Guidelines for Human Rights Protocol Considerations
draft-irtf-hrpc-guidelines-01
Human Rights Protocol Considerations Research GroupN. ten Oever (editor)
Internet-Draft University of Amsterdam
Intended status: Informational September 07, 2018
Expires: March 11, 2019
Guidelines for Human Rights Protocol Considerations
draft-irtf-hrpc-guidelines-01
Abstract
This document sets guidelines for human rights considerations in
networking protocols, similar to the work done on the guidelines for
privacy considerations [RFC6973]. This is an updated version of the
guidelines for human rights considerations in [RFC8280].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on March 11, 2019.
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
ten Oever (editor) Expires March 11, 2019 [Page 1]
Internet-Draft hrpcr September 2018
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Vocabulary used . . . . . . . . . . . . . . . . . . . . . . . 3
3. Model for developing human rights protocol considerations . . 3
3.1. Human rights threats . . . . . . . . . . . . . . . . . . 3
3.2. Conducting human rights reviews . . . . . . . . . . . . . 4
3.2.1. Analyzing drafts based on guidelines for human rights
considerations model . . . . . . . . . . . . . . . . 5
3.2.2. Analyzing drafts based on their perceived or
speculated impact . . . . . . . . . . . . . . . . . . 5
3.2.3. Expert interviews . . . . . . . . . . . . . . . . . . 5
3.2.4. Interviews with impacted persons and communities . . 5
3.2.5. Tracing impacts of implementations . . . . . . . . . 6
3.3. Guidelines for human rights considerations . . . . . . . 6
3.3.1. Connectivity . . . . . . . . . . . . . . . . . . . . 7
3.3.2. Privacy . . . . . . . . . . . . . . . . . . . . . . . 7
3.3.3. Content agnosticism . . . . . . . . . . . . . . . . . 8
3.3.4. Security . . . . . . . . . . . . . . . . . . . . . . 8
3.3.5. Internationalization . . . . . . . . . . . . . . . . 9
3.3.6. Censorship resistance . . . . . . . . . . . . . . . . 10
3.3.7. Open Standards . . . . . . . . . . . . . . . . . . . 11
3.3.8. Heterogeneity Support . . . . . . . . . . . . . . . . 12
3.3.9. Pseudonymity . . . . . . . . . . . . . . . . . . . . 13
3.3.10. Accessibility . . . . . . . . . . . . . . . . . . . . 14
3.3.11. Localization . . . . . . . . . . . . . . . . . . . . 15
3.3.12. Decentralization . . . . . . . . . . . . . . . . . . 15
3.3.13. Reliability . . . . . . . . . . . . . . . . . . . . . 16
3.3.14. Confidentiality . . . . . . . . . . . . . . . . . . . 17
3.3.15. Integrity . . . . . . . . . . . . . . . . . . . . . . 18
3.3.16. Authenticity . . . . . . . . . . . . . . . . . . . . 19
3.3.17. Adaptability . . . . . . . . . . . . . . . . . . . . 20
3.3.18. Outcome Transparency . . . . . . . . . . . . . . . . 20
3.3.19. Anonymity . . . . . . . . . . . . . . . . . . . . . . 21
4. Document Status . . . . . . . . . . . . . . . . . . . . . . . 22
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 22
6. Security Considerations . . . . . . . . . . . . . . . . . . . 22
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 22
8. Research Group Information . . . . . . . . . . . . . . . . . 22
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 23
9.1. Informative References . . . . . . . . . . . . . . . . . 23
Show full document text