[gnso-rds-pdp-wg] Example Use case

Kathy Kleiman kathy at kathykleiman.com
Mon Jul 25 13:10:58 UTC 2016


@Marika, with absolute respect, I need to share that no company develops 
a directory of secondary uses of personal and sensitive data based on 
all the ways people want to use it. The discussion is always, first and 
foremost, about how you have to Limit the Availability of personal and 
sensitive data for secondary uses consistent with national law (of the 
company) and the national laws of the citizens (whose data is being 
collected).

No one does it this way, guys.

Kathy


On 7/25/2016 5:08 AM, Marika Konings wrote:
>
> Ayen, I think you may be misinterpreting what Lisa stated. Note that 
> she said ‘we are starting with use cases to develop a shared 
> understanding of today's real-world scenarios. It's very useful to 
> flag problems that may need to be solved, possible improvements, etc, 
> within use cases.’ which could include something like user wants X to 
> be able to do Y, but for reasons A and B this is not possible under 
> the existing WHOIS protocol. Rod’s email sheds some further light on 
> how use cases where approached in the context of the EWG that might be 
> helpful.
>
> Best regards,
>
> Marika
>
> *Marika Konings*
>
> Senior Policy Director & Team Leader for the GNSO, Internet 
> Corporation for Assigned Names and Numbers (ICANN)
>
> Email: marika.konings at icann.org <mailto:marika.konings at icann.org>
>
> //
>
> /Follow the GNSO via Twitter @ICANN_GNSO/
>
> /Find out more about the GNSO by taking our interactive courses 
> <http://learn.icann.org/courses/gnso> and visiting the GNSO Newcomer 
> pages 
> <http://gnso.icann.org/sites/gnso.icann.org/files/gnso/presentations/policy-efforts.htm#newcomers>./
>
> *From: *<gnso-rds-pdp-wg-bounces at icann.org> on behalf of Ayden 
> Férdeline <icann at ferdeline.com>
> *Date: *Monday 25 July 2016 at 10:58
> *To: *Lisa Phifer <lisa at corecom.com>
> *Cc: *"gnso-rds-pdp-wg at icann.org" <gnso-rds-pdp-wg at icann.org>
> *Subject: *Re: [gnso-rds-pdp-wg] Example Use case
>
> I share Lisa's interpretation of this task. At this stage of our work 
> plan, we should only be looking at how the existing WHOIS protocol is 
> being used or misused.
>
> - Ayden
>
> On Sun, Jul 24, 2016 8:27 PM, Lisa Phifer lisa at corecom.com 
> <mailto:lisa at corecom.com> wrote:
>
>     Hi Andrew,
>
>     My answer was not intended to limit how use cases are used by the
>     WG throughout this PDP. It was just to clarify the focus of the
>     current action item seeking example use cases for discussion over
>     the next couple of WG calls.
>
>     While we are still prepping for deliberations, my understanding
>     was that we are starting with use cases to develop a shared
>     understanding of today's real-world scenarios.
>
>     It's very useful to flag problems that may need to be solved,
>     possible improvements, etc, within use cases. However,
>     /deliberating on/ any new possible requirements suggested within
>     an example use case should occur once we enter deliberation.
>
>     Best, Lisa
>
>
>     At 01:09 PM 7/24/2016, Andrew Sullivan wrote:
>
>         Why? If that's the rule, then there's no point: we're doomed
>         forever to the stupidity of Whois.
>
>         A
>
>         -- 
>         Andrew Sullivan
>         Please excuse my clumbsy thums.
>
>         On Jul 24, 2016, at 14:55, Lisa Phifer <lisa at corecom.com
>         <mailto:lisa at corecom.com>> wrote:
>
>
>             Good question - use cases should describe today's
>             real-world scenarios.
>
>
>             At 11:57 AM 7/24/2016, Stephanie Perrin wrote:
>
>
>                 Just as a question, when we do use cases are we
>                 supposed to put in hypotheticals or talk about them as
>                 they are now?  Eg tiered access does not exist at
>                 the moment, do we imagine our use cases as we would
>                 like to see them?  Sorry not to have been paying
>                 close enough attention to this.
>
>                 Stephanie Perrin
>
>                 On 2016-07-24 12:48, Michele Neylon - Blacknight wrote:
>
>                     Karnika
>                     Â
>                     Thanks for the example.
>                     Â
>                     In order to make it easier to process use cases
>                     I̢۪d rd recommend you break them out as
>                     specifically as possible.
>                     Â
>                     So defamation would be quite different to identity
>                     theft.
>                     Â
>                     Regards
>                     Â
>                     Michele
>                     Â
>                     --
>                     Mr Michele Neylon
>                     Blacknight Solutions
>                     Hosting, Colocation & Domains
>                     http://www.blacknight.host/
>                     http://blog.blacknight.com/
>                     http://ceo.hosting/
>                     Intl. +353 (0) 59Â 9183072
>                     Direct Dial: +353 (0)59 9183090
>                     -------------------------------
>                     Blacknight Internet Solutions Ltd, Unit
>                     12A,Barrowside Business Park,Sleaty
>                     Road,Graiguecullen,Carlow,R93 X265,
>                     Ireland Company No.: 370845
>                     Â
>                     *From: *<gnso-rds-pdp-wg-bounces at icann.org>
>                     <mailto:gnso-rds-pdp-wg-bounces at icann.org> on
>                     behalf of karnika <karnika at sethassociates.com>
>                     <mailto:karnika at sethassociates.com>
>                     *Date: *Saturday 23 July 2016 at 01:51
>                     *To: *“gnso-rds-pdp-wg at icann.org>                     <mailto:gnso-rds-pdp-wg at icann.org>
>                     <gnso-rds-pdp-wg at icann.org>
>                     <mailto:gnso-rds-pdp-wg at icann.org>
>                     *Subject: *[gnso-rds-pdp-wg] Example Use case
>                     Â
>
>                     Dear All,
>
>                     Â
>
>                     I have prepared an Example Use case which is
>                     attached herewith. Please feel free to comment and
>                     give your inputs so that we can discuss it in our
>                     future meetings.
>
>                     Â
>
>                     With Regards,
>
>                     Â
>
>                     Karnika Seth
>
>                     Attorney at law. & Founding Partner
>
>                     Â
>
>                     Â
>
>                     SETH ASSOCIATES
>
>                     ADVOCATESÂ  AND LEGAL CONSULTANTS
>
>                     Â
>
>                     ,
>
>                     <398b2597.jpg>
>
>                     Â
>
>                     (O): B- 10, Sector 40, Noida-201301, N.C.R, India.
>                     Â (Mon-Sat, 9.30 am-6 pm)
>
>                     Tel: + 91(120) 4352846,4331304 ,
>
>                     Mob: + 91 9810155766
>
>                     Fax: + 91 (120) 4331304.
>
>                     Website: www.sethassociates.com
>                     <http://www.sethassociates.com> ,
>                     www.lexcyberia.com <http://www.lexcyberia.com>
>
>                     E-mail: mail at sethassociates.com
>                     <mailto:mail at sethassociates.com>,
>                     mail at lexcyberia.com <mailto:mail at lexcyberia.com>
>
>                     Â
>
>                     Computers, Internet & New Technology Laws by
>                     Karnika Seth, Lexis Nexis Butterworths,2013
>                     <http://www.lexisnexis.in/computers-internet-and-new-technology-laws-2013.htm>Â
>
>
>                     <398b2597.gif>
>                     <http://in.linkedin.com/pub/karnika-seth/3/87/110>Â
>                     LinkedIn
>                     <http://www.linkedin.com/pub/karnika-seth/3/87/110>
>                     Â <398b25a7.gif>
>                     <https://www.facebook.com/karnika.seth.1>Â
>                     Facebook <https://www.facebook.com/karnika.seth.1>
>                     <398b25b6.gif> <https://twitter.com/karnikaseth>Â
>                     Twitter <https://twitter.com/karnikaseth>
>
>                     Â
>
>                     Â
>
>                     Â
>
>                     Â
>
>
>
>
>                     _______________________________________________
>
>                     gnso-rds-pdp-wg mailing list
>
>                     gnso-rds-pdp-wg at icann.org
>                     <mailto:gnso-rds-pdp-wg at icann.org>
>
>                     <https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg>
>
>                     https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg
>
>
>
>
>                 _______________________________________________
>                 gnso-rds-pdp-wg mailing list
>                 gnso-rds-pdp-wg at icann.org
>                 <mailto:gnso-rds-pdp-wg at icann.org>
>                 https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg
>
>             _______________________________________________
>             gnso-rds-pdp-wg mailing list
>             gnso-rds-pdp-wg at icann.org <mailto:gnso-rds-pdp-wg at icann.org>
>             https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg
>
> Ayden Férdeline
>
> Statement of Interest 
> <https://community.icann.org/display/gnsosoi/Ayden+F%E9rdeline+SOI>
>
>
>
> _______________________________________________
> gnso-rds-pdp-wg mailing list
> gnso-rds-pdp-wg at icann.org
> https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20160725/e33679cf/attachment.html>


More information about the gnso-rds-pdp-wg mailing list