SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
NSTIC STEERING GROUP: NIST February 2012 DRAFT CHARTER with AUGUST 2012 JBC EDITS
     Type-set version with line numbers, and proposed corrections and comments.

     Note, this analysis has multiple annotations and amendments that may not be needed at the initial Steering Group meetings.
     For a simpler version, see the ASCII file "NSTICdraftCharterFebruary2012.txt" at Slideshare
     (http://www.slideshare.net/JamieXML/nstic-draft-bylaws-july-2012) or Google Docs: (http://j.mp/MVwfNC)

     See end of document for production information.
          •   [Square brackets] and struckthrough text indicate proposed changes. Amendments listed at end of document.
          •   <Angle brackets> include this editor's unofficial cross-references, and <**type of amendment>.
          •    {Curly brackets} indicate original NIST footnotes, with added hyperlinks and some abbreviations.

 1   RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP

 2   1. Identity Ecosystem Steering Group Charter.

 3   The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President Obama in
 4   April 2011, acknowledges and addresses a major weakness in cyberspace – a lack of confidence and assurance
 5   that people, organizations, and businesses are who they say they are online. {NIST fn1: The full Strategy can
 6   be found at: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf.} Additionally,
 7   in the current online environment, individuals are asked to maintain dozens of different usernames and
 8   passwords, one for each website with which they interact. The complexity of this approach is a burden to
 9   individuals, and it encourages behavior – such as the reuse of passwords – that makes online fraud and identity
10   theft easier. At the same time, online businesses are faced with ever-increasing costs for managing customer
11   accounts, the consequences of online fraud, and the loss of business that results from individuals’ unwillingness
12   to create yet another account. Moreover, both businesses and governments are unable to offer many services
13   online, because they cannot effectively identify the individuals with whom they interact. Spoofed websites, stolen
14   passwords, and compromised accounts are all symptoms of inadequate authentication mechanisms. {NIST fn2:
15   Strategy, April 2011, [p.] 1.} <**A: Typo.>

16   The Identity Ecosystem envisioned in the NSTIC is an online environment that will enable people to validate their
17   identities securely, but with minimized disclosure of personal information when they are conducting transactions.
18   The vibrant marketplace created by the Identity Ecosystem will provide people with choices among multiple
19   accredited identity providers, both private and public, and choices among multiple credentials. For example,
20   imagine that a student could get a digital credential from her cell phone provider and another one from her
21   university and use either of them to log-in to her bank’s website, her e-mail, three social networking sites, four
22   online commerce sites, and so on, all without having to remember dozens of passwords. The added
23   convenience, security, and privacy provided within the Identity Ecosystem will allow additional services to be put
24   online to drive greater economic growth. Notwithstanding the objective to improve identification and
25   authentication in cyberspace for certain types of transactions, not all Internet activities have such needs. Thus,
26   the capacity for anonymity and pseudonymity will be maintained in the envisioned Identity Ecosystem.

27   A core tenet of the NSTIC is that its implementation must be led by the private sector. The NSTIC calls for the
28   Federal Government to work collaboratively with the private sector, advocacy groups, public sector agencies,
29   and other organizations to improve the processes by which online transactions are conducted. The Strategy
30   itself was developed with substantial input from both the private sector and the American public. The National
31   Institute of Standards and Technology (NIST), which has been designated to establish a National Program Office
32   to lead the implementation of the NSTIC, recognizes that a strong and vibrant public-private partnership is
33   necessary to execute the Strategy’s vision in a way that supports the wide range of interactions that occur over
34   the Internet. As such, NIST is leading the effort to fulfill the NSTIC’s call for government to work in close
35   partnership with the private sector and other relevant stakeholder groups to, “(Establish a steering group to)
36   administer the process for policy and standards development for the Identity Ecosystem Framework in
37   accordance with the Guiding Principles in (the) Strategy. The steering group will also ensure that accreditation
38   authorities validate participants’ adherence to the requirements of the Identity Ecosystem Framework.” {NIST
39   fn3: Strategy, April 2011, p. 25.}
40     1.1. Mission. The Mission of the Steering Group shall be to govern and administer the Identity Ecosystem
41   Framework in a manner that stimulates the development and sustainability of the Identity Ecosystem. The
42   Steering Group will always operate in accordance with the NSTIC’s Guiding Principles.

43         1.1.1. Objectives. The activities and work products of the Steering Group shall be conducted in support
44   of the following objectives:

45          * Ensure that the Identity Ecosystem and Identity Ecosystem Framework conform to the four NSTIC
46   Guiding Principles (as detailed in section 1.3).

47         * Administer the process for policy and standards development and adoption for the Identity Ecosystem
48   Framework and, where necessary establish policies standards for the Identity Ecosystem Framework.

49          *   Adopt and, where necessary, establish standards for the Identity Ecosystem Framework.

50         * Certify that accreditation authorities validate adherence to the requirements of the Identity Ecosystem
51   Framework.

52          1.1.2. Purpose. The purpose of the Steering Group shall be to develop and administer the process for
53   policy and technical standards development for the Identity Ecosystem Framework. The Steering Group shall
54   bring together all of the interested stakeholders, both in private and public sectors, to confirm that the Identity
55   Ecosystem Framework provides a minimum baseline of privacy, security, interoperability, and ease-of-use
56   through standards and policies, without creating unnecessary barriers to entry. The Steering Group shall
57   facilitate the fulfillment of the NSTIC goals to develop a comprehensive Identity Ecosystem Framework; build
58   and implement the Identity Ecosystem; enhance confidence and willingness to participate in the Identity
59   Ecosystem; and, support the long-term success and sustainability of the Identity Ecosystem. {NIST fn4:
60   Strategy, April 2011, p. 31.} ¶ The Steering Group shall not be a standards development body, but rather an
61   organization that promotes the development of standards and develops policies that serve to accelerate the
62   development and adoption of the Identity Ecosystem.

63      1.2. Scope of Activities. The activities of the Steering Group shall be limited to achievement of the
64   objectives listed in this charter. Additional activities that are not considered essential to completion of these
65   objectives may be conducted when determined appropriate through Steering Group consensus. The scope of
66   the Steering Group’s activities is summarized in the sections that follow.

67        1.2.1. Adopt and Establish Standards. The Steering Group shall establish forums and procedures to
68   review applicable standards and adopt those that support achievement of the NSTIC vision, conform to the
69   Guiding Principles, and meet other established requirements. Additionally, the Steering Group will recommend
70   standards be established when gaps are identified. The Steering Group shall advocate for standards to be
71   established and adopted in a timely manner and be sufficient to keep pace with emerging technology and market
72   trends.

73         1.2.2. Develop and Maintain Policies. The Steering Group shall establish the mechanisms necessary to
74   develop, implement, and maintain policies that are appropriate for use in the Identity Ecosystem and conform to
75   the NSTIC Guiding Principles. The Steering Group shall support the timely development and implementation of
76   policies.

77        1.2.3. Develop and Maintain Processes for the Accreditation of Identity Ecosystem Entities. The
78   Steering Group shall develop, foster, and implement a clear process for accrediting entities within the Identity
79   Ecosystem as well as develop clear testing and certification criteria by which adherence to the recommended
80   standards and policies may be measured. ¶ The Steering Group shall ensure that this accreditation process is
81   applied fairly to all Identity Ecosystem participants.

82        1.2.4. Develop and Maintain Identity Ecosystem Operating Procedures. The Steering Group shall
83   develop, administer, and maintain Identity Ecosystem Operating Procedures to facilitate interoperability between
84   and among the Identity Ecosystem participants. Operating Procedures refers to the set of policies and standards
85   created by the Steering Group as accepted baseline requirements for participating in the Identity Ecosystem
86   Framework.
87     1.3. Adherence to the NSTIC Guiding Principles. The Identity Ecosystem Steering Group, its components,
 88   and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC.
 89   They are:

 90        * Identity solutions will be privacy-enhancing and voluntary. The Identity Ecosystem will be
 91   grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the
 92   creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the
 93   capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the
 94   Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related
 95   transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity
 96   Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem
 97   credential nor that companies require Identity Ecosystem credentials from consumers as the only means to
 98   interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the
 99   credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem
100   mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day
101   – or even a transaction-to-transaction – choice.

102        * Identity solutions will be secure and resilient. Identity solutions within the Identity Ecosystem will
103   provide secure and reliable methods of electronic authentication by being grounded in technology and security
104   standards that are open and collaboratively developed with auditable security processes. Credentials within the
105   Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices;
106   resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the
107   necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely
108   restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be
109   capable of adapting to the dynamic nature of technology[.] <**B: Typo>

110         * Identity solutions will be interoperable. Interoperability encourages and enables service providers to
111   accept a wide variety of credentials and enables users to take advantage of different credentials to assert their
112   identity online. Two types of interoperability are recognized in the Identity Ecosystem: there will be standardized,
113   reliable credentials and identity media in widespread use in both the public and private sectors; and if an
114   individual, device, or system presents a valid and appropriate credential, any qualified relying party is capable of
115   accepting and verifying the credential as proof of identity and attributes.

116         * Identity solutions will be cost-effective and easy to use. The Identity Ecosystem will promote
117   identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of
118   service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and
119   relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and
120   enabled by technology that requires minimal user training. {NIST fn5: Strategy, April 2011, [pp.] 25, 11-14.}
121   <**Typo.>

122     1.4. Operating Principles. The Steering Group shall adhere to the following four operating principles.

123       1.4.1. Openness and Transparency. The work of the Steering Group, including all working groups and
124   committees, shall facilitate broad participation and be publiclypublically accessible. <**D: Typo.> The Identity
125   Ecosystem Steering Group shall take the following steps to provide openness and transparency in all its
126   proceedings:

127          * All documents, drafts, and minutes of meetings shall be posted on a publicly available Internet site.

128          * All meetings of all governing bodies shall be open to public attendance and leverage virtual
129   attendance options to maximize broad and public participation.

130         * Technologies should be leveraged to create user-friendly and broad avenues for participation in all
131   proceedings and administrative functions.

132        1.4.2. Balance. The Steering Group shall strive to achieve balanced representation among all
133   stakeholder groups regardless of their size, financial status, or sector alignment/affiliation.
134        1.4.3. Consensus. Consensus – general agreement among members – shall be a core value of the
135   Steering Group. All processes instituted by the Steering Group shall require participants to consider all views,
136   proposals and objections, and endeavor to reconcile them. Although positions of leadership, such as committee
137   chairs, are likely to serve as the primary drivers of consensus, all Steering Group participants must be
138   (1) cooperative in the consensus process; (2) constructive; and (3) respectful when providing feedback or
139   dissenting opinions. In the event that consensus cannot be reached, voting, by an established method, shall be
140   used to make Steering Group decisions.

141         1.4.4. Harmonization. The Steering Group shall encourage harmonization of standards and policies and
142   shall always strive to recognize the impacts of policy and standards on all stakeholders in the Identity
143   Ecosystem.

144      1.5. Membership. Membership in the Steering Group shall be open to organizations and unaffiliated
145   individuals (Members) that have an interest in the development of the Identity Ecosystem. A Member
146   organization may have more than one individual within its organization participate in Steering Group activities;
147   however, it shall designate only one individual as its representative for the purposes of voting in Plenary
148   proceedings. ¶ A Member shall join as a Participating or Observer Member as defined below:

149        * Participating Members. Participating Members are those stakeholders who actively participate in the
150   Steering Group and the work of the Plenary, its Standing Committees, and Working Groups. The criteria for
151   active participation such as attendance quotas or other measurable conduct shall be defined in the By-laws.
152   Participating Members shall have a vote in all Plenary proceedings.

153        * Observing Members. Observing Members are those stakeholders who do not meet the criteria for
154   active participation, but want to maintain a presence in the Steering Group. Observing Members may still
155   contribute to the work of the Plenary, its Standing Committees, and Working Groups, but they shall not be
156   permitted to vote in Plenary proceedings.

157     1.6. Organizational Structure. The Steering Group shall be composed of two bodies: the Identity
158   Ecosystem Plenary and the Identity Ecosystem Management Council. The Plenary and the Management Council
159   shall be collectively responsible for achieving the Steering Groups objectives.

160     1.7. Establishment. The NSTIC, which was signed by President Obama in April 2011, called for the
161   establishment of a private sector-led steering group to administer the development and adoption of the Identity
162   Ecosystem Framework. The Steering Group receives its authority to operate from the active participation of its
163   membership. . <**E; Typo.>

164        1.7.1. Resources and Duration. The Steering Group shall be initiated with the support of NIST.
165   Following the initiation period, the Steering Group will transition to a self-sustaining organization. The
166   Management Council shall be responsible for managing the Steering Group’s resources and procuring services
167   once the Steering Group is self-sustaining, as necessary.. <**F: Typo.>

168   2. Identity Ecosystem Plenary.

169   Participation in the Plenary shall be open to all Members. The primary responsibilities of the Plenary shall be to
170   review and recommend technical standards for adoption establish and maintain the procedures/policies that
171   govern the Identity Ecosystem, develop, and establish accountability measures to promote broad adherence to
172   these procedures, and facilitate the ongoing operation of the Steering Group. The Plenary will consist of
173   Standing Committees, Working Groups, and individual members. The Participating Members (as defined in
174   section 1.5 and in associated By-laws) of the Plenary shall be responsible for voting on recommendations
175   provided by the Standing Committees and Working Groups and will participate in elections for Management
176   Council Delegates, Management Council Officers, and the Plenary Chair.

177      [2.1.] 2.1.1. The Plenary Chair. <**G: Numbering typo.> The Plenary shall be headed by the Plenary Chair.
178   The Chair shall be responsible for directing the actions, managing the votes, and providing general leadership to
179   the Plenary. Nominees for this position shall be approved by the Nominations Committee and selected by simple
180   majority vote of the Participating Members that comprise the Plenary.
181      [2.2.] 2.1.2. Plenary Standing Committees. <**H: Numbering typo.> Standing Committees shall be
182   responsible for addressing and coordinating ongoing/permanent issues. Standing Committees shall produce
183   their own charters and voting procedures which shall be [circulated for comment to the Plenary and then]
184   approved by the Management Council. <**I: Overcentralization.> Additional measures may be taken by the
185   Management Council to provide balanced and experienced representation on the Standing Committees [by
186   modifying the participation and voting rights in a Standing Committee's charter, subject to Section 1.4.1].
187   <**J: Rule hygiene.> All recommendations proposed by the Committees shall be reviewed and approved by the
188   Privacy Standing Committee prior to submission to the Plenary for approval. ¶ The designated Standing
189   Committees shall be:

190         * Policy Coordination Committee. The Policy Coordination Committee is responsible for coordinating
191   policies to facilitate and promote the establishment of the Identity Ecosystem and the rules for participation.
192   <** See sec. 1.2.1.>

193        * Standards Coordination Committee. The Standards Coordination Committee is responsible for
194   coordinating, reviewing, and recommending the adoption of technical standards to facilitate interoperability within
195   the Identity Ecosystem. <** See sec. 1.2.2.>

196        * Accreditation Coordination Committee. The Accreditation Coordination Committee is responsible for
197   coordinating accreditation requirements for Identity Ecosystem participants. <** See secs. 1.2.1 and 1.3 (third
198   bullet).>

199        * Privacy Coordination Committee. The Privacy Coordination Committee is responsible for seeing that
200   other Committees’ and Working Groups’ work products adhere to the Privacy-enhancing and Voluntary Guiding
201   Principle. To that end, this group should have a “gatekeeper” function; meaning no recommendations on policies,
202   standards or other work products should be reviewed or approved by the Plenary unless first approved by the
203   Privacy Coordination Committee. This committee should be staffed by individuals with extensive experience in
204   the privacy field, and comprising a balance of viewpoints across a spectrum of experience, including advocacy
205   organizations and the private sector. <** See sec. 1.3 (first bullet).>

206         * Nominations Committee. The Nominations Committee is responsible for evaluating candidate
207   qualifications to serve as the Chair on the Plenary and Management Council or as a Delegate (Stakeholder
208   group and At-Large). Selection criteria outlined in this Charter will enable the selection of persons that can work
209   for the welfare of the Identity Ecosystem as a whole, while minimizing self-interested conduct that could hinder
210   the effectiveness and legitimacy of the Steering Group.

211     The Management Council may establish more Standing Committees as necessary to accomplish the work of
212   the Steering Group.

213     2.3. 2.1.3. Plenary Working Groups. <**K: Numbering typo.> Members shall establish domain expert
214   Working Groups as necessary to accomplish the work of the Steering Group. Working Groups may be proposed
215   by the Plenary or the Management Council and shall be officially established by the Management Council.
216   Participation in and meetings of the Plenary Working Groups shall be open to Participating and Observing
217   Members; however, only Participating Members may vote on work products and recommendations. ¶ Working
218   Groups shall produce their own charters and voting procedures which shall be approved by the Management
219   Council. Based on their work, Working Groups may propose recommendations and work products for
220   consideration by the Plenary. All recommendations proposed by the Working Groups shall be reviewed and
221   approved by the Privacy Standing Committee prior to submission to the Plenary for approval. ¶ The following
222   Working Groups shall be established by the Plenary and Management Council:

223        * Usability and Accessibility Working Group. This working group is responsible for evaluating
224   technologies and identity solutions within the Identity Ecosystem to confirm that they are easy-to-use and
225   accessible for all potential users, in accordance with the NSTIC Guiding Principles. <** See sec. 1.3 (fourth
226   bullet).>

227        * Security Working Group. This working group is responsible for evaluating technologies and identity
228   solutions within the Identity Ecosystem to confirm that they meet applicable requirements for confidentiality,
229   integrity, and availability, and are capable of timely restoration after any disruption. The work of this group should
230   be conducted in accordance with the NSTIC Guiding Principle for the security and resilience of identity solutions
231   <** See sec. 1.3 (second bullet).>

232       * International Coordination Working Group. This working group is rResponsible for reviewing and,
233   where appropriate, coordinating alignment with similar international identity standards and policies.
234   <**L: Typo.>

235     Additional Working Groups may be established by the Management Council or the Plenary as necessary to
236   accomplish the work of the Steering Group.

237   3. Identity Ecosystem Management Council.

238   The Management Council Management Council shall provide guidance to the Plenary on the broad objectives
239   envisioned by the Strategy; produce workplans to prioritize work items and monitor progress; procure necessary
240   resources; and ensure that Steering Group work activities align with the NSTIC Guiding Principles and Goals.

241   All recommendations from the Plenary Working Groups and Standing Committees shall be voted on by the
242   stakeholder group delegates elected to the Management Council. <**M: Rule hygiene.> The voting process will
243   be structured and defined in the Steering Group By-laws established during the initial meeting of the Steering
244   Group. The Management Council shall also be the final ratification authority in the Steering Group.
245   <**N: Overcentralization.>

246     3.1. Management Council Composition. The Management Council shall be composed of 14 delegates,
247   who are elected from the stakeholder groups and two at-large delegates. The Management Council may include
248   additional stakeholder groups at any time as necessary. ¶ In addition to Management Council Delegates, the
249   Management Council shall have three (3) officers:

250       * The Chair: This position shall provide general leadership to the Management Council; oversee votes,
251   and direct meetings of the Management Council. The Chair shall be a non-voting officer.

252        * The Vice-Chair: This position shall assist the Steering Group in maintaining alignment with NSTIC
253   objectives and the NSTIC Guiding Principles. The Vice-Chair shall be a non-voting officer.

254        * The Ombudsman: This position shall be responsible for upholding the NSTIC Guiding Principles and
255   Steering Group charter, representing and advocating for consumers or other individuals and underrepresented
256   groups, safeguarding against individual stakeholder groups exerting excessive influence, monitoring and
257   reporting on Management Council activities, managing grievances from the Plenary, and facilitating public
258   comment and citizen outreach. The Ombudsman shall be a non-voting officer.

259      3.2. Management Council Selection. The Management Council Delegates and Officers shall be selected
260   through the following processes:

261       * Delegates: Management Council Delegates shall be selected through a general election held within
262   each Stakeholder Group represented in the Plenary. The nomination of each candidate for the election will be
263   approved by the Nomination Committee.

264        * At-Large Delegates: The election or selection process of At-Large Delegates shall be determined by
265   the Steering Group during its initial meetings, as with all Management Council Delegates nominees shall be
266   approved by the Nominations Committee.

267       * Chair: The Chair of the Management Council shall be selected through a general election of the Identity
268   Ecosystem Plenary. The nomination of each candidate for election shall be approved by the Nominations
269   Committee.

270        *   Vice-Chair: This position shall be filled by the Director of the NSTIC National Program Office

271        * Ombudsman: This position shall be provided by the Secretariat. The criteria for selection shall be
272   established by the Management Council.
273      Management Council positions, selections, elections, and appointments shall be conducted in accordance
274   with By-laws created by the Steering Group during its initial meetings. <**): Rule hygiene.>

275       3.2.1. Delegate Selection Criteria. The Management Council Delegates (Stakeholder Group and At-
276   Large) shall be selected in accordance with the following criteria:

277            * Visionary Capability: Delegates shall be capable of understanding and contributing to the multi-
278   disciplinary aspects of the Identity Ecosystem and the specific goals of the Strategy.

279         * Team Effectiveness: Delegates shall be capable of working effectively as a team within the scope of
280   the Management Council.

281            * Outreach: Delegates shall be able to clearly communicate the actions of the Management Council to
282   their individual Stakeholder Group to facilitate consensus building and support the work of the Steering Group.

283           *    Expertise: Delegates shall be recognized experts in their fields of endeavor.

284        * Commitment: Delegates shall be able to commit to contribute sufficient time and effort to accomplish
285   Management Council activities.

286        3.2.2. Stakeholders. For the purposes of Management Council Delegate selections Members shall self-
287   identify into one of the following 14 stakeholder groups:

288            *   Privacy & Civil Liberties. This group focuses on the protection of individuals’ privacy and civil
289   liberties.

290          * Usability & Human Factors. This group focuses on technologies and solutions that are usable and
291   incorporate the human, cognitive, and social properties unique to the characteristics of humans.

292         * Consumer Advocates. This group focuses on addressing the interests and accessibility of
293   consumers and other individual end-user populations.

294           * U.S. Federal Government. This group focuses on the interests of the departments and agencies that
295   comprise the U.S. Federal Government. Under its various forms and component programs, the government acts
296   as an identity provider, attribute provider, and relying party. This group’s Management Council Delegate will be
297   responsible for advocating for the Federal Government as a Stakeholder; unlike the Vice-Chair who advocates
298   on behalf of the NSTIC itself.

299          * U.S. State, Local, Tribal, and Territorial Government. This group focuses on the interests of the
300   various state, local, tribal, and territorial governments that exist within the U.S.

301          * Research, Development & Innovation. This group focuses on research, teaching, and technology
302   development in support of the Identity Ecosystem.

303           * Identity & Attribute Providers. This group focuses on the processes and technologies associated
304   with establishing, managing, and securing digital identities and attributes.

305           * Interoperability. This group focuses on supporting interoperability within the Identity Ecosystem,
306   inclusive of Trust Framework Providers and standards development organizations.

307           * Information Technology (IT) Infrastructure. This group focuses on IT infrastructure relevant to the
308   functioning of the Identity Ecosystem, inclusive of different types of communications and network traffic, as well
309   as virtual and distributed functions that produce and provide hardware, software, and IT systems and services.

310         * Regulated Industries. This group focuses on industries covered by sector-specific regulations that
311   may be affected by the development of the Identity Ecosystem Framework.

312           * Small Business & Entrepreneurs. This group focuses on the impact of the development of the
313   Identity Ecosystem Framework on small businesses and individual business owners/operators.
314           * Security. This group focuses on IT security services that support the confidentiality, integrity, and
315   availability of identity solutions

316          * Relying Parties. This group focuses on transaction decisions based upon receipt, validation, and
317   acceptance of an entity’s authenticated credential(s) and identity attributes.

318          * Unaffiliated Individuals. This group consists of any individual who does not self-identify into one of
319   the other stakeholder groups.

320         The Steering Group shall periodically review the list of designated stakeholder groups to confirm that it
321   accurately reflects the broad array of Identity Ecosystem stakeholders and provides balanced representation for
322   all parties. The Steering Group may add, modify, remove, or otherwise alter the stakeholder groups as it deems
323   necessary [by amending the By-laws]. <**P: Rule hygiene.>

324   4. Secretariat.

325   The Secretariat shall serve as the administrative body of the Steering Group. In this role, the Secretariat shall
326   manage the internal operations of the Steering Group to include human and financial resources, meeting
327   coordination, communications, and material support and interaction with external organizations. The Secretariat
328   shall be responsible for maintaining transparency, openness, and alignment with the Guiding Principles in all
329   Steering Group operations. The Secretariat shall appoint an individual to act as the Identity Ecosystem’s
330   Ombudsman.

331   END OF DRAFT CHARTER

      PRODUCTION INFORMATION
      This is file "NSTICdraftCharterAugust2012comments.pdf". There is a related ASCII document "NSTICdraftCharterFebruary2012.txt"

      The normative February 2012 NIST Draft Charter (PDF) is here: http://www.nist.gov/nstic/reports/SG_Draft_Charter.pdf
      Mirrored Charter, with internal cites (HTML) is found here: http://j.mp/NSTICchtr

      The source text for this document and its ASCII sistyer version is the www.nstic.us mirror of NIST's draft Charter. This text reflects the
      original February 2012 draft's substantive content, but is marked [like this to show change proposals]. The ASCII text was cleaned up
      as to format, but not content, to allow for editing and regular-expression searches.
                                                                                                                   jamie.clark@oasis-open.org



332   PROPOSED AMENDMENTS REFLECTED IN THIS DOCUMENT
333   General comment: The proposed rules should allow reconsideration of these issues, in six months. These proposals
334   distinguish the few changes that may be immediately advisable. Only the three "IMMEDIATE" proposals are reflected in
335   the ASCII version of this document. Where possible, proposed amendments are located in the Bylaws, not the Charter,
336   which should only be the place for overriding general principles.

337   Types of amendments:
338     IMMEDIATE: (3): I, N, O.
339     Typos (10): A, B, C, D, E, F, G, H, K. L.
340     Rule hygiene / logic (4): J, M, O, P.
341     Overcentralization (2): I, N.

342   A. Class of amendment: Typo. Later.
343   Place: Line 15. Section 1.
344   Edit: Add "p." in footnote 1 before the page number "1".
345   Reason: Use same page number format as in rest of footnotes.
346   B. Class of amendment: Typo. Later.
347   Place: Line 109. Section 1.3, second bullet point.
348   Edit: Add period to end of last sentence.
349   Reason: Punctuation.

350   C. Class of amendment: Typo. Later.
351   Place: Line 120. Section 1.3, fourth bullet point.
352   Edit: Add "pp." in NIST's footnote 5 before the number "25."
353   Reason: Use same page number format as in rest of footnotes.

354   D. Class of amendment: Typo. Later.
355   Place: Line 124. Section 1.4.1.
356   Edit: Change "publically" to "publicly."
357   Reason: Use same spelling for word throughout document. (Compare to line 127.)

358   E. Class of amendment: Typo. Later.
359   Place: Line 163. Section 1.7.
360   Edit: Delete second period at end of last sentence.
361   Reason: Grammar.

362   F. Class of amendment: Typo. Later.
363   Place: Line 167. Section 1.7.1.
364   Edit: Delete second period at end of last sentence.
365   Reason: Grammar.

366   G. Class of amendment: Numbering typo. Later.
367   Place: Line 177. Section 2.1.1.
368   Edit: Renumber as "2.1".
369   Reason: Section numbers are incorrectly sequenced.

370   H. Class of amendment: Numbering typo. Later.
371   Place: Line 181. Section 2.1.2.
372   Edit: Renumber as "2.2".
373   Reason: Section numbers are incorrectly sequenced.

374   I. Class of amendment: IMMEDIATE; Overcentralization.
375   Place: Line 183. Section 2.1.2.
376   Edit: Add "circulated for comment to the Plenary and then" before the words "approved by the Management
377   Council".
378   Reason: NIST's draft gives too much unchecked power to the 14-voter Management Council to override the
379   entire membership. In this case, charters and charter changes should be seen by the members before approval.

380   J. Class of amendment: Rule hygiene. Later.
381   Place: Line 186. Section 2.1.2.
382   Edit: Add "by modifying the participation and voting rights in a Standing Committee's charter, subject to Section
383   1.4.1" after the words "on the Standing Committees".
384   Reason: When ground rules (like participant balance) are changed, they should be documented somewhere
385   clearly, like the committee's charter, not made as a one-off fiat.

386   K. Class of amendment: Numbering typo. Later.
387   Place: Line 213. Section 2.1.3.
388   Edit: Renumber as "2.3".
389   Reason: Section numbers are incorrectly sequenced.
390   L. Class of amendment: Typo. Later.
391   Place: Line 233. Section 2.1.3, third bullet point.
392   Edit: Decapitalize the word "Responsible".
393   Reason: Grammar. Not a defined term.

394   M. Class of amendment: Rule hygiene. Later.
395   Place: Line 241. Section 3.
396   Edit: Delete the words "stakeholder group delegates elected to the".
397   Reason: Corrects ambiguity. This should not change the intended meaning, but makes it clear that the
398   Management Council acts here, not a subset of it. The deleted words might be misread to suggest that the 14
399   stakeholder-class delegates vote, but the two at-large members do not, on this topic.

400   N. Class of amendment: IMMEDIATE. Overcentralization.
401   Place: Line 243. Section 3.
402   Edit: Delete the last sentence.
403   Reason: The allocation of powers of the Management Council versus the committees or Plenary should be
404   specifically described. This one-sentence rule that the MC is final authority over everything may undermine or
405   contradict other rules. (For example, it might be read as a veto of the review power of the Privacy Standing
406   Committee, at line 201-03.) It also encourages stakeholders to focus all their work and lobbying on a relatively
407   small, elite panel. This might be re-visited in six months, but is too much power to take away from the rest of the
408   Steering Group at the outset, if stakeholders are to take their committee and Plenary participation seriously.

409   O. Class of amendment: IMMEDIATE. Rule hygiene.
410   Place: Line 273. Section 3.2.
411   Edit: Delete the words "during its initial meetings".
412   Reason: Corrects ambiguity. The change makes it clear that Bylaws can be changed. The deleted words might
413   be misread to suggest that the original Bylaws, regardless of later changes, govern this topic.

414   P. Class of amendment: Rule hygiene. Later.
415   Place: Line 322. Section 3.2.2.
416   Edit: Add the words "by amending the By-laws" at the end of the last sentence.
417   Reason: When ground rules (like stakeholder classes) are changed, they should be documented somewhere
418   clearly, like the By-laws. Otherwise it is not clear how a change would be made. This is significant, because the
419   balance in NIST's suggested 14 classes may be the subject of proposed amendments later.

Contenu connexe

En vedette

Scentsy Fall/Winter 2014 Catalog
Scentsy Fall/Winter 2014 CatalogScentsy Fall/Winter 2014 Catalog
Scentsy Fall/Winter 2014 Catalogdaton3gurl
 
NSTIC draft charter february 2012
NSTIC draft charter february 2012NSTIC draft charter february 2012
NSTIC draft charter february 2012Jamie Clark
 
NSTIC draft bylaws july 2012
NSTIC draft bylaws july 2012NSTIC draft bylaws july 2012
NSTIC draft bylaws july 2012Jamie Clark
 
Sen TíTulo 1
Sen TíTulo 1Sen TíTulo 1
Sen TíTulo 1iesaguia
 
Acknowledge 01 Voorstelling Ibbt André De Vleeschouwer
Acknowledge 01 Voorstelling Ibbt André De VleeschouwerAcknowledge 01 Voorstelling Ibbt André De Vleeschouwer
Acknowledge 01 Voorstelling Ibbt André De Vleeschouwerimec.archive
 
Lucía folclore-galego
Lucía folclore-galegoLucía folclore-galego
Lucía folclore-galegoiesaguia
 
Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Jamie Clark
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Im3 06 Telemonitoring, Uitdagingen Voor De Gezondheidszorg Jo De Cock
Im3 06 Telemonitoring, Uitdagingen Voor De Gezondheidszorg  Jo De CockIm3 06 Telemonitoring, Uitdagingen Voor De Gezondheidszorg  Jo De Cock
Im3 06 Telemonitoring, Uitdagingen Voor De Gezondheidszorg Jo De Cockimec.archive
 
Dirk Van Den Wouwer - Track
Dirk Van Den Wouwer - TrackDirk Van Den Wouwer - Track
Dirk Van Den Wouwer - Trackimec.archive
 
Rdc Listing Presentation 081909 R3
Rdc Listing Presentation 081909 R3Rdc Listing Presentation 081909 R3
Rdc Listing Presentation 081909 R3cjharrington
 
Gebruikerstest lab demonstrator - Jan-Henk Annema (IBBT-CUO-K.U.Leuven)
Gebruikerstest lab demonstrator - Jan-Henk Annema (IBBT-CUO-K.U.Leuven)Gebruikerstest lab demonstrator - Jan-Henk Annema (IBBT-CUO-K.U.Leuven)
Gebruikerstest lab demonstrator - Jan-Henk Annema (IBBT-CUO-K.U.Leuven)imec.archive
 
Maduf12 Summary And Conclusions Andre De Vleeschouwer
Maduf12 Summary And Conclusions   Andre De VleeschouwerMaduf12 Summary And Conclusions   Andre De Vleeschouwer
Maduf12 Summary And Conclusions Andre De Vleeschouwerimec.archive
 
Clark : Global process, local needs
Clark : Global process, local needsClark : Global process, local needs
Clark : Global process, local needsJamie Clark
 
Tr@Ins1 Introduction To The Tr@Ins Project Ingrid Moerman
Tr@Ins1 Introduction To The Tr@Ins Project   Ingrid MoermanTr@Ins1 Introduction To The Tr@Ins Project   Ingrid Moerman
Tr@Ins1 Introduction To The Tr@Ins Project Ingrid Moermanimec.archive
 
La industrialización como estrategia de crecimiento
La industrialización como estrategia de crecimientoLa industrialización como estrategia de crecimiento
La industrialización como estrategia de crecimientoIvie
 
Brokerage 2007 performatie evaluatie
Brokerage 2007 performatie evaluatieBrokerage 2007 performatie evaluatie
Brokerage 2007 performatie evaluatieimec.archive
 
Moisés paisaxes-galego
Moisés paisaxes-galegoMoisés paisaxes-galego
Moisés paisaxes-galegoiesaguia
 

En vedette (20)

Ferias Em Africa 2
Ferias Em Africa 2Ferias Em Africa 2
Ferias Em Africa 2
 
Scentsy Fall/Winter 2014 Catalog
Scentsy Fall/Winter 2014 CatalogScentsy Fall/Winter 2014 Catalog
Scentsy Fall/Winter 2014 Catalog
 
NSTIC draft charter february 2012
NSTIC draft charter february 2012NSTIC draft charter february 2012
NSTIC draft charter february 2012
 
NSTIC draft bylaws july 2012
NSTIC draft bylaws july 2012NSTIC draft bylaws july 2012
NSTIC draft bylaws july 2012
 
Sen TíTulo 1
Sen TíTulo 1Sen TíTulo 1
Sen TíTulo 1
 
Acknowledge 01 Voorstelling Ibbt André De Vleeschouwer
Acknowledge 01 Voorstelling Ibbt André De VleeschouwerAcknowledge 01 Voorstelling Ibbt André De Vleeschouwer
Acknowledge 01 Voorstelling Ibbt André De Vleeschouwer
 
Lucía folclore-galego
Lucía folclore-galegoLucía folclore-galego
Lucía folclore-galego
 
Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Im3 06 Telemonitoring, Uitdagingen Voor De Gezondheidszorg Jo De Cock
Im3 06 Telemonitoring, Uitdagingen Voor De Gezondheidszorg  Jo De CockIm3 06 Telemonitoring, Uitdagingen Voor De Gezondheidszorg  Jo De Cock
Im3 06 Telemonitoring, Uitdagingen Voor De Gezondheidszorg Jo De Cock
 
Dirk Van Den Wouwer - Track
Dirk Van Den Wouwer - TrackDirk Van Den Wouwer - Track
Dirk Van Den Wouwer - Track
 
Rdc Listing Presentation 081909 R3
Rdc Listing Presentation 081909 R3Rdc Listing Presentation 081909 R3
Rdc Listing Presentation 081909 R3
 
GROUP5-SYLLABLES
GROUP5-SYLLABLESGROUP5-SYLLABLES
GROUP5-SYLLABLES
 
Gebruikerstest lab demonstrator - Jan-Henk Annema (IBBT-CUO-K.U.Leuven)
Gebruikerstest lab demonstrator - Jan-Henk Annema (IBBT-CUO-K.U.Leuven)Gebruikerstest lab demonstrator - Jan-Henk Annema (IBBT-CUO-K.U.Leuven)
Gebruikerstest lab demonstrator - Jan-Henk Annema (IBBT-CUO-K.U.Leuven)
 
Maduf12 Summary And Conclusions Andre De Vleeschouwer
Maduf12 Summary And Conclusions   Andre De VleeschouwerMaduf12 Summary And Conclusions   Andre De Vleeschouwer
Maduf12 Summary And Conclusions Andre De Vleeschouwer
 
Clark : Global process, local needs
Clark : Global process, local needsClark : Global process, local needs
Clark : Global process, local needs
 
Tr@Ins1 Introduction To The Tr@Ins Project Ingrid Moerman
Tr@Ins1 Introduction To The Tr@Ins Project   Ingrid MoermanTr@Ins1 Introduction To The Tr@Ins Project   Ingrid Moerman
Tr@Ins1 Introduction To The Tr@Ins Project Ingrid Moerman
 
La industrialización como estrategia de crecimiento
La industrialización como estrategia de crecimientoLa industrialización como estrategia de crecimiento
La industrialización como estrategia de crecimiento
 
Brokerage 2007 performatie evaluatie
Brokerage 2007 performatie evaluatieBrokerage 2007 performatie evaluatie
Brokerage 2007 performatie evaluatie
 
Moisés paisaxes-galego
Moisés paisaxes-galegoMoisés paisaxes-galego
Moisés paisaxes-galego
 

Similaire à NSTIC draft charter August 2012 w comments

Assignment You will conduct a systems analysis project by .docx
Assignment  You will conduct a systems analysis project by .docxAssignment  You will conduct a systems analysis project by .docx
Assignment You will conduct a systems analysis project by .docxfestockton
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
CA Self Regulation
CA Self RegulationCA Self Regulation
CA Self RegulationCASCouncil
 
04_a_CEPEJ(2021)5 EN - CEPEJ roadmap certification AI (1).docx
04_a_CEPEJ(2021)5 EN - CEPEJ roadmap certification AI (1).docx04_a_CEPEJ(2021)5 EN - CEPEJ roadmap certification AI (1).docx
04_a_CEPEJ(2021)5 EN - CEPEJ roadmap certification AI (1).docxPetruVrlan
 
McShibboleth Presentation
McShibboleth PresentationMcShibboleth Presentation
McShibboleth PresentationJISC.AM
 
BS8878 Web Accessibility Code of Practice
BS8878 Web Accessibility Code of PracticeBS8878 Web Accessibility Code of Practice
BS8878 Web Accessibility Code of PracticeNomensa
 
DACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdfDACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdfDNUG e.V.
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...Duane Blackburn
 
TFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationTFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationColorado Internet Society (CO ISOC)
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
ISO 29110 Software Quality Model For Software SMEs
ISO 29110 Software Quality Model For Software SMEsISO 29110 Software Quality Model For Software SMEs
ISO 29110 Software Quality Model For Software SMEsMoutasm Tamimi
 
Nintex Workflow for Sharepoint - Return on Investment Whitepaper by Forrester...
Nintex Workflow for Sharepoint - Return on Investment Whitepaper by Forrester...Nintex Workflow for Sharepoint - Return on Investment Whitepaper by Forrester...
Nintex Workflow for Sharepoint - Return on Investment Whitepaper by Forrester...David J Rosenthal
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONacijjournal
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONacijjournal
 

Similaire à NSTIC draft charter August 2012 w comments (20)

12 Best Privacy Frameworks
12 Best Privacy Frameworks12 Best Privacy Frameworks
12 Best Privacy Frameworks
 
Erp Implementation
Erp ImplementationErp Implementation
Erp Implementation
 
Assignment You will conduct a systems analysis project by .docx
Assignment  You will conduct a systems analysis project by .docxAssignment  You will conduct a systems analysis project by .docx
Assignment You will conduct a systems analysis project by .docx
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
CA Self Regulation
CA Self RegulationCA Self Regulation
CA Self Regulation
 
04_a_CEPEJ(2021)5 EN - CEPEJ roadmap certification AI (1).docx
04_a_CEPEJ(2021)5 EN - CEPEJ roadmap certification AI (1).docx04_a_CEPEJ(2021)5 EN - CEPEJ roadmap certification AI (1).docx
04_a_CEPEJ(2021)5 EN - CEPEJ roadmap certification AI (1).docx
 
McShibboleth Presentation
McShibboleth PresentationMcShibboleth Presentation
McShibboleth Presentation
 
BS8878 Web Accessibility Code of Practice
BS8878 Web Accessibility Code of PracticeBS8878 Web Accessibility Code of Practice
BS8878 Web Accessibility Code of Practice
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
DACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdfDACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdf
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
TFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationTFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & Operationalization
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
ISO 29110 Software Quality Model For Software SMEs
ISO 29110 Software Quality Model For Software SMEsISO 29110 Software Quality Model For Software SMEs
ISO 29110 Software Quality Model For Software SMEs
 
Nintex Workflow for Sharepoint - Return on Investment Whitepaper by Forrester...
Nintex Workflow for Sharepoint - Return on Investment Whitepaper by Forrester...Nintex Workflow for Sharepoint - Return on Investment Whitepaper by Forrester...
Nintex Workflow for Sharepoint - Return on Investment Whitepaper by Forrester...
 
Nick Milton - APM Knowledge SIG Conference 2018
Nick Milton - APM Knowledge SIG Conference 2018 Nick Milton - APM Knowledge SIG Conference 2018
Nick Milton - APM Knowledge SIG Conference 2018
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
 
20180430 csirt eng
20180430 csirt eng20180430 csirt eng
20180430 csirt eng
 
India Blockchain Strategy
India Blockchain StrategyIndia Blockchain Strategy
India Blockchain Strategy
 

Plus de Jamie Clark

OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...Jamie Clark
 
Complementary trust: IDEF Registry and Kantara cross-attestation
Complementary trust: IDEF Registry and Kantara cross-attestationComplementary trust: IDEF Registry and Kantara cross-attestation
Complementary trust: IDEF Registry and Kantara cross-attestationJamie Clark
 
Briefing on OASIS XLIFF OMOS TC 20160121
Briefing on OASIS XLIFF OMOS TC 20160121Briefing on OASIS XLIFF OMOS TC 20160121
Briefing on OASIS XLIFF OMOS TC 20160121Jamie Clark
 
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)Jamie Clark
 
OASIS: open source and open standards: internet of things
OASIS: open source and open standards: internet of thingsOASIS: open source and open standards: internet of things
OASIS: open source and open standards: internet of thingsJamie Clark
 
NSTIC draft bylaws August 2012 w comments
NSTIC draft bylaws August 2012 w commentsNSTIC draft bylaws August 2012 w comments
NSTIC draft bylaws August 2012 w commentsJamie Clark
 
Beijing MoST standards + IPR conference Clark-OASIS-2011
Beijing MoST standards + IPR conference Clark-OASIS-2011Beijing MoST standards + IPR conference Clark-OASIS-2011
Beijing MoST standards + IPR conference Clark-OASIS-2011Jamie Clark
 
Abbie Barbir ITU IIW-update
Abbie Barbir ITU IIW-updateAbbie Barbir ITU IIW-update
Abbie Barbir ITU IIW-updateJamie Clark
 
Cathy Medich SC system standards
Cathy Medich SC system standardsCathy Medich SC system standards
Cathy Medich SC system standardsJamie Clark
 
Oasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialOasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialJamie Clark
 
EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831Jamie Clark
 
Standards brainstorming: NSTIC/IIW13
Standards brainstorming: NSTIC/IIW13Standards brainstorming: NSTIC/IIW13
Standards brainstorming: NSTIC/IIW13Jamie Clark
 
CESI SOA Standards Conference Beijing 2010
CESI SOA Standards Conference Beijing 2010 CESI SOA Standards Conference Beijing 2010
CESI SOA Standards Conference Beijing 2010 Jamie Clark
 
LISA OASIS-feb2011
LISA OASIS-feb2011LISA OASIS-feb2011
LISA OASIS-feb2011Jamie Clark
 
Potential OASIS Geothermal Energy standards project
Potential OASIS Geothermal Energy standards projectPotential OASIS Geothermal Energy standards project
Potential OASIS Geothermal Energy standards projectJamie Clark
 
Open source eu-ict-ipr-clark-2010final
Open source eu-ict-ipr-clark-2010finalOpen source eu-ict-ipr-clark-2010final
Open source eu-ict-ipr-clark-2010finalJamie Clark
 

Plus de Jamie Clark (16)

OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
OASIS at ITU/NGMN: Convergence, Collaboration and Smart Shopping in Open Stan...
 
Complementary trust: IDEF Registry and Kantara cross-attestation
Complementary trust: IDEF Registry and Kantara cross-attestationComplementary trust: IDEF Registry and Kantara cross-attestation
Complementary trust: IDEF Registry and Kantara cross-attestation
 
Briefing on OASIS XLIFF OMOS TC 20160121
Briefing on OASIS XLIFF OMOS TC 20160121Briefing on OASIS XLIFF OMOS TC 20160121
Briefing on OASIS XLIFF OMOS TC 20160121
 
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
PM-ISE SCC statement to DHS on Cyber ISAO executive order 13691 (unofficial)
 
OASIS: open source and open standards: internet of things
OASIS: open source and open standards: internet of thingsOASIS: open source and open standards: internet of things
OASIS: open source and open standards: internet of things
 
NSTIC draft bylaws August 2012 w comments
NSTIC draft bylaws August 2012 w commentsNSTIC draft bylaws August 2012 w comments
NSTIC draft bylaws August 2012 w comments
 
Beijing MoST standards + IPR conference Clark-OASIS-2011
Beijing MoST standards + IPR conference Clark-OASIS-2011Beijing MoST standards + IPR conference Clark-OASIS-2011
Beijing MoST standards + IPR conference Clark-OASIS-2011
 
Abbie Barbir ITU IIW-update
Abbie Barbir ITU IIW-updateAbbie Barbir ITU IIW-update
Abbie Barbir ITU IIW-update
 
Cathy Medich SC system standards
Cathy Medich SC system standardsCathy Medich SC system standards
Cathy Medich SC system standards
 
Oasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialOasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficial
 
EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831
 
Standards brainstorming: NSTIC/IIW13
Standards brainstorming: NSTIC/IIW13Standards brainstorming: NSTIC/IIW13
Standards brainstorming: NSTIC/IIW13
 
CESI SOA Standards Conference Beijing 2010
CESI SOA Standards Conference Beijing 2010 CESI SOA Standards Conference Beijing 2010
CESI SOA Standards Conference Beijing 2010
 
LISA OASIS-feb2011
LISA OASIS-feb2011LISA OASIS-feb2011
LISA OASIS-feb2011
 
Potential OASIS Geothermal Energy standards project
Potential OASIS Geothermal Energy standards projectPotential OASIS Geothermal Energy standards project
Potential OASIS Geothermal Energy standards project
 
Open source eu-ict-ipr-clark-2010final
Open source eu-ict-ipr-clark-2010finalOpen source eu-ict-ipr-clark-2010final
Open source eu-ict-ipr-clark-2010final
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

NSTIC draft charter August 2012 w comments

  • 1. NSTIC STEERING GROUP: NIST February 2012 DRAFT CHARTER with AUGUST 2012 JBC EDITS Type-set version with line numbers, and proposed corrections and comments. Note, this analysis has multiple annotations and amendments that may not be needed at the initial Steering Group meetings. For a simpler version, see the ASCII file "NSTICdraftCharterFebruary2012.txt" at Slideshare (http://www.slideshare.net/JamieXML/nstic-draft-bylaws-july-2012) or Google Docs: (http://j.mp/MVwfNC) See end of document for production information. • [Square brackets] and struckthrough text indicate proposed changes. Amendments listed at end of document. • <Angle brackets> include this editor's unofficial cross-references, and <**type of amendment>. • {Curly brackets} indicate original NIST footnotes, with added hyperlinks and some abbreviations. 1 RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP 2 1. Identity Ecosystem Steering Group Charter. 3 The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President Obama in 4 April 2011, acknowledges and addresses a major weakness in cyberspace – a lack of confidence and assurance 5 that people, organizations, and businesses are who they say they are online. {NIST fn1: The full Strategy can 6 be found at: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf.} Additionally, 7 in the current online environment, individuals are asked to maintain dozens of different usernames and 8 passwords, one for each website with which they interact. The complexity of this approach is a burden to 9 individuals, and it encourages behavior – such as the reuse of passwords – that makes online fraud and identity 10 theft easier. At the same time, online businesses are faced with ever-increasing costs for managing customer 11 accounts, the consequences of online fraud, and the loss of business that results from individuals’ unwillingness 12 to create yet another account. Moreover, both businesses and governments are unable to offer many services 13 online, because they cannot effectively identify the individuals with whom they interact. Spoofed websites, stolen 14 passwords, and compromised accounts are all symptoms of inadequate authentication mechanisms. {NIST fn2: 15 Strategy, April 2011, [p.] 1.} <**A: Typo.> 16 The Identity Ecosystem envisioned in the NSTIC is an online environment that will enable people to validate their 17 identities securely, but with minimized disclosure of personal information when they are conducting transactions. 18 The vibrant marketplace created by the Identity Ecosystem will provide people with choices among multiple 19 accredited identity providers, both private and public, and choices among multiple credentials. For example, 20 imagine that a student could get a digital credential from her cell phone provider and another one from her 21 university and use either of them to log-in to her bank’s website, her e-mail, three social networking sites, four 22 online commerce sites, and so on, all without having to remember dozens of passwords. The added 23 convenience, security, and privacy provided within the Identity Ecosystem will allow additional services to be put 24 online to drive greater economic growth. Notwithstanding the objective to improve identification and 25 authentication in cyberspace for certain types of transactions, not all Internet activities have such needs. Thus, 26 the capacity for anonymity and pseudonymity will be maintained in the envisioned Identity Ecosystem. 27 A core tenet of the NSTIC is that its implementation must be led by the private sector. The NSTIC calls for the 28 Federal Government to work collaboratively with the private sector, advocacy groups, public sector agencies, 29 and other organizations to improve the processes by which online transactions are conducted. The Strategy 30 itself was developed with substantial input from both the private sector and the American public. The National 31 Institute of Standards and Technology (NIST), which has been designated to establish a National Program Office 32 to lead the implementation of the NSTIC, recognizes that a strong and vibrant public-private partnership is 33 necessary to execute the Strategy’s vision in a way that supports the wide range of interactions that occur over 34 the Internet. As such, NIST is leading the effort to fulfill the NSTIC’s call for government to work in close 35 partnership with the private sector and other relevant stakeholder groups to, “(Establish a steering group to) 36 administer the process for policy and standards development for the Identity Ecosystem Framework in 37 accordance with the Guiding Principles in (the) Strategy. The steering group will also ensure that accreditation 38 authorities validate participants’ adherence to the requirements of the Identity Ecosystem Framework.” {NIST 39 fn3: Strategy, April 2011, p. 25.}
  • 2. 40 1.1. Mission. The Mission of the Steering Group shall be to govern and administer the Identity Ecosystem 41 Framework in a manner that stimulates the development and sustainability of the Identity Ecosystem. The 42 Steering Group will always operate in accordance with the NSTIC’s Guiding Principles. 43 1.1.1. Objectives. The activities and work products of the Steering Group shall be conducted in support 44 of the following objectives: 45 * Ensure that the Identity Ecosystem and Identity Ecosystem Framework conform to the four NSTIC 46 Guiding Principles (as detailed in section 1.3). 47 * Administer the process for policy and standards development and adoption for the Identity Ecosystem 48 Framework and, where necessary establish policies standards for the Identity Ecosystem Framework. 49 * Adopt and, where necessary, establish standards for the Identity Ecosystem Framework. 50 * Certify that accreditation authorities validate adherence to the requirements of the Identity Ecosystem 51 Framework. 52 1.1.2. Purpose. The purpose of the Steering Group shall be to develop and administer the process for 53 policy and technical standards development for the Identity Ecosystem Framework. The Steering Group shall 54 bring together all of the interested stakeholders, both in private and public sectors, to confirm that the Identity 55 Ecosystem Framework provides a minimum baseline of privacy, security, interoperability, and ease-of-use 56 through standards and policies, without creating unnecessary barriers to entry. The Steering Group shall 57 facilitate the fulfillment of the NSTIC goals to develop a comprehensive Identity Ecosystem Framework; build 58 and implement the Identity Ecosystem; enhance confidence and willingness to participate in the Identity 59 Ecosystem; and, support the long-term success and sustainability of the Identity Ecosystem. {NIST fn4: 60 Strategy, April 2011, p. 31.} ¶ The Steering Group shall not be a standards development body, but rather an 61 organization that promotes the development of standards and develops policies that serve to accelerate the 62 development and adoption of the Identity Ecosystem. 63 1.2. Scope of Activities. The activities of the Steering Group shall be limited to achievement of the 64 objectives listed in this charter. Additional activities that are not considered essential to completion of these 65 objectives may be conducted when determined appropriate through Steering Group consensus. The scope of 66 the Steering Group’s activities is summarized in the sections that follow. 67 1.2.1. Adopt and Establish Standards. The Steering Group shall establish forums and procedures to 68 review applicable standards and adopt those that support achievement of the NSTIC vision, conform to the 69 Guiding Principles, and meet other established requirements. Additionally, the Steering Group will recommend 70 standards be established when gaps are identified. The Steering Group shall advocate for standards to be 71 established and adopted in a timely manner and be sufficient to keep pace with emerging technology and market 72 trends. 73 1.2.2. Develop and Maintain Policies. The Steering Group shall establish the mechanisms necessary to 74 develop, implement, and maintain policies that are appropriate for use in the Identity Ecosystem and conform to 75 the NSTIC Guiding Principles. The Steering Group shall support the timely development and implementation of 76 policies. 77 1.2.3. Develop and Maintain Processes for the Accreditation of Identity Ecosystem Entities. The 78 Steering Group shall develop, foster, and implement a clear process for accrediting entities within the Identity 79 Ecosystem as well as develop clear testing and certification criteria by which adherence to the recommended 80 standards and policies may be measured. ¶ The Steering Group shall ensure that this accreditation process is 81 applied fairly to all Identity Ecosystem participants. 82 1.2.4. Develop and Maintain Identity Ecosystem Operating Procedures. The Steering Group shall 83 develop, administer, and maintain Identity Ecosystem Operating Procedures to facilitate interoperability between 84 and among the Identity Ecosystem participants. Operating Procedures refers to the set of policies and standards 85 created by the Steering Group as accepted baseline requirements for participating in the Identity Ecosystem 86 Framework.
  • 3. 87 1.3. Adherence to the NSTIC Guiding Principles. The Identity Ecosystem Steering Group, its components, 88 and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. 89 They are: 90 * Identity solutions will be privacy-enhancing and voluntary. The Identity Ecosystem will be 91 grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the 92 creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the 93 capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the 94 Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related 95 transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity 96 Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem 97 credential nor that companies require Identity Ecosystem credentials from consumers as the only means to 98 interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the 99 credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem 100 mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day 101 – or even a transaction-to-transaction – choice. 102 * Identity solutions will be secure and resilient. Identity solutions within the Identity Ecosystem will 103 provide secure and reliable methods of electronic authentication by being grounded in technology and security 104 standards that are open and collaboratively developed with auditable security processes. Credentials within the 105 Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices; 106 resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the 107 necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely 108 restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be 109 capable of adapting to the dynamic nature of technology[.] <**B: Typo> 110 * Identity solutions will be interoperable. Interoperability encourages and enables service providers to 111 accept a wide variety of credentials and enables users to take advantage of different credentials to assert their 112 identity online. Two types of interoperability are recognized in the Identity Ecosystem: there will be standardized, 113 reliable credentials and identity media in widespread use in both the public and private sectors; and if an 114 individual, device, or system presents a valid and appropriate credential, any qualified relying party is capable of 115 accepting and verifying the credential as proof of identity and attributes. 116 * Identity solutions will be cost-effective and easy to use. The Identity Ecosystem will promote 117 identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of 118 service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and 119 relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and 120 enabled by technology that requires minimal user training. {NIST fn5: Strategy, April 2011, [pp.] 25, 11-14.} 121 <**Typo.> 122 1.4. Operating Principles. The Steering Group shall adhere to the following four operating principles. 123 1.4.1. Openness and Transparency. The work of the Steering Group, including all working groups and 124 committees, shall facilitate broad participation and be publiclypublically accessible. <**D: Typo.> The Identity 125 Ecosystem Steering Group shall take the following steps to provide openness and transparency in all its 126 proceedings: 127 * All documents, drafts, and minutes of meetings shall be posted on a publicly available Internet site. 128 * All meetings of all governing bodies shall be open to public attendance and leverage virtual 129 attendance options to maximize broad and public participation. 130 * Technologies should be leveraged to create user-friendly and broad avenues for participation in all 131 proceedings and administrative functions. 132 1.4.2. Balance. The Steering Group shall strive to achieve balanced representation among all 133 stakeholder groups regardless of their size, financial status, or sector alignment/affiliation.
  • 4. 134 1.4.3. Consensus. Consensus – general agreement among members – shall be a core value of the 135 Steering Group. All processes instituted by the Steering Group shall require participants to consider all views, 136 proposals and objections, and endeavor to reconcile them. Although positions of leadership, such as committee 137 chairs, are likely to serve as the primary drivers of consensus, all Steering Group participants must be 138 (1) cooperative in the consensus process; (2) constructive; and (3) respectful when providing feedback or 139 dissenting opinions. In the event that consensus cannot be reached, voting, by an established method, shall be 140 used to make Steering Group decisions. 141 1.4.4. Harmonization. The Steering Group shall encourage harmonization of standards and policies and 142 shall always strive to recognize the impacts of policy and standards on all stakeholders in the Identity 143 Ecosystem. 144 1.5. Membership. Membership in the Steering Group shall be open to organizations and unaffiliated 145 individuals (Members) that have an interest in the development of the Identity Ecosystem. A Member 146 organization may have more than one individual within its organization participate in Steering Group activities; 147 however, it shall designate only one individual as its representative for the purposes of voting in Plenary 148 proceedings. ¶ A Member shall join as a Participating or Observer Member as defined below: 149 * Participating Members. Participating Members are those stakeholders who actively participate in the 150 Steering Group and the work of the Plenary, its Standing Committees, and Working Groups. The criteria for 151 active participation such as attendance quotas or other measurable conduct shall be defined in the By-laws. 152 Participating Members shall have a vote in all Plenary proceedings. 153 * Observing Members. Observing Members are those stakeholders who do not meet the criteria for 154 active participation, but want to maintain a presence in the Steering Group. Observing Members may still 155 contribute to the work of the Plenary, its Standing Committees, and Working Groups, but they shall not be 156 permitted to vote in Plenary proceedings. 157 1.6. Organizational Structure. The Steering Group shall be composed of two bodies: the Identity 158 Ecosystem Plenary and the Identity Ecosystem Management Council. The Plenary and the Management Council 159 shall be collectively responsible for achieving the Steering Groups objectives. 160 1.7. Establishment. The NSTIC, which was signed by President Obama in April 2011, called for the 161 establishment of a private sector-led steering group to administer the development and adoption of the Identity 162 Ecosystem Framework. The Steering Group receives its authority to operate from the active participation of its 163 membership. . <**E; Typo.> 164 1.7.1. Resources and Duration. The Steering Group shall be initiated with the support of NIST. 165 Following the initiation period, the Steering Group will transition to a self-sustaining organization. The 166 Management Council shall be responsible for managing the Steering Group’s resources and procuring services 167 once the Steering Group is self-sustaining, as necessary.. <**F: Typo.> 168 2. Identity Ecosystem Plenary. 169 Participation in the Plenary shall be open to all Members. The primary responsibilities of the Plenary shall be to 170 review and recommend technical standards for adoption establish and maintain the procedures/policies that 171 govern the Identity Ecosystem, develop, and establish accountability measures to promote broad adherence to 172 these procedures, and facilitate the ongoing operation of the Steering Group. The Plenary will consist of 173 Standing Committees, Working Groups, and individual members. The Participating Members (as defined in 174 section 1.5 and in associated By-laws) of the Plenary shall be responsible for voting on recommendations 175 provided by the Standing Committees and Working Groups and will participate in elections for Management 176 Council Delegates, Management Council Officers, and the Plenary Chair. 177 [2.1.] 2.1.1. The Plenary Chair. <**G: Numbering typo.> The Plenary shall be headed by the Plenary Chair. 178 The Chair shall be responsible for directing the actions, managing the votes, and providing general leadership to 179 the Plenary. Nominees for this position shall be approved by the Nominations Committee and selected by simple 180 majority vote of the Participating Members that comprise the Plenary.
  • 5. 181 [2.2.] 2.1.2. Plenary Standing Committees. <**H: Numbering typo.> Standing Committees shall be 182 responsible for addressing and coordinating ongoing/permanent issues. Standing Committees shall produce 183 their own charters and voting procedures which shall be [circulated for comment to the Plenary and then] 184 approved by the Management Council. <**I: Overcentralization.> Additional measures may be taken by the 185 Management Council to provide balanced and experienced representation on the Standing Committees [by 186 modifying the participation and voting rights in a Standing Committee's charter, subject to Section 1.4.1]. 187 <**J: Rule hygiene.> All recommendations proposed by the Committees shall be reviewed and approved by the 188 Privacy Standing Committee prior to submission to the Plenary for approval. ¶ The designated Standing 189 Committees shall be: 190 * Policy Coordination Committee. The Policy Coordination Committee is responsible for coordinating 191 policies to facilitate and promote the establishment of the Identity Ecosystem and the rules for participation. 192 <** See sec. 1.2.1.> 193 * Standards Coordination Committee. The Standards Coordination Committee is responsible for 194 coordinating, reviewing, and recommending the adoption of technical standards to facilitate interoperability within 195 the Identity Ecosystem. <** See sec. 1.2.2.> 196 * Accreditation Coordination Committee. The Accreditation Coordination Committee is responsible for 197 coordinating accreditation requirements for Identity Ecosystem participants. <** See secs. 1.2.1 and 1.3 (third 198 bullet).> 199 * Privacy Coordination Committee. The Privacy Coordination Committee is responsible for seeing that 200 other Committees’ and Working Groups’ work products adhere to the Privacy-enhancing and Voluntary Guiding 201 Principle. To that end, this group should have a “gatekeeper” function; meaning no recommendations on policies, 202 standards or other work products should be reviewed or approved by the Plenary unless first approved by the 203 Privacy Coordination Committee. This committee should be staffed by individuals with extensive experience in 204 the privacy field, and comprising a balance of viewpoints across a spectrum of experience, including advocacy 205 organizations and the private sector. <** See sec. 1.3 (first bullet).> 206 * Nominations Committee. The Nominations Committee is responsible for evaluating candidate 207 qualifications to serve as the Chair on the Plenary and Management Council or as a Delegate (Stakeholder 208 group and At-Large). Selection criteria outlined in this Charter will enable the selection of persons that can work 209 for the welfare of the Identity Ecosystem as a whole, while minimizing self-interested conduct that could hinder 210 the effectiveness and legitimacy of the Steering Group. 211 The Management Council may establish more Standing Committees as necessary to accomplish the work of 212 the Steering Group. 213 2.3. 2.1.3. Plenary Working Groups. <**K: Numbering typo.> Members shall establish domain expert 214 Working Groups as necessary to accomplish the work of the Steering Group. Working Groups may be proposed 215 by the Plenary or the Management Council and shall be officially established by the Management Council. 216 Participation in and meetings of the Plenary Working Groups shall be open to Participating and Observing 217 Members; however, only Participating Members may vote on work products and recommendations. ¶ Working 218 Groups shall produce their own charters and voting procedures which shall be approved by the Management 219 Council. Based on their work, Working Groups may propose recommendations and work products for 220 consideration by the Plenary. All recommendations proposed by the Working Groups shall be reviewed and 221 approved by the Privacy Standing Committee prior to submission to the Plenary for approval. ¶ The following 222 Working Groups shall be established by the Plenary and Management Council: 223 * Usability and Accessibility Working Group. This working group is responsible for evaluating 224 technologies and identity solutions within the Identity Ecosystem to confirm that they are easy-to-use and 225 accessible for all potential users, in accordance with the NSTIC Guiding Principles. <** See sec. 1.3 (fourth 226 bullet).> 227 * Security Working Group. This working group is responsible for evaluating technologies and identity 228 solutions within the Identity Ecosystem to confirm that they meet applicable requirements for confidentiality, 229 integrity, and availability, and are capable of timely restoration after any disruption. The work of this group should
  • 6. 230 be conducted in accordance with the NSTIC Guiding Principle for the security and resilience of identity solutions 231 <** See sec. 1.3 (second bullet).> 232 * International Coordination Working Group. This working group is rResponsible for reviewing and, 233 where appropriate, coordinating alignment with similar international identity standards and policies. 234 <**L: Typo.> 235 Additional Working Groups may be established by the Management Council or the Plenary as necessary to 236 accomplish the work of the Steering Group. 237 3. Identity Ecosystem Management Council. 238 The Management Council Management Council shall provide guidance to the Plenary on the broad objectives 239 envisioned by the Strategy; produce workplans to prioritize work items and monitor progress; procure necessary 240 resources; and ensure that Steering Group work activities align with the NSTIC Guiding Principles and Goals. 241 All recommendations from the Plenary Working Groups and Standing Committees shall be voted on by the 242 stakeholder group delegates elected to the Management Council. <**M: Rule hygiene.> The voting process will 243 be structured and defined in the Steering Group By-laws established during the initial meeting of the Steering 244 Group. The Management Council shall also be the final ratification authority in the Steering Group. 245 <**N: Overcentralization.> 246 3.1. Management Council Composition. The Management Council shall be composed of 14 delegates, 247 who are elected from the stakeholder groups and two at-large delegates. The Management Council may include 248 additional stakeholder groups at any time as necessary. ¶ In addition to Management Council Delegates, the 249 Management Council shall have three (3) officers: 250 * The Chair: This position shall provide general leadership to the Management Council; oversee votes, 251 and direct meetings of the Management Council. The Chair shall be a non-voting officer. 252 * The Vice-Chair: This position shall assist the Steering Group in maintaining alignment with NSTIC 253 objectives and the NSTIC Guiding Principles. The Vice-Chair shall be a non-voting officer. 254 * The Ombudsman: This position shall be responsible for upholding the NSTIC Guiding Principles and 255 Steering Group charter, representing and advocating for consumers or other individuals and underrepresented 256 groups, safeguarding against individual stakeholder groups exerting excessive influence, monitoring and 257 reporting on Management Council activities, managing grievances from the Plenary, and facilitating public 258 comment and citizen outreach. The Ombudsman shall be a non-voting officer. 259 3.2. Management Council Selection. The Management Council Delegates and Officers shall be selected 260 through the following processes: 261 * Delegates: Management Council Delegates shall be selected through a general election held within 262 each Stakeholder Group represented in the Plenary. The nomination of each candidate for the election will be 263 approved by the Nomination Committee. 264 * At-Large Delegates: The election or selection process of At-Large Delegates shall be determined by 265 the Steering Group during its initial meetings, as with all Management Council Delegates nominees shall be 266 approved by the Nominations Committee. 267 * Chair: The Chair of the Management Council shall be selected through a general election of the Identity 268 Ecosystem Plenary. The nomination of each candidate for election shall be approved by the Nominations 269 Committee. 270 * Vice-Chair: This position shall be filled by the Director of the NSTIC National Program Office 271 * Ombudsman: This position shall be provided by the Secretariat. The criteria for selection shall be 272 established by the Management Council.
  • 7. 273 Management Council positions, selections, elections, and appointments shall be conducted in accordance 274 with By-laws created by the Steering Group during its initial meetings. <**): Rule hygiene.> 275 3.2.1. Delegate Selection Criteria. The Management Council Delegates (Stakeholder Group and At- 276 Large) shall be selected in accordance with the following criteria: 277 * Visionary Capability: Delegates shall be capable of understanding and contributing to the multi- 278 disciplinary aspects of the Identity Ecosystem and the specific goals of the Strategy. 279 * Team Effectiveness: Delegates shall be capable of working effectively as a team within the scope of 280 the Management Council. 281 * Outreach: Delegates shall be able to clearly communicate the actions of the Management Council to 282 their individual Stakeholder Group to facilitate consensus building and support the work of the Steering Group. 283 * Expertise: Delegates shall be recognized experts in their fields of endeavor. 284 * Commitment: Delegates shall be able to commit to contribute sufficient time and effort to accomplish 285 Management Council activities. 286 3.2.2. Stakeholders. For the purposes of Management Council Delegate selections Members shall self- 287 identify into one of the following 14 stakeholder groups: 288 * Privacy & Civil Liberties. This group focuses on the protection of individuals’ privacy and civil 289 liberties. 290 * Usability & Human Factors. This group focuses on technologies and solutions that are usable and 291 incorporate the human, cognitive, and social properties unique to the characteristics of humans. 292 * Consumer Advocates. This group focuses on addressing the interests and accessibility of 293 consumers and other individual end-user populations. 294 * U.S. Federal Government. This group focuses on the interests of the departments and agencies that 295 comprise the U.S. Federal Government. Under its various forms and component programs, the government acts 296 as an identity provider, attribute provider, and relying party. This group’s Management Council Delegate will be 297 responsible for advocating for the Federal Government as a Stakeholder; unlike the Vice-Chair who advocates 298 on behalf of the NSTIC itself. 299 * U.S. State, Local, Tribal, and Territorial Government. This group focuses on the interests of the 300 various state, local, tribal, and territorial governments that exist within the U.S. 301 * Research, Development & Innovation. This group focuses on research, teaching, and technology 302 development in support of the Identity Ecosystem. 303 * Identity & Attribute Providers. This group focuses on the processes and technologies associated 304 with establishing, managing, and securing digital identities and attributes. 305 * Interoperability. This group focuses on supporting interoperability within the Identity Ecosystem, 306 inclusive of Trust Framework Providers and standards development organizations. 307 * Information Technology (IT) Infrastructure. This group focuses on IT infrastructure relevant to the 308 functioning of the Identity Ecosystem, inclusive of different types of communications and network traffic, as well 309 as virtual and distributed functions that produce and provide hardware, software, and IT systems and services. 310 * Regulated Industries. This group focuses on industries covered by sector-specific regulations that 311 may be affected by the development of the Identity Ecosystem Framework. 312 * Small Business & Entrepreneurs. This group focuses on the impact of the development of the 313 Identity Ecosystem Framework on small businesses and individual business owners/operators.
  • 8. 314 * Security. This group focuses on IT security services that support the confidentiality, integrity, and 315 availability of identity solutions 316 * Relying Parties. This group focuses on transaction decisions based upon receipt, validation, and 317 acceptance of an entity’s authenticated credential(s) and identity attributes. 318 * Unaffiliated Individuals. This group consists of any individual who does not self-identify into one of 319 the other stakeholder groups. 320 The Steering Group shall periodically review the list of designated stakeholder groups to confirm that it 321 accurately reflects the broad array of Identity Ecosystem stakeholders and provides balanced representation for 322 all parties. The Steering Group may add, modify, remove, or otherwise alter the stakeholder groups as it deems 323 necessary [by amending the By-laws]. <**P: Rule hygiene.> 324 4. Secretariat. 325 The Secretariat shall serve as the administrative body of the Steering Group. In this role, the Secretariat shall 326 manage the internal operations of the Steering Group to include human and financial resources, meeting 327 coordination, communications, and material support and interaction with external organizations. The Secretariat 328 shall be responsible for maintaining transparency, openness, and alignment with the Guiding Principles in all 329 Steering Group operations. The Secretariat shall appoint an individual to act as the Identity Ecosystem’s 330 Ombudsman. 331 END OF DRAFT CHARTER PRODUCTION INFORMATION This is file "NSTICdraftCharterAugust2012comments.pdf". There is a related ASCII document "NSTICdraftCharterFebruary2012.txt" The normative February 2012 NIST Draft Charter (PDF) is here: http://www.nist.gov/nstic/reports/SG_Draft_Charter.pdf Mirrored Charter, with internal cites (HTML) is found here: http://j.mp/NSTICchtr The source text for this document and its ASCII sistyer version is the www.nstic.us mirror of NIST's draft Charter. This text reflects the original February 2012 draft's substantive content, but is marked [like this to show change proposals]. The ASCII text was cleaned up as to format, but not content, to allow for editing and regular-expression searches. jamie.clark@oasis-open.org 332 PROPOSED AMENDMENTS REFLECTED IN THIS DOCUMENT 333 General comment: The proposed rules should allow reconsideration of these issues, in six months. These proposals 334 distinguish the few changes that may be immediately advisable. Only the three "IMMEDIATE" proposals are reflected in 335 the ASCII version of this document. Where possible, proposed amendments are located in the Bylaws, not the Charter, 336 which should only be the place for overriding general principles. 337 Types of amendments: 338 IMMEDIATE: (3): I, N, O. 339 Typos (10): A, B, C, D, E, F, G, H, K. L. 340 Rule hygiene / logic (4): J, M, O, P. 341 Overcentralization (2): I, N. 342 A. Class of amendment: Typo. Later. 343 Place: Line 15. Section 1. 344 Edit: Add "p." in footnote 1 before the page number "1". 345 Reason: Use same page number format as in rest of footnotes.
  • 9. 346 B. Class of amendment: Typo. Later. 347 Place: Line 109. Section 1.3, second bullet point. 348 Edit: Add period to end of last sentence. 349 Reason: Punctuation. 350 C. Class of amendment: Typo. Later. 351 Place: Line 120. Section 1.3, fourth bullet point. 352 Edit: Add "pp." in NIST's footnote 5 before the number "25." 353 Reason: Use same page number format as in rest of footnotes. 354 D. Class of amendment: Typo. Later. 355 Place: Line 124. Section 1.4.1. 356 Edit: Change "publically" to "publicly." 357 Reason: Use same spelling for word throughout document. (Compare to line 127.) 358 E. Class of amendment: Typo. Later. 359 Place: Line 163. Section 1.7. 360 Edit: Delete second period at end of last sentence. 361 Reason: Grammar. 362 F. Class of amendment: Typo. Later. 363 Place: Line 167. Section 1.7.1. 364 Edit: Delete second period at end of last sentence. 365 Reason: Grammar. 366 G. Class of amendment: Numbering typo. Later. 367 Place: Line 177. Section 2.1.1. 368 Edit: Renumber as "2.1". 369 Reason: Section numbers are incorrectly sequenced. 370 H. Class of amendment: Numbering typo. Later. 371 Place: Line 181. Section 2.1.2. 372 Edit: Renumber as "2.2". 373 Reason: Section numbers are incorrectly sequenced. 374 I. Class of amendment: IMMEDIATE; Overcentralization. 375 Place: Line 183. Section 2.1.2. 376 Edit: Add "circulated for comment to the Plenary and then" before the words "approved by the Management 377 Council". 378 Reason: NIST's draft gives too much unchecked power to the 14-voter Management Council to override the 379 entire membership. In this case, charters and charter changes should be seen by the members before approval. 380 J. Class of amendment: Rule hygiene. Later. 381 Place: Line 186. Section 2.1.2. 382 Edit: Add "by modifying the participation and voting rights in a Standing Committee's charter, subject to Section 383 1.4.1" after the words "on the Standing Committees". 384 Reason: When ground rules (like participant balance) are changed, they should be documented somewhere 385 clearly, like the committee's charter, not made as a one-off fiat. 386 K. Class of amendment: Numbering typo. Later. 387 Place: Line 213. Section 2.1.3. 388 Edit: Renumber as "2.3". 389 Reason: Section numbers are incorrectly sequenced.
  • 10. 390 L. Class of amendment: Typo. Later. 391 Place: Line 233. Section 2.1.3, third bullet point. 392 Edit: Decapitalize the word "Responsible". 393 Reason: Grammar. Not a defined term. 394 M. Class of amendment: Rule hygiene. Later. 395 Place: Line 241. Section 3. 396 Edit: Delete the words "stakeholder group delegates elected to the". 397 Reason: Corrects ambiguity. This should not change the intended meaning, but makes it clear that the 398 Management Council acts here, not a subset of it. The deleted words might be misread to suggest that the 14 399 stakeholder-class delegates vote, but the two at-large members do not, on this topic. 400 N. Class of amendment: IMMEDIATE. Overcentralization. 401 Place: Line 243. Section 3. 402 Edit: Delete the last sentence. 403 Reason: The allocation of powers of the Management Council versus the committees or Plenary should be 404 specifically described. This one-sentence rule that the MC is final authority over everything may undermine or 405 contradict other rules. (For example, it might be read as a veto of the review power of the Privacy Standing 406 Committee, at line 201-03.) It also encourages stakeholders to focus all their work and lobbying on a relatively 407 small, elite panel. This might be re-visited in six months, but is too much power to take away from the rest of the 408 Steering Group at the outset, if stakeholders are to take their committee and Plenary participation seriously. 409 O. Class of amendment: IMMEDIATE. Rule hygiene. 410 Place: Line 273. Section 3.2. 411 Edit: Delete the words "during its initial meetings". 412 Reason: Corrects ambiguity. The change makes it clear that Bylaws can be changed. The deleted words might 413 be misread to suggest that the original Bylaws, regardless of later changes, govern this topic. 414 P. Class of amendment: Rule hygiene. Later. 415 Place: Line 322. Section 3.2.2. 416 Edit: Add the words "by amending the By-laws" at the end of the last sentence. 417 Reason: When ground rules (like stakeholder classes) are changed, they should be documented somewhere 418 clearly, like the By-laws. Otherwise it is not clear how a change would be made. This is significant, because the 419 balance in NIST's suggested 14 classes may be the subject of proposed amendments later.