<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dsmullen-ppd-architecture-07" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PPDArch">Privacy Preference Declaration for Home Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-architecture-07"/>
    <author fullname="Daniel Smullen">
      <organization>CableLabs</organization>
      <address>
        <email>d.smullen@cablelabs.com</email>
      </address>
    </author>
    <author fullname="Brian Scriber">
      <organization>CableLabs</organization>
      <address>
        <email>brian.scriber@computer.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="20"/>
    <keyword>privacy preferences</keyword>
    <keyword>home networks</keyword>
    <keyword>internet of things</keyword>
    <keyword>device transparency</keyword>
    <abstract>
      <?line 37?>

<t>This document describes an architecture for signaling household privacy preferences to devices in home networks through Privacy Preference Declarations (PPDs).  The architecture enables a PPD participant to discover a PPD service endpoint, establish trust in that endpoint through the applicable protocol and security profile, retrieve the applicable household policy instance, and acknowledge receipt of that policy instance.  The acknowledgment establishes that a specific policy instance was made available to the participant; it does not, by itself, assert anything about the participant's subsequent behavior.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drspangle.github.io/draft-dsmullen-ppd-architecture/draft-dsmullen-ppd-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dsmullen-ppd-architecture/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/drspangle/draft-dsmullen-ppd-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The rapid growth of Internet-connected devices in the home has introduced new and often overwhelming challenges to personal privacy.
While many of these devices collect sensitive data by design, the tools offered to users to understand or control that collection are fragmented, confusing, or entirely absent.
When privacy settings do exist, they are often buried in obscure menus, expressed in legal or technical jargon, and lack the contextual clarity needed to support meaningful decision-making.</t>
      <t>The result is a fragmented operational model.
Users must manage privacy through device-specific controls that vary widely in quality and semantics, while device vendors and service providers often implement isolated mechanisms with no common way to convey household privacy preferences across devices.
This lack of a shared signaling model makes it difficult for households to understand which devices have been presented with which privacy expectations, and it makes interoperable deployment harder for implementers.</t>
      <t><xref target="RFC7258"/> frames mass data collection as a technical threat, urging protocol designers to limit exposure through encryption and data minimization.
While this principle is crucial in adversarial, internet-scale contexts, the model proposed in this document takes a different approach: rather than hiding data flows, it seeks to govern them.
Privacy here is not achieved by making devices blind, but by making user-defined preferences visible to devices and associated services.</t>
      <t>This use of privacy is related to, but distinct from, the privacy guidance in <xref target="RFC6973"/>, which emphasizes reduced observability, linkability, and identifiability in protocol design.
Those properties remain important, but PPD focuses on a different home-network problem: a user needs a consistent way to express household privacy preferences and to know that those preferences were made available to participating devices or associated services.
This document is also aligned with the user-agency goals described in <xref target="RFC8280"/>, but it is narrower and more operational.
It describes an architecture for privacy-preference signaling and recordkeeping, not a general framework for human-rights analysis or for constraining device behavior.
Home networks are a significant and operationally important IoT environment.
They commonly place a local administrative boundary around large numbers of devices, many with limited or no end-user interface, making them a concrete target for a privacy-preference signaling architecture.
In this architecture, discovery identifies candidate participant-facing service endpoints.
Trust in a selected endpoint, and in the policy instances it presents, is established separately through the applicable protocol and security mechanisms rather than by discovery alone.
This also addresses an asymmetry common in current deployments: the household user is often required to acknowledge device- or vendor-defined terms, while the household has no comparable way to record that a participating device or associated service was presented with the household's privacy policy.
PPD introduces a reciprocal signaling path in which presentation and acknowledgment of a household policy instance can be recorded by the household domain.
The objective is to provide a coherent architectural basis for devices and associated services to retrieve, acknowledge, and keep current with household privacy preferences within that administrative domain.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The terms below define both protocol roles and core concepts used by this architecture.
The definitions of privacy, transparency, and user control are included here because they describe the conceptual scope of PPD rather than separate protocol mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl>
          <dt>Privacy:</dt>
          <dd>
            <t>In this document, the ability of users to understand and shape how data about them, their household, or their home environment is collected, used, retained, and shared by devices and associated services.</t>
          </dd>
          <dt>Transparency:</dt>
          <dd>
            <t>The property that data practices are made visible and understandable to the user, including what data is collected, how it is processed, where it is shared, and what policy preferences apply.</t>
          </dd>
          <dt>User control:</dt>
          <dd>
            <t>The ability of a user or household to define privacy preferences and make those preferences visible to devices or associated services in a consistent and actionable way.</t>
          </dd>
          <dt>Privacy Preference Declaration (PPD):</dt>
          <dd>
            <t>A structured expression of household privacy preferences that can be discovered, retrieved, and acknowledged by PPD participants.</t>
          </dd>
          <dt>PPD service endpoint:</dt>
          <dd>
            <t>A participant-facing service, and the baseline discovery target for participants, through which a PPD participant discovers, retrieves, and acknowledges applicable policy instances.</t>
          </dd>
          <dt>Policy authority:</dt>
          <dd>
            <t>The authoritative source of household policy state and of any inputs used to derive an effective policy for a participant.  The policy authority may be local or remote.  Participants are not required to discover or address the policy authority directly in the baseline architecture.</t>
          </dd>
          <dt>Household policy:</dt>
          <dd>
            <t>A policy selected or maintained for a home network that represents the household's privacy preferences.</t>
          </dd>
          <dt>Effective policy derivation:</dt>
          <dd>
            <t>The logical function, performed by or on behalf of the policy authority, that determines the effective policy instance for a participant.</t>
          </dd>
          <dt>Effective policy:</dt>
          <dd>
            <t>The policy instance that applies to a particular PPD participant at a particular time, after effective policy derivation has resolved household policy state and any applicable participant-specific inputs.</t>
          </dd>
          <dt>PPD participant:</dt>
          <dd>
            <t>A device, or a trusted intermediary such as a backend service acting on behalf of a device, that participates in PPD by retrieving and acknowledging an applicable policy instance.</t>
          </dd>
          <dt>Policy instance:</dt>
          <dd>
            <t>A specific version or representation of an effective policy that can be identified for acknowledgment and recordkeeping.</t>
          </dd>
          <dt>Association:</dt>
          <dd>
            <t>The state established when a PPD participant has retrieved the current applicable effective policy and acknowledged receipt of that specific policy instance.</t>
          </dd>
          <dt>Current association:</dt>
          <dd>
            <t>Association state that still corresponds to the latest applicable effective policy for the participant and remains fresh according to the renewal model enforced by the PPD service endpoint.</t>
          </dd>
          <dt>Association freshness:</dt>
          <dd>
            <t>The property that an association remains within the bounded interval, or before the renewal deadline, accepted by the PPD service endpoint for treating that association as current.</t>
          </dd>
          <dt>Stale association:</dt>
          <dd>
            <t>Association state that still refers to the latest applicable effective policy instance, but whose freshness can no longer be confirmed because renewal did not occur within the bounded interval accepted by the PPD service endpoint.</t>
          </dd>
          <dt>Needs reassociation:</dt>
          <dd>
            <t>A state in which current association cannot be confirmed because the applicable effective policy changed, participant state relevant to effective policy derivation changed, or enough state was lost that the existing association no longer applies reliably.</t>
          </dd>
          <dt>Reassociation:</dt>
          <dd>
            <t>The process by which a PPD participant recovers from stale association or a needs-reassociation state and re-establishes current association.</t>
          </dd>
          <dt>Broken association:</dt>
          <dd>
            <t>A state in which stored or reported information is contradictory or incomplete enough that current association cannot be determined reliably.</t>
          </dd>
          <dt>Policy acknowledgment:</dt>
          <dd>
            <t>A signal that a PPD participant has received a specific effective policy instance.  A policy acknowledgment is not a statement that the device is compatible with every policy term or that the device will behave in a particular way.</t>
          </dd>
          <dt>Network-observed device:</dt>
          <dd>
            <t>A device that is visible to the local network through ordinary network observation but that has not established association through PPD.</t>
          </dd>
          <dt>Unmanaged device:</dt>
          <dd>
            <t>A network-observed device that is not known to participate in PPD or is not currently manageable through PPD association.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="limitations-of-existing-mechanisms">
      <name>Limitations of Existing Mechanisms</name>
      <t>Current mechanisms for managing data privacy within the home environment exhibit limitations.</t>
      <section anchor="device-specific-configurations">
        <name>Device-specific Configurations</name>
        <t>Individual devices often employ unique privacy settings, thereby complicating user management of privacy across the entire network.
This complexity can inadvertently lead to unintended data sharing.</t>
      </section>
      <section anchor="ineffective-and-unusable-user-interfaces">
        <name>Ineffective and Unusable User Interfaces</name>
        <t>Navigating and configuring privacy settings on individual devices can be a time-consuming and frustrating experience for users.
These ineffective interfaces often lead users to habitually agree to relax their privacy preferences without fully understanding the implications of their decisions.
This fosters a general resignation towards privacy management, making it difficult for users to exert meaningful control over their personal data and ultimately compromising their privacy expectations.</t>
      </section>
      <section anchor="relationship-to-existing-work">
        <name>Relationship to Existing Work</name>
        <section anchor="dnt-and-p3p">
          <name>DNT and P3P</name>
          <t>Protocols like Do Not Track (DNT) and Platform for Privacy Preferences Project (P3P) have not achieved widespread adoption and have proven inadequate for addressing nuanced privacy needs.
These protocols do not provide the participant-specific policy signaling, lifecycle handling, or home-network operational posture needed here.
They also do not provide a practical basis for recording that a participating device or associated service was presented with a household policy instance.</t>
        </section>
        <section anchor="mud">
          <name>MUD</name>
          <t>Manufacturer Usage Description (MUD) <xref target="RFC8520"/> is the closest existing precedent for device-to-home-network signaling.
MUD is focused on manufacturer-defined network communication intent presented to local network infrastructure.
PPD addresses a different problem: household-defined privacy preference signaling, participant-specific effective policy presentation, and recordkeeping about whether a participant was presented with a current household policy instance.
The two approaches may complement each other in a deployment, but MUD does not provide the privacy-policy lifecycle or recordkeeping model described here.</t>
        </section>
        <section anchor="privacy-vocabularies-and-policy-models">
          <name>Privacy Vocabularies and Policy Models</name>
          <t>Vocabulary and policy-expression efforts such as the Data Privacy Vocabulary (DPV) and ODRL are closer to the content layer than to the signaling layer.
PPD does not attempt to replace such work with a new general-purpose ontology or rights language.
Instead, PPD separates concerns: this architecture defines roles and
lifecycle, the companion taxonomy work defines the semantic roles and shared
computable floor that can map to richer vocabularies, and the companion
protocol work defines the participant-facing signaling path by which an
effective household policy is presented and acknowledged.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-scenarios">
      <name>Operational Scenarios</name>
      <t>This section describes representative operational cases for the architecture in home-network environments.
The scenarios focus on discovery, association, reassociation, and mixed-participant visibility rather than on user-interface details.</t>
      <section anchor="initial-discovery-and-association">
        <name>Initial Discovery and Association</name>
        <t>A PPD participant joins the home network and obtains one or more candidate PPD service endpoints through configuration or local network discovery.
In a common home deployment model, the PPD service endpoint is hosted by a residential gateway or equivalent home-network service.
Discovery identifies reachability, not authority.
The participant establishes a secure connection to a selected endpoint, confirms that endpoint through the applicable trust mechanism, retrieves the applicable effective policy instance, and acknowledges receipt of that policy instance.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
At the end of this process, the participant has established association if the current applicable effective policy has been delivered and acknowledged.
The PPD service endpoint also determines the initial freshness state of that association.</t>
      </section>
      <section anchor="policy-update-and-reassociation">
        <name>Policy Update and Reassociation</name>
        <t>The household policy, or the participant's effective policy, changes.
The PPD service endpoint immediately invalidates current association for the participant.
The participant enters a needs-reassociation state until it retrieves and acknowledges the updated effective policy instance.
This scenario illustrates that association state is tied to a specific policy instance and not to prior acknowledgments alone.
Reassociation re-establishes current association by confirming that the participant has seen the latest applicable policy instance.</t>
      </section>
      <section anchor="association-freshness-expiry-and-renewal">
        <name>Association Freshness Expiry and Renewal</name>
        <t>The applicable effective policy instance is unchanged, but the participant does
not renew within the bounded interval accepted by the PPD service endpoint.
The association becomes stale even though no policy change occurred.
The participant no longer has current association until it completes the
required renewal procedure.
This scenario distinguishes stale association from a needs-reassociation state
caused by a changed policy instance.</t>
      </section>
      <section anchor="participant-state-change">
        <name>Participant State Change</name>
        <t>A participant changes in a way that can affect the applicable effective policy instance, such as a declaration update, capability change, or other state change relevant to effective policy derivation.
The PPD service endpoint determines that current association can no longer be confirmed using existing state alone.
The participant then retrieves and acknowledges the newly applicable effective policy instance.
This scenario keeps the architecture focused on policy signaling and recordkeeping without assuming that every state change requires the same local handling or transport behavior.</t>
      </section>
      <section anchor="mixed-participant-network-visibility">
        <name>Mixed-Participant Network Visibility</name>
        <t>A home network contains both PPD participants and devices that do not participate in PPD.
The household can still use local management functions to distinguish associated participants, participants whose current association cannot be confirmed, and network-observed or unmanaged devices.
This scenario illustrates that non-participating devices are an expected operational reality.
Their presence can inform transparency and local management decisions, but it does not create association or change the baseline signaling role of PPD.</t>
      </section>
    </section>
    <section anchor="goals">
      <name>Goals</name>
      <section anchor="enhance-user-control">
        <name>Enhance User Control</name>
        <ul spacing="normal">
          <li>
            <t>Support a household's ability to define privacy preferences that can be made available consistently across participating devices and associated services.</t>
          </li>
          <li>
            <t>Provide an architectural basis for recording whether the current applicable policy was made available to a participant.</t>
          </li>
          <li>
            <t>Create a reciprocal acknowledgment model in which the household can retain a record that a participant or associated service was presented with, and acknowledged, a specific household policy instance.</t>
          </li>
        </ul>
      </section>
      <section anchor="promote-interoperability">
        <name>Promote Interoperability</name>
        <ul spacing="normal">
          <li>
            <t>Establish a standardized mechanism for devices from diverse manufacturers to discover PPD service endpoints, retrieve applicable privacy policies, and acknowledge policy instances.</t>
          </li>
          <li>
            <t>Support consistent association and reassociation behavior across heterogeneous participants.</t>
          </li>
        </ul>
      </section>
      <section anchor="enable-flexibility">
        <name>Enable Flexibility</name>
        <ul spacing="normal">
          <li>
            <t>Allow deployments to place policy storage and effective-policy derivation locally or remotely without changing the baseline participant-facing contract.</t>
          </li>
          <li>
            <t>Leave room for deployment-specific protocol profiles where constrained environments or different operational models require them, including trusted-intermediary participation for devices that cannot satisfy the minimum authenticated direct-participant bar.</t>
          </li>
        </ul>
      </section>
      <section anchor="facilitate-transparency">
        <name>Facilitate Transparency</name>
        <ul spacing="normal">
          <li>
            <t>Provide a basis for local management functions to distinguish currently associated participants, stale or reassociation-needed participants, and non-participating devices.</t>
          </li>
          <li>
            <t>Improve visibility into which participants have been presented with the current applicable policy instance, without implying enforcement of device behavior.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This document defines a high-level architectural framework for Privacy Preference Declaration (PPD) in home-network environments.
It focuses on roles, trust boundaries, lifecycle meaning, and operational assumptions for making household privacy preferences available to devices and associated services.</t>
      <t>This document does not delve into specific implementation details, such as message formats, data structures, security algorithms, or user interface design.
Furthermore, this document does not define mechanisms that modify device behavior, legal and regulatory considerations, or specific security protocols.
Where this document discusses recordkeeping, that recordkeeping is limited to signaling and recording that an applicable household policy was made available to and acknowledged by a PPD participant.
That recordkeeping can provide a basis for later accountability, audit, or dispute analysis, but this document does not define enforcement behavior or prove subsequent compliance.</t>
      <t>Specific implementation details and message formats are expected to be addressed in companion specifications.
This document aims to be complementary to existing and future standards related to home networking, IoT security, and data privacy.</t>
      <t>This document provides the foundation for subsequent work, including:</t>
      <ul spacing="normal">
        <li>
          <t>Privacy Preference Declaration Taxonomy:
<xref target="I-D.draft-dsmullen-ppd-taxonomy"/> defines the core vocabulary, extension
model, and mapping expectations for the privacy-related terms used by PPD
statements and rules, including the shared semantic floor that keeps those
terms computable across heterogeneous devices and vendors. That core is
intentionally small; richer vocabularies can still be used so long as they
remain reducible to the shared baseline primitives.</t>
        </li>
        <li>
          <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines the message formats, data structures, and communication procedures for PPD, including mechanisms for PPD service endpoint discovery, metadata confirmation, participant registration, optional participant declaration, policy retrieval, policy acknowledgment, renewal, and reassociation.</t>
        </li>
      </ul>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>This document makes the following assumptions:</t>
        <ul spacing="normal">
          <li>
            <t>User Control: It is assumed that users have a reasonable level of control over their home network infrastructure.
This includes the ability to configure routers, install software updates, and manage device access to the network.
This control is essential for users to effectively manage their privacy preferences and make them available to devices within their home network.</t>
          </li>
          <li>
            <t>Resource Constraints: It is assumed that the home network environment and devices operating therein have resource limitations, such as limited processing power and bandwidth.
We limit this assumption by considering that the PPD protocol and its associated mechanisms should be designed with these constraints in mind, minimizing overhead and ensuring efficient operation even on resource-constrained devices. Where a device cannot satisfy the minimum authenticated direct-participant bar, this architecture expects indirect participation through a trusted intermediary rather than weakening the meaning of direct protocol participation.</t>
          </li>
          <li>
            <t>Security Considerations: It is assumed that home networks in scope of this document are susceptible to typical security threats, including insider threats (or non-malicious misconfiguration) and vulnerability to local attacks.
We limit this assumption by considering specific security threats to protect user privacy and the integrity of the privacy policy.
This includes considerations for secure policy dissemination, device authentication, and protection against unauthorized access and modification of privacy preferences.</t>
          </li>
          <li>
            <t>Single User Policy: This document assumes that each device implementing the protocol is governed by a single, unified privacy policy defined by its primary user.
While other individuals within the same physical environment (e.g., household) may have different privacy preferences, the protocol is designed with the expectation that a device or associated service can receive the policy established by its primary user.
Future extensions could explore mechanisms for managing and reconciling multiple user-defined policies on a single device, particularly in shared or multi-user environments.</t>
          </li>
          <li>
            <t>Endpoint Discovery and Trust: It is assumed that configuration or local network mechanisms can identify one or more candidate PPD service endpoints for a participant.
Discovery alone does not establish that an endpoint is authoritative for household policy.
The applicable protocol profile needs a separate way to authenticate the selected endpoint and confirm that policy presented through that endpoint is authoritative for the participant's household context.</t>
          </li>
          <li>
            <t>Policy Signaling: It is assumed that PPD participants can retrieve the applicable household privacy policy through a PPD service endpoint and acknowledge receipt of that policy instance.
This acknowledgment forms the basis of association.
It is a receipt signal only; it does not assert that the participant is compatible with every policy term or that it will behave in a particular way.
Current association also depends on association freshness as determined by the PPD service endpoint.</t>
          </li>
          <li>
            <t>Association Freshness: It is assumed that current association expires unless the participant renews within a bounded interval accepted by the PPD service endpoint.
Participant-initiated exchanges provide the renewal or recovery path, but the PPD service endpoint remains the source of truth for whether association is current, stale, or in a needs-reassociation state.</t>
          </li>
          <li>
            <t>Local Recordkeeping: At a minimum, the architecture enables the household to know which PPD participants have acknowledged the current applicable policy.
Deployment-specific responses to participants that do not acknowledge policy, or to devices that do not participate in PPD, are local management decisions and are outside the baseline signaling function defined here.</t>
          </li>
        </ul>
      </section>
      <section anchor="association-state-and-freshness">
        <name>Association State and Freshness</name>
        <t>This architecture treats the PPD service endpoint as the source of truth for
participant association state.
A participant establishes association when it retrieves and acknowledges a
specific applicable effective policy instance.</t>
        <t>Current association exists only when both of the following are true:</t>
        <ul spacing="normal">
          <li>
            <t>the acknowledged policy instance still corresponds to the latest applicable
effective policy for that participant; and</t>
          </li>
          <li>
            <t>the association remains fresh according to the renewal model enforced by the
PPD service endpoint.</t>
          </li>
        </ul>
        <t>If the applicable effective policy instance is unchanged but the freshness
interval expires before renewal, the participant enters stale association.
If the applicable effective policy changes, if participant state relevant to
effective policy derivation changes, or if enough state is lost that the prior
association can no longer be trusted, the participant enters a
needs-reassociation state.
In either case, the participant no longer has current association.</t>
        <t>Participant-initiated exchanges provide the renewal or recovery path, but they
are not the source of truth for whether association is current.
The PPD service endpoint determines whether a participant is current, stale, or
in needs reassociation.</t>
      </section>
      <section anchor="discovery-and-policy-authority-boundary">
        <name>Discovery and Policy-Authority Boundary</name>
        <t>This architecture separates discovery of a participant-facing service endpoint
from trust establishment.
A participant may learn one or more candidate PPD service endpoints through
configuration or local network mechanisms, but discovery alone does not make
any candidate authoritative.
Before treating a policy instance as authoritative, the participant needs the
applicable protocol profile to authenticate the selected endpoint and confirm
that it is authorized to present policy for the household context.</t>
        <t>The participant-facing contract is the PPD service endpoint, not direct access
to the policy authority.
A deployment may place storage, policy combination, and effective policy
derivation behind that service.
When the PPD service endpoint and policy authority are distinct, the deployment
needs to preserve at least:</t>
        <ul spacing="normal">
          <li>
            <t>authenticity of the effective policy instance presented to the participant;</t>
          </li>
          <li>
            <t>integrity of policy-instance identifiers and association-freshness metadata;</t>
          </li>
          <li>
            <t>an unambiguous binding between the selected PPD service endpoint and the
policy authority on whose behalf it presents policy.</t>
          </li>
        </ul>
        <t>These are architectural invariants.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines the participant-facing transport, metadata confirmation, and security-profile expectations,
while deployment profiles still choose concrete mechanism details.</t>
      </section>
      <section anchor="key-components">
        <name>Key Components</name>
        <t>User Interface: A user-friendly interface (e.g., mobile app, web portal) for creating and managing privacy preferences.</t>
        <t>PPD Service Endpoint: A participant-facing service through which PPD participants discover, retrieve, and acknowledge applicable policy instances.
In a common home deployment model, this service is hosted by a residential gateway or equivalent home-network service.
A participant may learn candidate PPD service endpoints through configuration or local network discovery, but it treats a selected endpoint as authoritative only after the applicable trust mechanism succeeds.</t>
        <t>Policy Authority: The authoritative source of household policy state and any inputs used for effective policy derivation.
The policy authority may be local or remote.
A PPD service endpoint can obtain policy from a policy authority without exposing internal storage or computation topology to participants.
Participants are not required to discover or communicate with the policy authority directly in the baseline architecture.</t>
        <t>Effective Policy Derivation: The logical function, performed by or on behalf of the policy authority, that determines the applicable policy instance for a participant.</t>
        <t>Participant Declarations and Consent Requests: Optional participant inputs that can disclose data-handling declarations or request consent for uses not covered by baseline policy.
These inputs are distinct from the minimal path of policy retrieval and policy acknowledgment.
Where a deployment exposes a coarse comparison result for participant declarations at the protocol boundary, that result belongs on the declaration path rather than in the effective policy or policy acknowledgment objects. That comparison surface is diagnostic only; it is not a baseline negotiation channel, policy-relaxation mechanism, or homeowner-prompt path.</t>
        <t>Recordkeeping and Management Mechanisms: Deployment-specific mechanisms for presenting association state, participant status, effective policy views, and network-observed devices to the household.
Such mechanisms are not device-behavior requirements in the baseline PPD architecture.</t>
      </section>
      <section anchor="data-flows">
        <name>Data Flows</name>
        <t>This section outlines the high-level data interactions between users, PPD participants, the PPD service endpoint, and the policy authority in the Privacy Preference Declaration (PPD) framework.
It describes how privacy preferences are defined by users, made available to participants, and used as the basis for signaling and recordkeeping in a home network environment.</t>
        <t>The process begins when a user defines a set of privacy preferences that apply to their household.
These preferences may express rules such as which types of data may be collected, under what conditions data may be processed or shared, or which retention practices are acceptable.
The design of the user interface used to author these preferences, including its presentation, usability, or input modalities, is out of scope for this document, and will be addressed separately.
Likewise, the underlying vocabulary and structure of the privacy preferences,
including the semantic roles used in atomic privacy-relevant dataflows and the
associated qualifier families, are specified in
<xref target="I-D.draft-dsmullen-ppd-taxonomy"/>.</t>
        <t>Once created, the user's preferences are maintained by a policy authority, which may reside locally on a networked controller or be accessible through other trusted infrastructure.
The policy authority may include storage, effective policy derivation, or both.
When a new device joins the home network, it initiates an onboarding process during which it obtains one or more candidate PPD service endpoints through configuration or local network mechanisms.
Discovery identifies reachable candidates, but does not by itself establish that any candidate is authoritative for household policy.
The participant then establishes a secure channel to a selected endpoint and authenticates that endpoint according to the applicable protocol profile before retrieving policy.
Following onboarding, the PPD participant performs association, which involves retrieving the household privacy policy and acknowledging receipt of the applicable policy instance.
In some deployments, the participant is a backend service associated with the device rather than the local device itself.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
The participant-facing contract ends at the PPD service endpoint; any split between that service and the policy authority is internal to the deployment.
Where those components are distinct, the deployment preserves the authenticity and integrity of the effective policy instance, policy-instance identifier, and freshness metadata presented through the service endpoint.
Devices may optionally report their data handling declarations to the PPD service endpoint at this stage.
The PPD service endpoint also determines a freshness interval or renewal deadline for the resulting association state.</t>
        <t>If a device seeks to perform actions not permitted under the baseline policy, for example, collecting or sharing data beyond what the user has authorized, it may initiate a consent request workflow.
However, the design and behavior of this consent mechanism is explicitly out of scope for this document.
Inappropriate or poorly designed consent flows, such as those that involve excessive prompting, ambiguous language, or misleading options, can inadvertently pressure users into accepting data practices that conflict with their preferences.
Even without malicious intent, these experiences may degrade trust and lead to outcomes inconsistent with user expectations.
Future specifications should describe consent interactions that are clear, proportionate, and respectful, helping users make informed decisions without friction or fatigue.</t>
        <t>Current association is not indefinite.
If the participant does not renew before the freshness interval expires, the PPD service endpoint treats the association as stale even if the applicable effective policy instance is unchanged.
Reassociation is required when current association can no longer be confirmed for a participant.
This can occur because the applicable effective policy changed, because participant state relevant to effective policy derivation changed, because the association became stale, or because enough state was lost that the prior association can no longer be trusted.
Reassociation re-establishes current association by retrieving and acknowledging the latest applicable effective policy instance, or by completing a renewal procedure defined by the applicable protocol profile when the policy instance is unchanged.
Devices are not expected to re-collect consent for data uses already covered by existing, valid consent.</t>
        <t>To support straightforward implementation and debugging, the companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines a simple machine-readable representation for privacy policies, declarations, and acknowledgment state.
JSON is a practical baseline encoding for the architecture and for many constrained home-network deployments.
More compact encodings can be considered later if a specific deployment profile demonstrates a need for them.</t>
        <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines how association freshness is conveyed, including whether the protocol uses bounded renewal intervals, explicit renewal deadlines, or equivalent lease-style semantics.
It also distinguishes stale association from needs-reassociation states caused by policy or participant-state changes.</t>
        <t>It is important to note that the baseline requirement under this architecture is limited to discovery, retrieval, acknowledgment, and any renewal needed to maintain current association for the user's privacy policy.
These actions provide a signaling and recordkeeping mechanism for establishing that the current applicable policy was made available to the participant.
However, this document does not define how device behavior is changed by the policy, nor does it specify how to handle cases where a device cannot fully satisfy a given policy.
These aspects, including optional status reporting, detailed conflict-resolution procedures, or auditing, may be addressed in future work.</t>
        <t>Finally, while this document defines the overall data flow and interaction sequence, it does not define message formats, communication protocol details, or consent interface specifications.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, specifies the participant-facing message formats and protocol details.
Consent interface specifications, if any, remain future work.</t>
      </section>
      <section anchor="non-ppd-and-network-observed-devices">
        <name>Non-PPD and Network-Observed Devices</name>
        <t>Home networks commonly include devices that do not implement PPD, cannot be updated to implement PPD, or are visible only through local network observation.
The architecture treats these devices as expected operational cases rather than exceptional failures.</t>
        <t>A local management function can classify such devices as network-observed or unmanaged based on information available within the home network.
That classification can improve household transparency by showing that a device is present even though it has not established association through PPD.
Network observation does not create association, does not imply that the device has received a household policy, and does not imply anything about the device's behavior.</t>
        <t>Any local response to unmanaged devices, such as notification, inventory display, or other network management action, is a deployment decision outside the baseline PPD signaling architecture.</t>
      </section>
    </section>
    <section anchor="policy-language">
      <name>Policy Language</name>
      <t>The specific details of the privacy policy language, including its syntax, structure, and extensibility mechanisms, are out of scope for this document.
The policy vocabulary and taxonomy of privacy concepts and attributes are
defined in <xref target="I-D.draft-dsmullen-ppd-taxonomy"/>, including the compact
identifier model, the shared computable semantic floor, extension namespaces,
and the mapping expectations used by the companion protocol specification.</t>
      <section anchor="language-requirements">
        <name>Language Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Human-readable: Policies should be easily understandable by users.</t>
          </li>
          <li>
            <t>Machine-readable: Policies should be machine-processable for automated interpretation and signaling.</t>
          </li>
          <li>
            <t>Extensible: The language should be flexible enough to accommodate evolving privacy needs and technologies.</t>
          </li>
          <li>
            <t>Internationalization-compatible: Policies and identifiers used within them may need to support multilingual environments and non-ASCII characters.</t>
          </li>
        </ul>
        <t>To ensure consistent interpretation and comparison of string-based policy elements, such as device names, labels, or category identifier string handling practices should align with the guidelines defined in <xref target="RFC7564"/>.
This is particularly important when identifiers or user-facing labels are created, stored, or matched across vendors or systems that operate in different locales or character encodings.</t>
      </section>
      <section anchor="architectural-direction">
        <name>Architectural Direction</name>
        <t>The architecture assumes a policy representation that is both machine-readable
and suitable for user-facing explanation.
The taxonomy document is expected to define the semantic vocabulary, while a
companion protocol document is expected to define any wire-format or
serialization profile needed for exchange.</t>
        <t>Future specifications should also define how string identifiers--such as device
roles, policy tags, or consent status labels--are formatted, compared, and
stored, so implementations avoid ambiguous matching behavior.
In contexts where internationalized strings are involved, alignment with
<xref target="RFC7564"/> should be considered to ensure interoperability and consistency.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>This document defines an architectural framework for enabling users to express privacy preferences and signal those preferences within home network environments.
Several aspects critical to a fully operational implementation are intentionally left out of scope here and are expected to be addressed in future specifications or companion documents.</t>
      <section anchor="policy-taxonomy-and-semantics">
        <name>Policy Taxonomy and Semantics</name>
        <t><xref target="I-D.draft-dsmullen-ppd-taxonomy"/> defines:</t>
        <ul spacing="normal">
          <li>
            <t>A common vocabulary and set of semantic roles for expressing atomic
privacy-relevant dataflows.</t>
          </li>
          <li>
            <t>Attributes and semantics for data types, purposes, actions, sources,
destinations, and qualifier families used in those dataflows.</t>
          </li>
          <li>
            <t>An extensibility model that allows richer vocabularies while preserving a
shared computable semantic floor.</t>
          </li>
        </ul>
        <t>This taxonomy is foundational for consistent policy interpretation across heterogeneous devices and vendors.</t>
      </section>
      <section anchor="protocol-specification-and-message-formats">
        <name>Protocol Specification and Message Formats</name>
        <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines:</t>
        <ul spacing="normal">
          <li>
            <t>Message formats for participant registration, optional participant declaration, policy retrieval, policy acknowledgment, renewal, and reassociation.</t>
          </li>
          <li>
            <t>Discovery profiles, lightweight metadata confirmation, and trust-establishment bindings for PPD service endpoints.</t>
          </li>
          <li>
            <t>Transport-layer considerations, service authentication, and policy-authority trust expectations.</t>
          </li>
          <li>
            <t>Association freshness semantics, including how renewal intervals or deadlines are conveyed and how stale association is distinguished from needs-reassociation states.</t>
          </li>
          <li>
            <t>Baseline encoding expectations for structured data, with JSON as a practical starting point and more compact encodings reserved for deployment profiles that need them.</t>
          </li>
        </ul>
      </section>
      <section anchor="consent-request-workflow-design-specifications">
        <name>Consent Request Workflow Design Specifications</name>
        <t>The mechanism by which devices request additional user consent for data uses not covered by the baseline policy is out of scope.
However, future specifications should:</t>
        <ul spacing="normal">
          <li>
            <t>Define clear constraints to prevent manipulative or fatiguing consent flows (e.g., dark patterns).</t>
          </li>
          <li>
            <t>Describe consent interactions that are transparent, infrequent, proportionate, and user-respecting.</t>
          </li>
          <li>
            <t>Explore user interface standards or API affordances to preserve meaningful choice.</t>
          </li>
        </ul>
        <t>This is a particularly sensitive area and must balance user experience, privacy expectations, and implementation feasibility.</t>
      </section>
      <section anchor="recordkeeping-and-local-management">
        <name>Recordkeeping and Local Management</name>
        <t>This architecture does not define how devices act on privacy policies or how departures from policy are detected or remediated.
The baseline function is signaling: a participant can receive an applicable household policy and acknowledge that policy instance.
Future work may include:</t>
        <ul spacing="normal">
          <li>
            <t>Optional participant status reporting models and device-side implementation expectations.</t>
          </li>
          <li>
            <t>Recordkeeping mechanisms for correlating policy delivery and acknowledgment records.</t>
          </li>
          <li>
            <t>State models that distinguish current, stale, and needs-reassociation participant status.</t>
          </li>
          <li>
            <t>Deconfliction strategies for devices unable to meet all user-defined constraints.</t>
          </li>
          <li>
            <t>Deployment-local management options, such as notifications or inventory display.</t>
          </li>
        </ul>
      </section>
      <section anchor="user-interface-design-specifications">
        <name>User Interface Design Specifications</name>
        <t>The user-facing interface used to author, modify, and review privacy preferences is out of scope.
Future design guidance may address:</t>
        <ul spacing="normal">
          <li>
            <t>User experience design principles for presenting privacy concepts clearly and accessibly.</t>
          </li>
          <li>
            <t>Models for progressive disclosure of policy impact.</t>
          </li>
          <li>
            <t>Multi-user and household-role-specific control models (e.g., parental vs. administrative roles).</t>
          </li>
        </ul>
      </section>
      <section anchor="interoperability-testing-and-reference-implementations">
        <name>Interoperability Testing and Reference Implementations</name>
        <t>Future work may also include:</t>
        <ul spacing="normal">
          <li>
            <t>Development of reference implementations of the PPD protocol, PPD service endpoint, and policy-authority components.</t>
          </li>
          <li>
            <t>Interoperability testing across devices and vendors.</t>
          </li>
          <li>
            <t>Conformance guidelines and self-certification procedures.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="internationalization-considerations">
      <name>Internationalization Considerations</name>
      <t>In contexts where privacy preferences or taxonomy elements involve user-facing or vendor-defined string identifiers, additional work may be required to:</t>
      <ul spacing="normal">
        <li>
          <t>Define string normalization and comparison rules, particularly for internationalized text.</t>
        </li>
        <li>
          <t>Support identifier consistency across diverse vendors and locales.</t>
        </li>
        <li>
          <t>Consider alignment with <xref target="RFC7564"/> for handling Unicode-aware identifiers in a secure and interoperable way.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For a privacy framework to be effective, it needs to support the expression of user preferences and protect those preferences during transmission, retrieval, and acknowledgment.
This section outlines safeguards for confidentiality, authenticity, integrity, and metadata minimization during PPD operations.</t>
      <section anchor="secure-policy-dissemination">
        <name>Secure Policy Dissemination</name>
        <t>Communication between PPD participants and the PPD service endpoint needs protection against unauthorized access and tampering.
When the PPD service endpoint and policy authority are distinct, deployments also need to preserve policy authenticity and integrity across that boundary.
Discovery mechanisms can identify candidate PPD service endpoints, but discovery alone is not sufficient to establish that an endpoint is authorized to present household policy.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines explicit participant-facing security profiles and the accountability properties they need to provide. Future deployment profiles still need to identify concrete cryptographic mechanisms, such as encryption and mutual authentication, so that legitimate participants can retrieve privacy policies and detect modification.
Those deployment profiles also need to protect the binding between the authenticated participant-facing service endpoint and the policy state it presents.</t>
      </section>
      <section anchor="anonymity-and-metadata-protection">
        <name>Anonymity and Metadata Protection</name>
        <t>Even when privacy policies themselves do not contain sensitive personal information, the act of retrieving or acknowledging a policy can reveal characteristics about the household, such as the types of devices in use, specific user preferences, or behavioral patterns over time.
<xref target="RFC7258"/> cautions against protocol designs that expose unnecessary metadata, treating the accumulation of such information as a legitimate technical threat.
This framework takes that warning seriously: metadata exposure during policy retrieval and device onboarding needs to be minimized to avoid turning privacy infrastructure into a new source of privacy leakage.
Concepts from <xref target="RFC9577"/> may help inform this effort. <xref target="RFC9577"/> introduces techniques for authorization without identification, enabling a client to prove it is authorized without revealing who it is.
While <xref target="RFC9577"/> is optimized for pseudonymous web authentication over the public internet and assumes a centralized token issuer model, its core ideas, particularly around unlinkable token presentation, could be adapted to the PPD protocol to reduce metadata correlation and minimize household identifiability during policy exchanges.
However, this needs careful analysis, as the assumptions of <xref target="RFC9577"/> do not fully align with the goals or context of a local, user-governed home network.</t>
      </section>
      <section anchor="policy-integrity">
        <name>Policy Integrity</name>
        <t>Devices need assurance that the policy retrieved is authentic and unaltered.
Integrity protections, such as digital signatures, are necessary to ensure that users' preferences cannot be tampered with in transit or at rest by other devices, malicious actors, or misconfigurations.
If policy is obtained through a participant-facing service from a distinct policy authority, integrity protections also need to cover the policy-instance identifier and any freshness metadata presented through that service.</t>
      </section>
      <section anchor="device-authentication">
        <name>Device Authentication</name>
        <t>Devices participating in the privacy framework need an authentication model before accessing the PPD service endpoint.
This limits policy dissemination to known, authorized participants and helps users maintain trust in the integrity of their home network's privacy relationships.
If the PPD service endpoint and policy authority are distinct, the deployment also needs a way to preserve the authenticity of policy state presented through the participant-facing service.
By aligning with the concerns raised in <xref target="RFC7258"/> and incorporating ideas from <xref target="RFC9577"/> where appropriate, this framework seeks to protect users not only from overt data collection, but also from silent inference and passive metadata surveillance.
At the same time, it avoids treating anonymity as an end in itself.
The goal is to support privacy with recordkeeping, where user-defined preferences are signaled consistently, devices are identifiable only as much as necessary for the exchange, and the user retains visibility into what occurs within their domain.</t>
      </section>
      <section anchor="policy-acknowledgment-and-recordkeeping">
        <name>Policy Acknowledgment and Recordkeeping</name>
        <t>PPD participants need a way to acknowledge receipt of the applicable privacy policy instance.
This acknowledgment should be recorded and verifiable so that the household can determine which participants have seen the current policy.
The record needs to bind the participant identity, the acknowledged policy instance, and the time or sequence context in which the acknowledgment was made.
For devices that rely on a backend service, the record also needs to distinguish between acknowledgment by the local device and acknowledgment by the backend service acting on behalf of that device.
This record is important because it creates a reciprocal acknowledgment path.
In many current deployments, the household user is asked to acknowledge device or vendor policy terms, but there is no comparably strong household-controlled record that the participant was presented with the household's own privacy policy.
An authenticated and integrity-protected acknowledgment record allows the household to show that presentation and acknowledgment occurred, which can support later accountability or review even when the architecture does not define automated enforcement.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines baseline acknowledgment semantics and the protection properties acknowledgment mechanisms need to provide. Future deployment profiles still need concrete mechanisms that remain practical for constrained home-network devices.
At minimum, the selected mechanism needs to provide:</t>
        <ul spacing="normal">
          <li>
            <t>participant authentication sufficient to bind the acknowledgment to the device or backend service that made it;</t>
          </li>
          <li>
            <t>policy-instance integrity so that the acknowledged policy can be identified unambiguously;</t>
          </li>
          <li>
            <t>freshness or sequencing so that an old acknowledgment cannot be replayed as evidence of current association;</t>
          </li>
          <li>
            <t>verifiability sufficient for the acknowledgment record to function as a protected receipt of policy presentation and acknowledgment; and</t>
          </li>
          <li>
            <t>a way to retain or export the acknowledgment record without exposing more household metadata than necessary.</t>
          </li>
        </ul>
        <t>A policy acknowledgment is not, by itself, an assertion about subsequent device behavior.
Any local response to non-participation or other local observations is outside the baseline signaling mechanism defined by this architecture.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <?line 652?>

<reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC8280">
          <front>
            <title>Research into Human Rights Protocol Considerations</title>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
            <author fullname="C. Cath" initials="C." surname="Cath"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973). The other parts of this document explain the background of the guidelines and how they were developed.</t>
              <t>This document is the first milestone in a longer-term research effort. It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8280"/>
          <seriesInfo name="DOI" value="10.17487/RFC8280"/>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-taxonomy">
          <front>
            <title>Privacy Preference Declaration Taxonomy</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="18" month="May" year="2026"/>
            <abstract>
              <t>   This document defines the core vocabulary and extension model used by
   Privacy Preference Declarations (PPDs) to describe data handling in
   home networks.  It complements [I-D.draft-dsmullen-ppd-architecture]
   and [I-D.draft-dsmullen-ppd-protocol] by standardizing term spaces
   for data types, purposes, actions, sources, destinations, and
   selected constraints.  Stable term identifiers are the primary
   semantic hook.  Baseline participant-facing protocol messages use
   compact identifiers plus taxonomy context rather than requiring full
   ontology exchange on the wire.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-taxonomy-03"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-protocol">
          <front>
            <title>Privacy Preference Declaration Protocol Specification</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="18" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies a participant-facing protocol for Privacy
   Preference Declarations (PPDs) in home networks.  The protocol is
   between a home-side PPD service endpoint and a device-side actor,
   formally the PPD participant, which is a device or a service acting
   on behalf of a device.  It defines baseline operations for endpoint
   metadata confirmation, participant registration, optional participant
   declaration, effective-policy retrieval, policy acknowledgment,
   renewal, and reassociation.  This document complements the PPD
   architecture and taxonomy documents by defining the message and
   sequencing behavior needed for interoperable policy signaling.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-protocol-00"/>
        </reference>
        <reference anchor="RFC7564">
          <front>
            <title>PRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application Protocols</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Application protocols using Unicode characters in protocol strings need to properly handle such strings in order to enforce internationalization rules for strings placed in various protocol slots (such as addresses and identifiers) and to perform valid comparison operations (e.g., for purposes of authentication or authorization). This document defines a framework enabling application protocols to perform the preparation, enforcement, and comparison of internationalized strings ("PRECIS") in a way that depends on the properties of Unicode characters and thus is agile with respect to versions of Unicode. As a result, this framework provides a more sustainable approach to the handling of internationalized strings than the previous framework, known as Stringprep (RFC 3454). This document obsoletes RFC 3454.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7564"/>
          <seriesInfo name="DOI" value="10.17487/RFC7564"/>
        </reference>
        <reference anchor="RFC9577">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document defines an HTTP authentication scheme for Privacy Pass, a privacy-preserving authentication mechanism used for authorization. The authentication scheme specified in this document can be used by Clients to redeem Privacy Pass tokens with an Origin. It can also be used by Origins to challenge Clients to present Privacy Pass tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9577"/>
          <seriesInfo name="DOI" value="10.17487/RFC9577"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
