<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dsmullen-ppd-architecture-08" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PPDArch">Privacy Preference Declaration for Home Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-architecture-08"/>
    <author fullname="Daniel Smullen">
      <organization>CableLabs</organization>
      <address>
        <email>d.smullen@cablelabs.com</email>
      </address>
    </author>
    <author fullname="Brian Scriber">
      <organization>CableLabs</organization>
      <address>
        <email>brian.scriber@computer.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="20"/>
    <keyword>privacy preferences</keyword>
    <keyword>home networks</keyword>
    <keyword>internet of things</keyword>
    <keyword>device transparency</keyword>
    <abstract>
      <?line 37?>

<t>This document describes an architecture for signaling household privacy preferences to devices in home networks through Privacy Preference Declarations (PPDs).  The architecture enables a PPD participant to discover a PPD service endpoint, establish trust in that endpoint through the applicable protocol and security profile, retrieve the applicable household policy instance, and acknowledge receipt of that policy instance.  The acknowledgment establishes that a specific policy instance was made available to the participant; it does not, by itself, assert anything about the participant's subsequent behavior.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drspangle.github.io/draft-dsmullen-ppd-architecture/draft-dsmullen-ppd-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dsmullen-ppd-architecture/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/drspangle/draft-dsmullen-ppd-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The rapid growth of Internet-connected devices in the home has introduced new and often overwhelming challenges to personal privacy.
While many of these devices collect sensitive data by design, the tools offered to users to understand or control that collection are fragmented, confusing, or entirely absent.
When privacy settings do exist, they are often buried in obscure menus, expressed in legal or technical jargon, and lack the contextual clarity needed to support meaningful decision-making.</t>
      <t>The result is a fragmented operational model.
Users must manage privacy through device-specific controls that vary widely in quality and semantics, while device vendors and service providers often implement isolated mechanisms with no common way to convey household privacy preferences across devices.
This lack of a shared signaling model makes it difficult for households to understand which devices have been presented with which privacy expectations, and it makes interoperable deployment harder for implementers.</t>
      <t><xref target="RFC7258"/> frames mass data collection as a technical threat, urging protocol designers to limit exposure through encryption and data minimization.
While this principle is crucial in adversarial, internet-scale contexts, the model proposed in this document takes a different approach: rather than hiding data flows, it seeks to govern them.
Privacy here is not achieved by making devices blind, but by making user-defined preferences visible to devices and associated services.</t>
      <t>This use of privacy is related to, but distinct from, the privacy guidance in <xref target="RFC6973"/>, which emphasizes reduced observability, linkability, and identifiability in protocol design.
Those properties remain important, but PPD focuses on a different home-network problem: a user needs a consistent way to express household privacy preferences and to know that those preferences were made available to participating devices or associated services.
This document is also aligned with the user-agency goals described in <xref target="RFC8280"/>, but it is narrower and more operational.
It describes an architecture for privacy-preference signaling and recordkeeping, not a general framework for human-rights analysis or for constraining device behavior.
Home networks are a significant and operationally important IoT environment.
They commonly place a local administrative boundary around large numbers of devices, many with limited or no end-user interface, making them a concrete target for a privacy-preference signaling architecture.
In this architecture, discovery identifies candidate participant-facing service endpoints.
Trust in a selected endpoint, and in the policy instances it presents, is established separately through the applicable protocol and security mechanisms rather than by discovery alone.
This also addresses an asymmetry common in current deployments: the household user is often required to acknowledge device- or vendor-defined terms, while the household has no comparable way to record that a participating device or associated service was presented with the household's privacy policy.
PPD introduces a reciprocal signaling path in which presentation and acknowledgment of a household policy instance can be recorded by the household domain.
The objective is to provide a coherent architectural basis for devices and associated services to retrieve, acknowledge, and keep current with household privacy preferences within that administrative domain.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The terms below define both protocol roles and core concepts used by this architecture.
The definitions of privacy, transparency, and user control are included here because they describe the conceptual scope of PPD rather than separate protocol mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl>
          <dt>Privacy:</dt>
          <dd>
            <t>In this document, the ability of users to understand and shape how data about them, their household, or their home environment is collected, used, retained, and shared by devices and associated services.</t>
          </dd>
          <dt>Transparency:</dt>
          <dd>
            <t>The property that data practices are made visible and understandable to the user, including what data is collected, how it is processed, where it is shared, and what policy preferences apply.</t>
          </dd>
          <dt>User control:</dt>
          <dd>
            <t>The ability of a user or household to define privacy preferences and make those preferences visible to devices or associated services in a consistent and actionable way.</t>
          </dd>
          <dt>Privacy Preference Declaration (PPD):</dt>
          <dd>
            <t>A structured expression of household privacy preferences that can be discovered, retrieved, and acknowledged by PPD participants.</t>
          </dd>
          <dt>PPD service endpoint:</dt>
          <dd>
            <t>A participant-facing service, and the baseline discovery target for participants, through which a PPD participant discovers, retrieves, and acknowledges applicable policy instances.</t>
          </dd>
          <dt>Policy authority:</dt>
          <dd>
            <t>The authoritative source of household policy state and of any inputs used to derive an effective policy for a participant.  The policy authority may be local or remote.  Participants are not required to discover or address the policy authority directly in the baseline architecture.</t>
          </dd>
          <dt>Household policy:</dt>
          <dd>
            <t>A policy selected or maintained for a home network that represents the household's privacy preferences.</t>
          </dd>
          <dt>Effective policy derivation:</dt>
          <dd>
            <t>The logical function, performed by or on behalf of the policy authority, that determines the effective policy instance for a participant.</t>
          </dd>
          <dt>Effective policy:</dt>
          <dd>
            <t>The policy instance that applies to a particular PPD participant at a particular time, after effective policy derivation has resolved household policy state and any applicable participant-specific inputs.</t>
          </dd>
          <dt>PPD participant:</dt>
          <dd>
            <t>A device, or a trusted intermediary such as a backend service acting on behalf of a device, that participates in PPD by retrieving and acknowledging an applicable policy instance.</t>
          </dd>
          <dt>Policy instance:</dt>
          <dd>
            <t>A specific version or representation of an effective policy that can be identified for acknowledgment and recordkeeping.</t>
          </dd>
          <dt>Association:</dt>
          <dd>
            <t>The state established when a PPD participant has retrieved the current applicable effective policy and acknowledged receipt of that specific policy instance.</t>
          </dd>
          <dt>Current association:</dt>
          <dd>
            <t>Association state that still corresponds to the latest applicable effective policy for the participant and remains fresh according to the renewal model enforced by the PPD service endpoint.</t>
          </dd>
          <dt>Association freshness:</dt>
          <dd>
            <t>The property that an association remains within the bounded interval, or before the renewal deadline, accepted by the PPD service endpoint for treating that association as current.</t>
          </dd>
          <dt>Stale association:</dt>
          <dd>
            <t>Association state that still refers to the latest applicable effective policy instance, but whose freshness can no longer be confirmed because renewal did not occur within the bounded interval accepted by the PPD service endpoint.</t>
          </dd>
          <dt>Needs reassociation:</dt>
          <dd>
            <t>A state in which current association cannot be confirmed because the applicable effective policy changed, participant state relevant to effective policy derivation changed, or enough state was lost that the existing association no longer applies reliably.</t>
          </dd>
          <dt>Reassociation:</dt>
          <dd>
            <t>The process by which a PPD participant recovers from stale association or a needs-reassociation state and re-establishes current association.</t>
          </dd>
          <dt>Broken association:</dt>
          <dd>
            <t>A state in which stored or reported information is contradictory or incomplete enough that current association cannot be determined reliably.</t>
          </dd>
          <dt>Policy acknowledgment:</dt>
          <dd>
            <t>A signal that a PPD participant has received a specific effective policy instance.  A policy acknowledgment is not a statement that the device is compatible with every policy term or that the device will behave in a particular way.</t>
          </dd>
          <dt>Network-observed device:</dt>
          <dd>
            <t>A device that is visible to the local network through ordinary network observation but that has not established association through PPD.</t>
          </dd>
          <dt>Unmanaged device:</dt>
          <dd>
            <t>A network-observed device that is not known to participate in PPD or is not currently manageable through PPD association.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="limitations-of-existing-mechanisms">
      <name>Limitations of Existing Mechanisms</name>
      <t>Current mechanisms for managing data privacy within the home environment exhibit limitations.</t>
      <section anchor="device-specific-configurations">
        <name>Device-specific Configurations</name>
        <t>Individual devices often employ unique privacy settings, thereby complicating user management of privacy across the entire network.
This complexity can inadvertently lead to unintended data sharing.</t>
      </section>
      <section anchor="ineffective-and-unusable-user-interfaces">
        <name>Ineffective and Unusable User Interfaces</name>
        <t>Navigating and configuring privacy settings on individual devices can be a time-consuming and frustrating experience for users.
These ineffective interfaces often lead users to habitually agree to relax their privacy preferences without fully understanding the implications of their decisions.
This fosters a general resignation towards privacy management, making it difficult for users to exert meaningful control over their personal data and ultimately compromising their privacy expectations.</t>
      </section>
      <section anchor="relationship-to-existing-work">
        <name>Relationship to Existing Work</name>
        <section anchor="dnt-and-p3p">
          <name>DNT and P3P</name>
          <t>Protocols like Do Not Track (DNT) and Platform for Privacy Preferences Project (P3P) have not achieved widespread adoption and have proven inadequate for addressing nuanced privacy needs.
These protocols do not provide the participant-specific policy signaling, lifecycle handling, or home-network operational posture needed here.
They also do not provide a practical basis for recording that a participating device or associated service was presented with a household policy instance.</t>
        </section>
        <section anchor="mud">
          <name>MUD</name>
          <t>Manufacturer Usage Description (MUD) <xref target="RFC8520"/> is the closest existing precedent for device-to-home-network signaling.
MUD is focused on manufacturer-defined network communication intent presented to local network infrastructure.
PPD addresses a different problem: household-defined privacy preference signaling, participant-specific effective policy presentation, and recordkeeping about whether a participant was presented with a current household policy instance.
The two approaches may complement each other in a deployment, but MUD does not provide the privacy-policy lifecycle or recordkeeping model described here.</t>
        </section>
        <section anchor="privacy-vocabularies-and-policy-models">
          <name>Privacy Vocabularies and Policy Models</name>
          <t>Vocabulary and policy-expression efforts such as the Data Privacy Vocabulary (DPV) and ODRL are closer to the content layer than to the signaling layer.
PPD does not attempt to replace such work with a new general-purpose ontology or rights language.
Instead, PPD separates concerns: this architecture defines roles and
lifecycle, the companion taxonomy work defines the core fields and shared
computable floor that can map to richer vocabularies, and the companion
protocol work defines the participant-facing signaling path by which an
effective household policy is presented and acknowledged.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-scenarios">
      <name>Operational Scenarios</name>
      <t>This section describes representative operational cases for the architecture in home-network environments.
The scenarios focus on discovery, association, reassociation, and mixed-participant visibility rather than on user-interface details.</t>
      <section anchor="initial-discovery-and-association">
        <name>Initial Discovery and Association</name>
        <t>A PPD participant joins the home network and obtains one or more candidate PPD service endpoints through configuration or local network discovery.
In a common home deployment model, the PPD service endpoint is hosted by a residential gateway or equivalent home-network service.
Discovery identifies reachability, not authority.
The participant establishes a secure connection to a selected endpoint, confirms that endpoint through the applicable trust mechanism, retrieves the applicable effective policy instance, and acknowledges receipt of that policy instance.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
At the end of this process, the participant has established association if the current applicable effective policy has been delivered and acknowledged.
The PPD service endpoint also determines the initial freshness state of that association.</t>
      </section>
      <section anchor="policy-update-and-reassociation">
        <name>Policy Update and Reassociation</name>
        <t>The household policy, or the participant's effective policy, changes.
The PPD service endpoint immediately invalidates current association for the participant.
The participant enters a needs-reassociation state until it retrieves and acknowledges the updated effective policy instance.
This scenario illustrates that association state is tied to a specific policy instance and not to prior acknowledgments alone.
Reassociation re-establishes current association by confirming that the participant has seen the latest applicable policy instance.</t>
      </section>
      <section anchor="association-freshness-expiry-and-renewal">
        <name>Association Freshness Expiry and Renewal</name>
        <t>The applicable effective policy instance is unchanged, but the participant does
not renew within the bounded interval accepted by the PPD service endpoint.
The association becomes stale even though no policy change occurred.
The participant no longer has current association until it completes the
required renewal procedure.
This scenario distinguishes stale association from a needs-reassociation state
caused by a changed policy instance.</t>
      </section>
      <section anchor="participant-state-change">
        <name>Participant State Change</name>
        <t>A participant changes in a way that can affect the applicable effective policy instance, such as a declaration update, capability change, or other state change relevant to effective policy derivation.
The PPD service endpoint determines that current association can no longer be confirmed using existing state alone.
The participant then retrieves and acknowledges the newly applicable effective policy instance.
This scenario keeps the architecture focused on policy signaling and recordkeeping without assuming that every state change requires the same local handling or transport behavior.</t>
      </section>
      <section anchor="mixed-participant-network-visibility">
        <name>Mixed-Participant Network Visibility</name>
        <t>A home network contains both PPD participants and devices that do not participate in PPD.
The household can still use local management functions to distinguish associated participants, participants whose current association cannot be confirmed, and network-observed or unmanaged devices.
This scenario illustrates that non-participating devices are an expected operational reality.
Their presence can inform transparency and local management decisions, but it does not create association or change the baseline signaling role of PPD.</t>
      </section>
    </section>
    <section anchor="goals">
      <name>Goals</name>
      <section anchor="enhance-user-control">
        <name>Enhance User Control</name>
        <ul spacing="normal">
          <li>
            <t>Support a household's ability to define privacy preferences that can be made available consistently across participating devices and associated services.</t>
          </li>
          <li>
            <t>Provide an architectural basis for recording whether the current applicable policy was made available to a participant.</t>
          </li>
          <li>
            <t>Create a reciprocal acknowledgment model in which the household can retain a record that a participant or associated service was presented with, and acknowledged, a specific household policy instance.</t>
          </li>
        </ul>
      </section>
      <section anchor="promote-interoperability">
        <name>Promote Interoperability</name>
        <ul spacing="normal">
          <li>
            <t>Establish a standardized mechanism for devices from diverse manufacturers to discover PPD service endpoints, retrieve applicable privacy policies, and acknowledge policy instances.</t>
          </li>
          <li>
            <t>Support consistent association and reassociation behavior across heterogeneous participants.</t>
          </li>
        </ul>
      </section>
      <section anchor="enable-flexibility">
        <name>Enable Flexibility</name>
        <ul spacing="normal">
          <li>
            <t>Allow deployments to place policy storage and effective-policy derivation locally or remotely without changing the baseline participant-facing contract.</t>
          </li>
          <li>
            <t>Leave room for deployment-specific protocol profiles where constrained environments or different operational models require them, including trusted-intermediary participation for devices that cannot satisfy the minimum authenticated direct-participant bar.</t>
          </li>
        </ul>
      </section>
      <section anchor="facilitate-transparency">
        <name>Facilitate Transparency</name>
        <ul spacing="normal">
          <li>
            <t>Provide a basis for local management functions to distinguish currently associated participants, stale or reassociation-needed participants, and non-participating devices.</t>
          </li>
          <li>
            <t>Improve visibility into which participants have been presented with the current applicable policy instance, without implying enforcement of device behavior.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This document defines a high-level architectural framework for Privacy Preference Declaration (PPD) in home-network environments.
It focuses on roles, trust boundaries, lifecycle meaning, and operational assumptions for making household privacy preferences available to devices and associated services.</t>
      <t>This document does not delve into specific implementation details, such as message formats, data structures, security algorithms, or user interface design.
Furthermore, this document does not define mechanisms that modify device behavior, legal and regulatory considerations, or specific security protocols.
Where this document discusses recordkeeping, that recordkeeping is limited to signaling and recording that an applicable household policy was made available to and acknowledged by a PPD participant.
That recordkeeping can provide a basis for later accountability, audit, or dispute analysis, but this document does not define enforcement behavior or prove subsequent compliance.</t>
      <t>Specific implementation details and message formats are expected to be addressed in companion specifications.
This document aims to be complementary to existing and future standards related to home networking, IoT security, and data privacy.</t>
      <t>This document provides the foundation for subsequent work, including:</t>
      <ul spacing="normal">
        <li>
          <t>Privacy Preference Declaration Taxonomy:
<xref target="I-D.draft-dsmullen-ppd-taxonomy"/> defines the core vocabulary, extension
model, and mapping expectations for the privacy-related terms used by PPD
statements and rules, including the shared semantic floor that keeps those
terms computable across heterogeneous devices and vendors. That core is
intentionally small; richer vocabularies can still be used so long as they
remain reducible to the shared baseline primitives.</t>
        </li>
        <li>
          <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines the message formats, data structures, and communication procedures for PPD, including mechanisms for PPD service endpoint discovery, metadata confirmation, participant registration, optional participant declaration, policy retrieval, policy acknowledgment, renewal, and reassociation.</t>
        </li>
      </ul>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>This document makes the following assumptions:</t>
        <ul spacing="normal">
          <li>
            <t>User Control: It is assumed that users have a reasonable level of control over their home network infrastructure.
This includes the ability to configure routers, install software updates, and manage device access to the network.
This control is essential for users to effectively manage their privacy preferences and make them available to devices within their home network.</t>
          </li>
          <li>
            <t>Resource Constraints: It is assumed that the home network environment and devices operating therein have resource limitations, such as limited processing power and bandwidth.
We limit this assumption by considering that the PPD protocol and its associated mechanisms should be designed with these constraints in mind, minimizing overhead and ensuring efficient operation even on resource-constrained devices. Where a device cannot satisfy the minimum authenticated direct-participant bar, this architecture expects indirect participation through a trusted intermediary rather than weakening the meaning of direct protocol participation.</t>
          </li>
          <li>
            <t>Security Considerations: It is assumed that home networks in scope of this document are susceptible to typical security threats, including insider threats (or non-malicious misconfiguration) and vulnerability to local attacks.
We limit this assumption by considering specific security threats to protect user privacy and the integrity of the privacy policy.
This includes considerations for secure policy dissemination, device authentication, and protection against unauthorized access and modification of privacy preferences.</t>
          </li>
          <li>
            <t>Single User Policy: This document assumes that each device implementing the protocol is governed by a single, unified privacy policy defined by its primary user.
While other individuals within the same physical environment (e.g., household) may have different privacy preferences, the protocol is designed with the expectation that a device or associated service can receive the policy established by its primary user.
Future extensions could explore mechanisms for managing and reconciling multiple user-defined policies on a single device, particularly in shared or multi-user environments.</t>
          </li>
          <li>
            <t>Endpoint Discovery and Trust: It is assumed that configuration or local network mechanisms can identify one or more candidate PPD service endpoints for a participant.
Discovery alone does not establish that an endpoint is authoritative for household policy.
The applicable protocol profile needs a separate way to authenticate the selected endpoint and confirm that policy presented through that endpoint is authoritative for the participant's household context.</t>
          </li>
          <li>
            <t>Policy Signaling: It is assumed that PPD participants can retrieve the applicable household privacy policy through a PPD service endpoint and acknowledge receipt of that policy instance.
This acknowledgment forms the basis of association.
It is a receipt signal only; it does not assert that the participant is compatible with every policy term or that it will behave in a particular way.
Current association also depends on association freshness as determined by the PPD service endpoint.</t>
          </li>
          <li>
            <t>Association Freshness: It is assumed that current association expires unless the participant renews within a bounded interval accepted by the PPD service endpoint.
Participant-initiated exchanges provide the renewal or recovery path, but the PPD service endpoint remains the source of truth for whether association is current, stale, or in a needs-reassociation state.</t>
          </li>
          <li>
            <t>Local Recordkeeping: At a minimum, the architecture enables the household to know which PPD participants have acknowledged the current applicable policy.
Deployment-specific responses to participants that do not acknowledge policy, or to devices that do not participate in PPD, are local management decisions and are outside the baseline signaling function defined here.</t>
          </li>
        </ul>
      </section>
      <section anchor="association-state-and-freshness">
        <name>Association State and Freshness</name>
        <t>This architecture treats the PPD service endpoint as the source of truth for
participant association state.
A participant establishes association when it retrieves and acknowledges a
specific applicable effective policy instance.</t>
        <t>Current association exists only when both of the following are true:</t>
        <ul spacing="normal">
          <li>
            <t>the acknowledged policy instance still corresponds to the latest applicable
effective policy for that participant; and</t>
          </li>
          <li>
            <t>the association remains fresh according to the renewal model enforced by the
PPD service endpoint.</t>
          </li>
        </ul>
        <t>If the applicable effective policy instance is unchanged but the freshness
interval expires before renewal, the participant enters stale association.
If the applicable effective policy changes, if participant state relevant to
effective policy derivation changes, or if enough state is lost that the prior
association can no longer be trusted, the participant enters a
needs-reassociation state.
In either case, the participant no longer has current association.</t>
        <t>Participant-initiated exchanges provide the renewal or recovery path, but they
are not the source of truth for whether association is current.
The PPD service endpoint determines whether a participant is current, stale, or
in needs reassociation.</t>
      </section>
      <section anchor="discovery-and-policy-authority-boundary">
        <name>Discovery and Policy-Authority Boundary</name>
        <t>This architecture separates discovery of a participant-facing service endpoint
from trust establishment.
A participant may learn one or more candidate PPD service endpoints through
configuration or local network mechanisms, but discovery alone does not make
any candidate authoritative.
Before treating a policy instance as authoritative, the participant needs the
applicable protocol profile to authenticate the selected endpoint and confirm
that it is authorized to present policy for the household context.</t>
        <t>The participant-facing contract is the PPD service endpoint, not direct access
to the policy authority.
A deployment may place storage, policy combination, and effective policy
derivation behind that service.
When the PPD service endpoint and policy authority are distinct, the deployment
needs to preserve at least:</t>
        <ul spacing="normal">
          <li>
            <t>authenticity of the effective policy instance presented to the participant;</t>
          </li>
          <li>
            <t>integrity of policy-instance identifiers and association-freshness metadata;</t>
          </li>
          <li>
            <t>an unambiguous binding between the selected PPD service endpoint and the
policy authority on whose behalf it presents policy.</t>
          </li>
        </ul>
        <t>These are architectural invariants.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines the participant-facing transport, metadata confirmation, and security-profile expectations,
while deployment profiles still choose concrete mechanism details.</t>
      </section>
      <section anchor="key-components">
        <name>Key Components</name>
        <t>User Interface: A user-friendly interface (e.g., mobile app, web portal) for creating and managing privacy preferences.</t>
        <t>PPD Service Endpoint: A participant-facing service through which PPD participants discover, retrieve, and acknowledge applicable policy instances.
In a common home deployment model, this service is hosted by a residential gateway or equivalent home-network service.
A participant may learn candidate PPD service endpoints through configuration or local network discovery, but it treats a selected endpoint as authoritative only after the applicable trust mechanism succeeds.</t>
        <t>Policy Authority: The authoritative source of household policy state and any inputs used for effective policy derivation.
The policy authority may be local or remote.
A PPD service endpoint can obtain policy from a policy authority without exposing internal storage or computation topology to participants.
Participants are not required to discover or communicate with the policy authority directly in the baseline architecture.</t>
        <t>Effective Policy Derivation: The logical function, performed by or on behalf of the policy authority, that determines the applicable policy instance for a participant.</t>
        <t>Participant Declarations and Consent Requests: Optional participant inputs that can disclose data-handling declarations or request consent for uses not covered by baseline policy.
These inputs are distinct from the minimal path of policy retrieval and policy acknowledgment.
Where a deployment exposes a coarse comparison result for participant declarations at the protocol boundary, that result belongs on the declaration path rather than in the effective policy or policy acknowledgment objects. That comparison surface is diagnostic only; it is not a baseline negotiation channel, policy-relaxation mechanism, or homeowner-prompt path.</t>
        <t>Recordkeeping and Management Mechanisms: Deployment-specific mechanisms for presenting association state, participant status, effective policy views, and network-observed devices to the household.
Such mechanisms are not device-behavior requirements in the baseline PPD architecture.</t>
      </section>
      <section anchor="data-flows">
        <name>Data Flows</name>
        <t>This section outlines the high-level data interactions between users, PPD participants, the PPD service endpoint, and the policy authority in the Privacy Preference Declaration (PPD) framework.
It describes how privacy preferences are defined by users, made available to participants, and used as the basis for signaling and recordkeeping in a home network environment.</t>
        <t>The process begins when a user defines a set of privacy preferences that apply to their household.
These preferences may express rules such as which types of data may be collected, under what conditions data may be processed or shared, or which retention practices are acceptable.
The design of the user interface used to author these preferences, including its presentation, usability, or input modalities, is out of scope for this document, and will be addressed separately.
Likewise, the underlying vocabulary and structure of the privacy preferences,
including the core fields used in atomic privacy-relevant dataflows and the
associated qualifier families, are specified in
<xref target="I-D.draft-dsmullen-ppd-taxonomy"/>.</t>
        <t>Once created, the user's preferences are maintained by a policy authority, which may reside locally on a networked controller or be accessible through other trusted infrastructure.
The policy authority may include storage, effective policy derivation, or both.
When a new device joins the home network, it initiates an onboarding process during which it obtains one or more candidate PPD service endpoints through configuration or local network mechanisms.
Discovery identifies reachable candidates, but does not by itself establish that any candidate is authoritative for household policy.
The participant then establishes a secure channel to a selected endpoint and authenticates that endpoint according to the applicable protocol profile before retrieving policy.
Following onboarding, the PPD participant performs association, which involves retrieving the household privacy policy and acknowledging receipt of the applicable policy instance.
In some deployments, the participant is a backend service associated with the device rather than the local device itself.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
The participant-facing contract ends at the PPD service endpoint; any split between that service and the policy authority is internal to the deployment.
Where those components are distinct, the deployment preserves the authenticity and integrity of the effective policy instance, policy-instance identifier, and freshness metadata presented through the service endpoint.
Devices may optionally report their data handling declarations to the PPD service endpoint at this stage.
The PPD service endpoint also determines a freshness interval or renewal deadline for the resulting association state.</t>
        <t>If a device seeks to perform actions not permitted under the baseline policy, for example, collecting or sharing data beyond what the user has authorized, it may initiate a consent request workflow.
However, the design and behavior of this consent mechanism is explicitly out of scope for this document.
Inappropriate or poorly designed consent flows, such as those that involve excessive prompting, ambiguous language, or misleading options, can inadvertently pressure users into accepting data practices that conflict with their preferences.
Even without malicious intent, these experiences may degrade trust and lead to outcomes inconsistent with user expectations.
Future specifications should describe consent interactions that are clear, proportionate, and respectful, helping users make informed decisions without friction or fatigue.</t>
        <t>Current association is not indefinite.
If the participant does not renew before the freshness interval expires, the PPD service endpoint treats the association as stale even if the applicable effective policy instance is unchanged.
Reassociation is required when current association can no longer be confirmed for a participant.
This can occur because the applicable effective policy changed, because participant state relevant to effective policy derivation changed, because the association became stale, or because enough state was lost that the prior association can no longer be trusted.
Reassociation re-establishes current association by retrieving and acknowledging the latest applicable effective policy instance, or by completing a renewal procedure defined by the applicable protocol profile when the policy instance is unchanged.
Devices are not expected to re-collect consent for data uses already covered by existing, valid consent.</t>
        <t>To support straightforward implementation and debugging, the companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines a simple machine-readable representation for privacy policies, declarations, and acknowledgment state.
JSON is a practical baseline encoding for the architecture and for many constrained home-network deployments.
More compact encodings can be considered later if a specific deployment profile demonstrates a need for them.</t>
        <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines how association freshness is conveyed, including whether the protocol uses bounded renewal intervals, explicit renewal deadlines, or equivalent lease-style semantics.
It also distinguishes stale association from needs-reassociation states caused by policy or participant-state changes.</t>
        <t>It is important to note that the baseline requirement under this architecture is limited to discovery, retrieval, acknowledgment, and any renewal needed to maintain current association for the user's privacy policy.
These actions provide a signaling and recordkeeping mechanism for establishing that the current applicable policy was made available to the participant.
However, this document does not define how device behavior is changed by the policy, nor does it specify how to handle cases where a device cannot fully satisfy a given policy.
These aspects, including optional status reporting, detailed conflict-resolution procedures, or auditing, may be addressed in future work.</t>
        <t>Finally, while this document defines the overall data flow and interaction sequence, it does not define message formats, communication protocol details, or consent interface specifications.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, specifies the participant-facing message formats and protocol details.
Consent interface specifications, if any, remain future work.</t>
      </section>
      <section anchor="non-ppd-and-network-observed-devices">
        <name>Non-PPD and Network-Observed Devices</name>
        <t>Home networks commonly include devices that do not implement PPD, cannot be updated to implement PPD, or are visible only through local network observation.
The architecture treats these devices as expected operational cases rather than exceptional failures.</t>
        <t>A local management function can classify such devices as network-observed or unmanaged based on information available within the home network.
That classification can improve household transparency by showing that a device is present even though it has not established association through PPD.
Network observation does not create association, does not imply that the device has received a household policy, and does not imply anything about the device's behavior.</t>
        <t>Any local response to unmanaged devices, such as notification, inventory display, or other network management action, is a deployment decision outside the baseline PPD signaling architecture.</t>
      </section>
    </section>
    <section anchor="policy-language">
      <name>Policy Language</name>
      <t>The specific details of the privacy policy language, including its syntax, structure, and extensibility mechanisms, are out of scope for this document.
The policy vocabulary and taxonomy of privacy concepts and attributes are
defined in <xref target="I-D.draft-dsmullen-ppd-taxonomy"/>, including the compact
identifier model, the shared computable semantic floor, extension namespaces,
and the mapping expectations used by the companion protocol specification.</t>
      <section anchor="language-requirements">
        <name>Language Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Human-readable: Policies should be easily understandable by users.</t>
          </li>
          <li>
            <t>Machine-readable: Policies should be machine-processable for automated interpretation and signaling.</t>
          </li>
          <li>
            <t>Extensible: The language should be flexible enough to accommodate evolving privacy needs and technologies.</t>
          </li>
          <li>
            <t>Internationalization-compatible: Policies and identifiers used within them may need to support multilingual environments and non-ASCII characters.</t>
          </li>
        </ul>
        <t>To ensure consistent interpretation and comparison of string-based policy elements, such as device names, labels, or category identifier string handling practices should align with the guidelines defined in <xref target="RFC7564"/>.
This is particularly important when identifiers or user-facing labels are created, stored, or matched across vendors or systems that operate in different locales or character encodings.</t>
      </section>
      <section anchor="architectural-direction">
        <name>Architectural Direction</name>
        <t>The architecture assumes a policy representation that is both machine-readable
and suitable for user-facing explanation.
The taxonomy document is expected to define the semantic vocabulary, while a
companion protocol document is expected to define any wire-format or
serialization profile needed for exchange.</t>
        <t>Future specifications should also define how string identifiers--such as device
roles, policy tags, or consent status labels--are formatted, compared, and
stored, so implementations avoid ambiguous matching behavior.
In contexts where internationalized strings are involved, alignment with
<xref target="RFC7564"/> should be considered to ensure interoperability and consistency.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>This document defines an architectural framework for enabling users to express privacy preferences and signal those preferences within home network environments.
Several aspects critical to a fully operational implementation are intentionally left out of scope here and are expected to be addressed in future specifications or companion documents.</t>
      <section anchor="policy-taxonomy-and-semantics">
        <name>Policy Taxonomy and Semantics</name>
        <t><xref target="I-D.draft-dsmullen-ppd-taxonomy"/> defines:</t>
        <ul spacing="normal">
          <li>
            <t>A common vocabulary and set of core fields for expressing atomic
privacy-relevant dataflows.</t>
          </li>
          <li>
            <t>Attributes and semantics for data types, purposes, actions, sources,
destinations, and qualifier families used in those dataflows.</t>
          </li>
          <li>
            <t>An extensibility model that allows richer vocabularies while preserving a
shared computable semantic floor.</t>
          </li>
        </ul>
        <t>This taxonomy is foundational for consistent policy interpretation across heterogeneous devices and vendors.</t>
      </section>
      <section anchor="protocol-specification-and-message-formats">
        <name>Protocol Specification and Message Formats</name>
        <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines:</t>
        <ul spacing="normal">
          <li>
            <t>Message formats for participant registration, optional participant declaration, policy retrieval, policy acknowledgment, renewal, and reassociation.</t>
          </li>
          <li>
            <t>Discovery profiles, lightweight metadata confirmation, and trust-establishment bindings for PPD service endpoints.</t>
          </li>
          <li>
            <t>Transport-layer considerations, service authentication, and policy-authority trust expectations.</t>
          </li>
          <li>
            <t>Association freshness semantics, including how renewal intervals or deadlines are conveyed and how stale association is distinguished from needs-reassociation states.</t>
          </li>
          <li>
            <t>Baseline encoding expectations for structured data, with JSON as a practical starting point and more compact encodings reserved for deployment profiles that need them.</t>
          </li>
        </ul>
      </section>
      <section anchor="consent-request-workflow-design-specifications">
        <name>Consent Request Workflow Design Specifications</name>
        <t>The mechanism by which devices request additional user consent for data uses not covered by the baseline policy is out of scope.
However, future specifications should:</t>
        <ul spacing="normal">
          <li>
            <t>Define clear constraints to prevent manipulative or fatiguing consent flows (e.g., dark patterns).</t>
          </li>
          <li>
            <t>Describe consent interactions that are transparent, infrequent, proportionate, and user-respecting.</t>
          </li>
          <li>
            <t>Explore user interface standards or API affordances to preserve meaningful choice.</t>
          </li>
        </ul>
        <t>This is a particularly sensitive area and must balance user experience, privacy expectations, and implementation feasibility.</t>
      </section>
      <section anchor="recordkeeping-and-local-management">
        <name>Recordkeeping and Local Management</name>
        <t>This architecture does not define how devices act on privacy policies or how departures from policy are detected or remediated.
The baseline function is signaling: a participant can receive an applicable household policy and acknowledge that policy instance.
Future work may include:</t>
        <ul spacing="normal">
          <li>
            <t>Optional participant status reporting models and device-side implementation expectations.</t>
          </li>
          <li>
            <t>Recordkeeping mechanisms for correlating policy delivery and acknowledgment records.</t>
          </li>
          <li>
            <t>State models that distinguish current, stale, and needs-reassociation participant status.</t>
          </li>
          <li>
            <t>Deconfliction strategies for devices unable to meet all user-defined constraints.</t>
          </li>
          <li>
            <t>Deployment-local management options, such as notifications or inventory display.</t>
          </li>
        </ul>
      </section>
      <section anchor="user-interface-design-specifications">
        <name>User Interface Design Specifications</name>
        <t>The user-facing interface used to author, modify, and review privacy preferences is out of scope.
Future design guidance may address:</t>
        <ul spacing="normal">
          <li>
            <t>User experience design principles for presenting privacy concepts clearly and accessibly.</t>
          </li>
          <li>
            <t>Models for progressive disclosure of policy impact.</t>
          </li>
          <li>
            <t>Multi-user and household-role-specific control models (e.g., parental vs. administrative roles).</t>
          </li>
        </ul>
      </section>
      <section anchor="interoperability-testing-and-reference-implementations">
        <name>Interoperability Testing and Reference Implementations</name>
        <t>Future work may also include:</t>
        <ul spacing="normal">
          <li>
            <t>Development of reference implementations of the PPD protocol, PPD service endpoint, and policy-authority components.</t>
          </li>
          <li>
            <t>Interoperability testing across devices and vendors.</t>
          </li>
          <li>
            <t>Conformance guidelines and self-certification procedures.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="internationalization-considerations">
      <name>Internationalization Considerations</name>
      <t>In contexts where privacy preferences or taxonomy elements involve user-facing or vendor-defined string identifiers, additional work may be required to:</t>
      <ul spacing="normal">
        <li>
          <t>Define string normalization and comparison rules, particularly for internationalized text.</t>
        </li>
        <li>
          <t>Support identifier consistency across diverse vendors and locales.</t>
        </li>
        <li>
          <t>Consider alignment with <xref target="RFC7564"/> for handling Unicode-aware identifiers in a secure and interoperable way.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For a privacy framework to be effective, it needs to support the expression of user preferences and protect those preferences during transmission, retrieval, and acknowledgment.
This section outlines safeguards for confidentiality, authenticity, integrity, and metadata minimization during PPD operations.</t>
      <section anchor="secure-policy-dissemination">
        <name>Secure Policy Dissemination</name>
        <t>Communication between PPD participants and the PPD service endpoint needs protection against unauthorized access and tampering.
When the PPD service endpoint and policy authority are distinct, deployments also need to preserve policy authenticity and integrity across that boundary.
Discovery mechanisms can identify candidate PPD service endpoints, but discovery alone is not sufficient to establish that an endpoint is authorized to present household policy.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines explicit participant-facing security profiles and the accountability properties they need to provide. Future deployment profiles still need to identify concrete cryptographic mechanisms, such as encryption and mutual authentication, so that legitimate participants can retrieve privacy policies and detect modification.
Those deployment profiles also need to protect the binding between the authenticated participant-facing service endpoint and the policy state it presents.</t>
      </section>
      <section anchor="anonymity-and-metadata-protection">
        <name>Anonymity and Metadata Protection</name>
        <t>Even when privacy policies themselves do not contain sensitive personal information, the act of retrieving or acknowledging a policy can reveal characteristics about the household, such as the types of devices in use, specific user preferences, or behavioral patterns over time.
<xref target="RFC7258"/> cautions against protocol designs that expose unnecessary metadata, treating the accumulation of such information as a legitimate technical threat.
This framework takes that warning seriously: metadata exposure during policy retrieval and device onboarding needs to be minimized to avoid turning privacy infrastructure into a new source of privacy leakage.
Concepts from <xref target="RFC9577"/> may help inform this effort. <xref target="RFC9577"/> introduces techniques for authorization without identification, enabling a client to prove it is authorized without revealing who it is.
While <xref target="RFC9577"/> is optimized for pseudonymous web authentication over the public internet and assumes a centralized token issuer model, its core ideas, particularly around unlinkable token presentation, could be adapted to the PPD protocol to reduce metadata correlation and minimize household identifiability during policy exchanges.
However, this needs careful analysis, as the assumptions of <xref target="RFC9577"/> do not fully align with the goals or context of a local, user-governed home network.</t>
      </section>
      <section anchor="policy-integrity">
        <name>Policy Integrity</name>
        <t>Devices need assurance that the policy retrieved is authentic and unaltered.
Integrity protections, such as digital signatures, are necessary to ensure that users' preferences cannot be tampered with in transit or at rest by other devices, malicious actors, or misconfigurations.
If policy is obtained through a participant-facing service from a distinct policy authority, integrity protections also need to cover the policy-instance identifier and any freshness metadata presented through that service.</t>
      </section>
      <section anchor="device-authentication">
        <name>Device Authentication</name>
        <t>Devices participating in the privacy framework need an authentication model before accessing the PPD service endpoint.
This limits policy dissemination to known, authorized participants and helps users maintain trust in the integrity of their home network's privacy relationships.
If the PPD service endpoint and policy authority are distinct, the deployment also needs a way to preserve the authenticity of policy state presented through the participant-facing service.
By aligning with the concerns raised in <xref target="RFC7258"/> and incorporating ideas from <xref target="RFC9577"/> where appropriate, this framework seeks to protect users not only from overt data collection, but also from silent inference and passive metadata surveillance.
At the same time, it avoids treating anonymity as an end in itself.
The goal is to support privacy with recordkeeping, where user-defined preferences are signaled consistently, devices are identifiable only as much as necessary for the exchange, and the user retains visibility into what occurs within their domain.</t>
      </section>
      <section anchor="policy-acknowledgment-and-recordkeeping">
        <name>Policy Acknowledgment and Recordkeeping</name>
        <t>PPD participants need a way to acknowledge receipt of the applicable privacy policy instance.
This acknowledgment should be recorded and verifiable so that the household can determine which participants have seen the current policy.
The record needs to bind the participant identity, the acknowledged policy instance, and the time or sequence context in which the acknowledgment was made.
For devices that rely on a backend service, the record also needs to distinguish between acknowledgment by the local device and acknowledgment by the backend service acting on behalf of that device.
This record is important because it creates a reciprocal acknowledgment path.
In many current deployments, the household user is asked to acknowledge device or vendor policy terms, but there is no comparably strong household-controlled record that the participant was presented with the household's own privacy policy.
An authenticated and integrity-protected acknowledgment record allows the household to show that presentation and acknowledgment occurred, which can support later accountability or review even when the architecture does not define automated enforcement.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines baseline acknowledgment semantics and the protection properties acknowledgment mechanisms need to provide. Future deployment profiles still need concrete mechanisms that remain practical for constrained home-network devices.
At minimum, the selected mechanism needs to provide:</t>
        <ul spacing="normal">
          <li>
            <t>participant authentication sufficient to bind the acknowledgment to the device or backend service that made it;</t>
          </li>
          <li>
            <t>policy-instance integrity so that the acknowledged policy can be identified unambiguously;</t>
          </li>
          <li>
            <t>freshness or sequencing so that an old acknowledgment cannot be replayed as evidence of current association;</t>
          </li>
          <li>
            <t>verifiability sufficient for the acknowledgment record to function as a protected receipt of policy presentation and acknowledgment; and</t>
          </li>
          <li>
            <t>a way to retain or export the acknowledgment record without exposing more household metadata than necessary.</t>
          </li>
        </ul>
        <t>A policy acknowledgment is not, by itself, an assertion about subsequent device behavior.
Any local response to non-participation or other local observations is outside the baseline signaling mechanism defined by this architecture.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <?line 652?>

<reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC8280">
          <front>
            <title>Research into Human Rights Protocol Considerations</title>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
            <author fullname="C. Cath" initials="C." surname="Cath"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973). The other parts of this document explain the background of the guidelines and how they were developed.</t>
              <t>This document is the first milestone in a longer-term research effort. It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8280"/>
          <seriesInfo name="DOI" value="10.17487/RFC8280"/>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-taxonomy">
          <front>
            <title>Privacy Preference Declaration Taxonomy</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="18" month="May" year="2026"/>
            <abstract>
              <t>   This document defines the core vocabulary and extension model used by
   Privacy Preference Declarations (PPDs) to describe data handling in
   home networks.  It complements [I-D.draft-dsmullen-ppd-architecture]
   and [I-D.draft-dsmullen-ppd-protocol] by standardizing term spaces
   for data types, purposes, actions, sources, destinations, and
   selected constraints.  Stable term identifiers are the primary
   semantic hook.  Baseline participant-facing protocol messages use
   compact identifiers plus taxonomy context rather than requiring full
   ontology exchange on the wire.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-taxonomy-03"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-protocol">
          <front>
            <title>Privacy Preference Declaration Protocol Specification</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="20" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies a participant-facing protocol for Privacy
   Preference Declarations (PPDs) in home networks.  The protocol is
   between a home-side PPD service endpoint and a device-side actor,
   formally the PPD participant, which is a device or a service acting
   on behalf of a device.  It defines baseline operations for endpoint
   metadata confirmation, participant registration, optional participant
   declaration, effective-policy retrieval, policy acknowledgment,
   renewal, and reassociation.  This document complements the PPD
   architecture and taxonomy documents by defining the message and
   sequencing behavior needed for interoperable policy signaling.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-protocol-01"/>
        </reference>
        <reference anchor="RFC7564">
          <front>
            <title>PRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application Protocols</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Application protocols using Unicode characters in protocol strings need to properly handle such strings in order to enforce internationalization rules for strings placed in various protocol slots (such as addresses and identifiers) and to perform valid comparison operations (e.g., for purposes of authentication or authorization). This document defines a framework enabling application protocols to perform the preparation, enforcement, and comparison of internationalized strings ("PRECIS") in a way that depends on the properties of Unicode characters and thus is agile with respect to versions of Unicode. As a result, this framework provides a more sustainable approach to the handling of internationalized strings than the previous framework, known as Stringprep (RFC 3454). This document obsoletes RFC 3454.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7564"/>
          <seriesInfo name="DOI" value="10.17487/RFC7564"/>
        </reference>
        <reference anchor="RFC9577">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document defines an HTTP authentication scheme for Privacy Pass, a privacy-preserving authentication mechanism used for authorization. The authentication scheme specified in this document can be used by Clients to redeem Privacy Pass tokens with an Origin. It can also be used by Origins to challenge Clients to present Privacy Pass tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9577"/>
          <seriesInfo name="DOI" value="10.17487/RFC9577"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
