[Gnso-rds-pdp-7] Proposed roll-up purposes

Rod Rasmussen rod at rodrasmussen.com
Wed Nov 8 20:01:58 UTC 2017


Ayden,

You raise important points that deserve a lot of careful discussion, review, and debate, but for future discussion, not the current “inventory” project of what actually is happening.  If anything, the last version of the paper isn’t broad enough in this category, to whit, actors we didn’t list may include nearly anyone attempting to either track down the source of an online abuse they have experienced or attempting to determine the authenticity of a website or e-mail communication.  Fake job sites, confidence scams, tax refund ripoffs, bogus escrow services, and a whole host of fraud targeting individual Internet users are constantly being set-up as websites and communicated with via e-mail, SMS, and other messaging services.  A very large portion of these are reported to authorities because individuals receiving solicitations do their homework to determine the veracity of a claim.  Whois plays a big part in that, as people can use it to see when, where and how a domain involved with these scams is registered and controlled.  In my prior work for companies, many of these sites were reported by average customers who did their own research to protect themselves and were thoughtful enough to report it to others for action.

We will have plenty of time to debate whether or not continuing to allow people to do this kind of research with the benefit of RDS data fits into privacy laws or not, but that doesn’t change the reality of how things are done today.  I strongly encourage us to stick with the facts of what is happening and how people would *like* to use data to create the universe of information we then debate about how they actually *can* use the data in the future.  Limiting things now or leaving out important actors, uses, etc. at this stage is moving the debate inappropriately to the fact gathering side of the equation.

I don’t believe you were in attendance at the session I presented at in Abu Dhabi (as I wasn’t able to attend others) but a lot of these issues you raise were discussed in that session.  In particular, the topics of how fine-grained we need to be vs. creating purposes that don’t stretch on towards infinity were quite interesting to try to get our arms around.  Frankly, that is going to be one of the very hardest balances to strike, and we’re going to need to look to how others dealing with GDPR and other privacy requirements end up dealing with similar issues.  Our proposal at this point is to present things in these broader buckets as a way of getting a handle on the issues while still preserving the more fine-grained details of who, what, why, etc. different data is accessed so we don’t lose that information should it be required at the end of the process we go through.

Cheers,

Rod

> On Nov 8, 2017, at 1:31 AM, Ayden Férdeline <ayden at ferdeline.com> wrote:
> 
> Hi,
> 
> Apologies that I was unable to attend yesterday's call.
> 
> I understand that we are not yet at the stage where we are assessing the validity of a purpose, so I have been trying to avoid entering into that arena, however I find it very problematic the broad categories of users who supposedly need access to all of this data:
> 
> "regulatory authorities, law enforcement, cybersecurity professionals, IT administrators, automated protection systems and other incident responders"
> 
> This is simply too broad. These parties may have a legitimate need for domain meta data (though I question what "IT administrators" and "other incident responders" are - I think we should define all user types and strike these two out, rather than have something so open-ended listed), but they do not necessarily have a need for registrant contact information. In some instances, perhaps.
> 
> I would also like to strike "etc" from the final sentence of investigation, notification, and reputation, because it is too expansive. Thanks.
> 
> —Ayden
> 
> 
>> -------- Original Message --------
>> Subject: [Gnso-rds-pdp-7] Proposed roll-up purposes
>> Local Time: 8 November 2017 6:15 AM
>> UTC Time: 8 November 2017 06:15
>> From: rod at rodrasmussen.com
>> To: gnso-rds-pdp-7 at icann.org
>> 
>> I’m going to leave off the “consequences of not providing information" for now - that’s not part of the purpose.  However, we should work on that separately and include that feedback as part of our final product.
>> 
>> Investigation:
>> 
>> The following information is to be made available to regulatory authorities, law enforcement, cybersecurity professionals, IT administrators, automated protection systems and other incident responders for the purpose of enabling identification of the nature of the registration and operation of a domain name linked to abuse and/or criminal activities to facilitate the eventual mitigation and resolution of the abuse identified: Domain metadata (registrar, registration date, nameservers, etc.), Registrant contact information, Registrar contact Information, DNS contact, etc..
>> 
>> Notification:
>> 
>> The following information is collected and made available for the purpose of enabling notification by regulatory authorities, law enforcement, cybersecurity professionals, IT administrators, automated protection systems and other incident responders of the appropriate party (registrant, providers of associated services, registrar, etc), of abuse linked to a certain domain name registration to facilitate the mitigation and resolution of the abuse identified: Registrant contact information, Registrar contact Information, DNS contact, etc..
>> 
>> Reputation:
>> 
>> The following information is to be made available to organizations running automated protection systems for the purpose of enabling the establishment of reputation for a domain name to facilitate the provision of services and acceptance of communications from the domain name examined: Domain metadata (registrar, registration date, nameservers, etc.), Registrant contact information, Registrar contact Information, DNS contact, etc..
>> 
>> We should chat more about the particulars here, but these cover the concepts.  I would argue that the first and third are purely a “display” purpose, but the second could be used as justification of collection.  If nothing else, collecting an “abuse contact” requires number two for justification at all.
>> 
>> Cheers,
>> 
>> Rod
> 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-7/attachments/20171108/f2d83370/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 235 bytes
Desc: Message signed with OpenPGP
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-7/attachments/20171108/f2d83370/signature.asc>


More information about the Gnso-rds-pdp-7 mailing list