt1472831610" id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320yqt95202"><div>
<div style="border:none;border-top:solid #e1e1e1 1.0pt;padding:3.0pt 0in 0in 0in">
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><b><span style="font-size:11.0pt">From:</span></b><span style="font-size:11.0pt"> <a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg-bounces@icann.org" target="_blank">gnso-rds-pdp-wg-bounces@icann. org</a> [<a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg-bounces@icann.org" target="_blank">mailto:gnso-rds-pdp-wg- bounces@icann.org</a>]
<b>On Behalf Of </b>Paul Keating<span class=""><br clear="none">
<b>Sent:</b> Tuesday, May 30, 2017 2:17 PM<br clear="none">
<b>To:</b> Lisa Phifer &lt;<a rel="nofollow" shape="rect" href="mailto:lisa@corecom.com" target="_blank">lisa@corecom.com</a>&gt;; RDS PDP WG &lt;<a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>&gt;<br clear="none">
<b>Subject:</b> [EXTERNAL] Re: [gnso-rds-pdp-wg] Principle on Proportionality for "Thin Data"access</span></span></div> 
</div>
</div><span class="">
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"> &nbsp;</div> 
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt">Im sorry to have missed the call but had a client engagement.</span></div> 
</div>
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt"> &nbsp;</span></div> 
</div>
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt">Can someone briefly describe the nature of the issue?</span></div> 
</div>
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt"> &nbsp;</span></div> 
</div>
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt">Thanks</span></div> 
</div>
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt">Paul</span></div> 
</div>
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt"> &nbsp;</span></div> 
</div>
</span><div style="border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in 0in 0in">
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><b><span style="font-size:11.0pt">From:
</span></b><span style="font-size:11.0pt">&lt;<a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg-bounces@icann.org" target="_blank">gnso-rds-pdp-wg-bounces@ icann.org</a>&gt; on behalf of Lisa Phifer &lt;<a rel="nofollow" shape="rect" href="mailto:lisa@corecom.com" target="_blank">lisa@corecom.com</a>&gt;<span class=""><br clear="none">
<b>Date: </b>Tuesday, May 30, 2017 at 7:52 PM<br clear="none">
<b>To: </b>RDS PDP WG &lt;<a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a>&gt;<br clear="none">
<b>Subject: </b>[gnso-rds-pdp-wg] Principle on Proportionality for "Thin Data"access</span></span></div> 
</div>
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt"> &nbsp;</span></div> 
</div>
<blockquote id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MAC_OUTLOOK_ATTRIBUTION_BLOCKQUOTE" style="border:none;border-left:solid #b5c4df 4.5pt;padding:0in 0in 0in 4.0pt;margin-left:3.75pt;margin-right:0in"><span class="">
<div>
<div>
<div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt">All, per today's call action item:<br clear="none">
<br clear="none">
<b>Action Item: Nathalie Coupet and any other WG members who wish to do so to propose to the WG list a new principle on proportionality for "thin data." All WG members to comment on that proposed principle in advance of next call.<br clear="none">
<br clear="none">
</b>we are starting a new thread here which anyone may reply to if they wish to propose (or respond to) a new principle on proportionality for "thin data" access.<br clear="none">
<br clear="none">
Best, Lisa</span></div> 
</div>
</div>
</span><div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yiv0605036320MsoNormal"><span style="font-size:10.5pt">______________________________ _________________ gnso-rds-pdp-wg mailing list
<a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a> <a rel="nofollow" shape="rect" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" target="_blank">
https://mm.icann.org/mailman/ listinfo/gnso-rds-pdp-wg</a></span><br data-mce-bogus="1"></div> 
</blockquote></div>
</div>
</div></div><span class=""><div class="m_-1108286820301507687yiv8771876093m_-2551964071040587945yqt1472831610" id="m_-1108286820301507687yiv8771876093m_-2551964071040587945yqt24053">______________________________ _________________<br clear="none">gnso-rds-pdp-wg mailing list<br clear="none"><a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a><br clear="none"><a rel="nofollow" shape="rect" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" target="_blank">https://mm.icann.org/mailman/ listinfo/gnso-rds-pdp-wg</a><br data-mce-bogus="1"></div><br clear="none"><br clear="none"></span></div>  </div> </div>  </div></div></div></blockquote><span class=""><blockquote><div><span>______________________________ _________________</span><br clear="none"><span>gnso-rds-pdp-wg mailing list</span><br clear="none"><span><a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a></span><br clear="none"><span><a rel="nofollow" shape="rect" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" target="_blank">https://mm.icann.org/mailman/ listinfo/gnso-rds-pdp-wg</a></span><br data-mce-bogus="1"></div></blockquote></span></div></div></div></div><span class=""><br clear="none">______________________________ _________________<br clear="none">
gnso-rds-pdp-wg mailing list<br clear="none">
<a rel="nofollow" shape="rect" href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a><br clear="none">
<a rel="nofollow" shape="rect" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" target="_blank">https://mm.icann.org/mailman/ listinfo/gnso-rds-pdp-wg</a><br clear="none"></span></blockquote></div><br clear="none"></div></div></div><br><br></div>  </div> </div>  </div></div></div><br>_______________________________________________<br>
gnso-rds-pdp-wg mailing list<br>
<a href="mailto:gnso-rds-pdp-wg@icann.org" target="_blank">gnso-rds-pdp-wg@icann.org</a><br>
<a href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" rel="noreferrer" target="_blank">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a><br></blockquote></div><br><br clear="all"><br>-- <br><div class="gmail_signature">_________________________________<br>Note to self: Pillage BEFORE burning.</div>
</div>
<br>_______________________________________________<br>gnso-rds-pdp-wg mailing list<br><a href="mailto:gnso-rds-pdp-wg@icann.org">gnso-rds-pdp-wg@icann.org</a><br><a href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a><br></div></div></div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>gnso-rds-pdp-wg mailing list</span><br><span><a href="mailto:gnso-rds-pdp-wg@icann.org">gnso-rds-pdp-wg@icann.org</a></span><br><span><a href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a></span></div></blockquote></body></html>