Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
NSTIC draft charter August 2012 w comments
1. NSTIC STEERING GROUP: NIST February 2012 DRAFT CHARTER with AUGUST 2012 JBC EDITS
Type-set version with line numbers, and proposed corrections and comments.
Note, this analysis has multiple annotations and amendments that may not be needed at the initial Steering Group meetings.
For a simpler version, see the ASCII file "NSTICdraftCharterFebruary2012.txt" at Slideshare
(http://www.slideshare.net/JamieXML/nstic-draft-bylaws-july-2012) or Google Docs: (http://j.mp/MVwfNC)
See end of document for production information.
• [Square brackets] and struckthrough text indicate proposed changes. Amendments listed at end of document.
• <Angle brackets> include this editor's unofficial cross-references, and <**type of amendment>.
• {Curly brackets} indicate original NIST footnotes, with added hyperlinks and some abbreviations.
1 RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP
2 1. Identity Ecosystem Steering Group Charter.
3 The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President Obama in
4 April 2011, acknowledges and addresses a major weakness in cyberspace – a lack of confidence and assurance
5 that people, organizations, and businesses are who they say they are online. {NIST fn1: The full Strategy can
6 be found at: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf.} Additionally,
7 in the current online environment, individuals are asked to maintain dozens of different usernames and
8 passwords, one for each website with which they interact. The complexity of this approach is a burden to
9 individuals, and it encourages behavior – such as the reuse of passwords – that makes online fraud and identity
10 theft easier. At the same time, online businesses are faced with ever-increasing costs for managing customer
11 accounts, the consequences of online fraud, and the loss of business that results from individuals’ unwillingness
12 to create yet another account. Moreover, both businesses and governments are unable to offer many services
13 online, because they cannot effectively identify the individuals with whom they interact. Spoofed websites, stolen
14 passwords, and compromised accounts are all symptoms of inadequate authentication mechanisms. {NIST fn2:
15 Strategy, April 2011, [p.] 1.} <**A: Typo.>
16 The Identity Ecosystem envisioned in the NSTIC is an online environment that will enable people to validate their
17 identities securely, but with minimized disclosure of personal information when they are conducting transactions.
18 The vibrant marketplace created by the Identity Ecosystem will provide people with choices among multiple
19 accredited identity providers, both private and public, and choices among multiple credentials. For example,
20 imagine that a student could get a digital credential from her cell phone provider and another one from her
21 university and use either of them to log-in to her bank’s website, her e-mail, three social networking sites, four
22 online commerce sites, and so on, all without having to remember dozens of passwords. The added
23 convenience, security, and privacy provided within the Identity Ecosystem will allow additional services to be put
24 online to drive greater economic growth. Notwithstanding the objective to improve identification and
25 authentication in cyberspace for certain types of transactions, not all Internet activities have such needs. Thus,
26 the capacity for anonymity and pseudonymity will be maintained in the envisioned Identity Ecosystem.
27 A core tenet of the NSTIC is that its implementation must be led by the private sector. The NSTIC calls for the
28 Federal Government to work collaboratively with the private sector, advocacy groups, public sector agencies,
29 and other organizations to improve the processes by which online transactions are conducted. The Strategy
30 itself was developed with substantial input from both the private sector and the American public. The National
31 Institute of Standards and Technology (NIST), which has been designated to establish a National Program Office
32 to lead the implementation of the NSTIC, recognizes that a strong and vibrant public-private partnership is
33 necessary to execute the Strategy’s vision in a way that supports the wide range of interactions that occur over
34 the Internet. As such, NIST is leading the effort to fulfill the NSTIC’s call for government to work in close
35 partnership with the private sector and other relevant stakeholder groups to, “(Establish a steering group to)
36 administer the process for policy and standards development for the Identity Ecosystem Framework in
37 accordance with the Guiding Principles in (the) Strategy. The steering group will also ensure that accreditation
38 authorities validate participants’ adherence to the requirements of the Identity Ecosystem Framework.” {NIST
39 fn3: Strategy, April 2011, p. 25.}
2. 40 1.1. Mission. The Mission of the Steering Group shall be to govern and administer the Identity Ecosystem
41 Framework in a manner that stimulates the development and sustainability of the Identity Ecosystem. The
42 Steering Group will always operate in accordance with the NSTIC’s Guiding Principles.
43 1.1.1. Objectives. The activities and work products of the Steering Group shall be conducted in support
44 of the following objectives:
45 * Ensure that the Identity Ecosystem and Identity Ecosystem Framework conform to the four NSTIC
46 Guiding Principles (as detailed in section 1.3).
47 * Administer the process for policy and standards development and adoption for the Identity Ecosystem
48 Framework and, where necessary establish policies standards for the Identity Ecosystem Framework.
49 * Adopt and, where necessary, establish standards for the Identity Ecosystem Framework.
50 * Certify that accreditation authorities validate adherence to the requirements of the Identity Ecosystem
51 Framework.
52 1.1.2. Purpose. The purpose of the Steering Group shall be to develop and administer the process for
53 policy and technical standards development for the Identity Ecosystem Framework. The Steering Group shall
54 bring together all of the interested stakeholders, both in private and public sectors, to confirm that the Identity
55 Ecosystem Framework provides a minimum baseline of privacy, security, interoperability, and ease-of-use
56 through standards and policies, without creating unnecessary barriers to entry. The Steering Group shall
57 facilitate the fulfillment of the NSTIC goals to develop a comprehensive Identity Ecosystem Framework; build
58 and implement the Identity Ecosystem; enhance confidence and willingness to participate in the Identity
59 Ecosystem; and, support the long-term success and sustainability of the Identity Ecosystem. {NIST fn4:
60 Strategy, April 2011, p. 31.} ¶ The Steering Group shall not be a standards development body, but rather an
61 organization that promotes the development of standards and develops policies that serve to accelerate the
62 development and adoption of the Identity Ecosystem.
63 1.2. Scope of Activities. The activities of the Steering Group shall be limited to achievement of the
64 objectives listed in this charter. Additional activities that are not considered essential to completion of these
65 objectives may be conducted when determined appropriate through Steering Group consensus. The scope of
66 the Steering Group’s activities is summarized in the sections that follow.
67 1.2.1. Adopt and Establish Standards. The Steering Group shall establish forums and procedures to
68 review applicable standards and adopt those that support achievement of the NSTIC vision, conform to the
69 Guiding Principles, and meet other established requirements. Additionally, the Steering Group will recommend
70 standards be established when gaps are identified. The Steering Group shall advocate for standards to be
71 established and adopted in a timely manner and be sufficient to keep pace with emerging technology and market
72 trends.
73 1.2.2. Develop and Maintain Policies. The Steering Group shall establish the mechanisms necessary to
74 develop, implement, and maintain policies that are appropriate for use in the Identity Ecosystem and conform to
75 the NSTIC Guiding Principles. The Steering Group shall support the timely development and implementation of
76 policies.
77 1.2.3. Develop and Maintain Processes for the Accreditation of Identity Ecosystem Entities. The
78 Steering Group shall develop, foster, and implement a clear process for accrediting entities within the Identity
79 Ecosystem as well as develop clear testing and certification criteria by which adherence to the recommended
80 standards and policies may be measured. ¶ The Steering Group shall ensure that this accreditation process is
81 applied fairly to all Identity Ecosystem participants.
82 1.2.4. Develop and Maintain Identity Ecosystem Operating Procedures. The Steering Group shall
83 develop, administer, and maintain Identity Ecosystem Operating Procedures to facilitate interoperability between
84 and among the Identity Ecosystem participants. Operating Procedures refers to the set of policies and standards
85 created by the Steering Group as accepted baseline requirements for participating in the Identity Ecosystem
86 Framework.
3. 87 1.3. Adherence to the NSTIC Guiding Principles. The Identity Ecosystem Steering Group, its components,
88 and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC.
89 They are:
90 * Identity solutions will be privacy-enhancing and voluntary. The Identity Ecosystem will be
91 grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the
92 creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the
93 capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the
94 Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related
95 transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity
96 Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem
97 credential nor that companies require Identity Ecosystem credentials from consumers as the only means to
98 interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the
99 credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem
100 mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day
101 – or even a transaction-to-transaction – choice.
102 * Identity solutions will be secure and resilient. Identity solutions within the Identity Ecosystem will
103 provide secure and reliable methods of electronic authentication by being grounded in technology and security
104 standards that are open and collaboratively developed with auditable security processes. Credentials within the
105 Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices;
106 resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the
107 necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely
108 restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be
109 capable of adapting to the dynamic nature of technology[.] <**B: Typo>
110 * Identity solutions will be interoperable. Interoperability encourages and enables service providers to
111 accept a wide variety of credentials and enables users to take advantage of different credentials to assert their
112 identity online. Two types of interoperability are recognized in the Identity Ecosystem: there will be standardized,
113 reliable credentials and identity media in widespread use in both the public and private sectors; and if an
114 individual, device, or system presents a valid and appropriate credential, any qualified relying party is capable of
115 accepting and verifying the credential as proof of identity and attributes.
116 * Identity solutions will be cost-effective and easy to use. The Identity Ecosystem will promote
117 identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of
118 service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and
119 relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and
120 enabled by technology that requires minimal user training. {NIST fn5: Strategy, April 2011, [pp.] 25, 11-14.}
121 <**Typo.>
122 1.4. Operating Principles. The Steering Group shall adhere to the following four operating principles.
123 1.4.1. Openness and Transparency. The work of the Steering Group, including all working groups and
124 committees, shall facilitate broad participation and be publiclypublically accessible. <**D: Typo.> The Identity
125 Ecosystem Steering Group shall take the following steps to provide openness and transparency in all its
126 proceedings:
127 * All documents, drafts, and minutes of meetings shall be posted on a publicly available Internet site.
128 * All meetings of all governing bodies shall be open to public attendance and leverage virtual
129 attendance options to maximize broad and public participation.
130 * Technologies should be leveraged to create user-friendly and broad avenues for participation in all
131 proceedings and administrative functions.
132 1.4.2. Balance. The Steering Group shall strive to achieve balanced representation among all
133 stakeholder groups regardless of their size, financial status, or sector alignment/affiliation.
4. 134 1.4.3. Consensus. Consensus – general agreement among members – shall be a core value of the
135 Steering Group. All processes instituted by the Steering Group shall require participants to consider all views,
136 proposals and objections, and endeavor to reconcile them. Although positions of leadership, such as committee
137 chairs, are likely to serve as the primary drivers of consensus, all Steering Group participants must be
138 (1) cooperative in the consensus process; (2) constructive; and (3) respectful when providing feedback or
139 dissenting opinions. In the event that consensus cannot be reached, voting, by an established method, shall be
140 used to make Steering Group decisions.
141 1.4.4. Harmonization. The Steering Group shall encourage harmonization of standards and policies and
142 shall always strive to recognize the impacts of policy and standards on all stakeholders in the Identity
143 Ecosystem.
144 1.5. Membership. Membership in the Steering Group shall be open to organizations and unaffiliated
145 individuals (Members) that have an interest in the development of the Identity Ecosystem. A Member
146 organization may have more than one individual within its organization participate in Steering Group activities;
147 however, it shall designate only one individual as its representative for the purposes of voting in Plenary
148 proceedings. ¶ A Member shall join as a Participating or Observer Member as defined below:
149 * Participating Members. Participating Members are those stakeholders who actively participate in the
150 Steering Group and the work of the Plenary, its Standing Committees, and Working Groups. The criteria for
151 active participation such as attendance quotas or other measurable conduct shall be defined in the By-laws.
152 Participating Members shall have a vote in all Plenary proceedings.
153 * Observing Members. Observing Members are those stakeholders who do not meet the criteria for
154 active participation, but want to maintain a presence in the Steering Group. Observing Members may still
155 contribute to the work of the Plenary, its Standing Committees, and Working Groups, but they shall not be
156 permitted to vote in Plenary proceedings.
157 1.6. Organizational Structure. The Steering Group shall be composed of two bodies: the Identity
158 Ecosystem Plenary and the Identity Ecosystem Management Council. The Plenary and the Management Council
159 shall be collectively responsible for achieving the Steering Groups objectives.
160 1.7. Establishment. The NSTIC, which was signed by President Obama in April 2011, called for the
161 establishment of a private sector-led steering group to administer the development and adoption of the Identity
162 Ecosystem Framework. The Steering Group receives its authority to operate from the active participation of its
163 membership. . <**E; Typo.>
164 1.7.1. Resources and Duration. The Steering Group shall be initiated with the support of NIST.
165 Following the initiation period, the Steering Group will transition to a self-sustaining organization. The
166 Management Council shall be responsible for managing the Steering Group’s resources and procuring services
167 once the Steering Group is self-sustaining, as necessary.. <**F: Typo.>
168 2. Identity Ecosystem Plenary.
169 Participation in the Plenary shall be open to all Members. The primary responsibilities of the Plenary shall be to
170 review and recommend technical standards for adoption establish and maintain the procedures/policies that
171 govern the Identity Ecosystem, develop, and establish accountability measures to promote broad adherence to
172 these procedures, and facilitate the ongoing operation of the Steering Group. The Plenary will consist of
173 Standing Committees, Working Groups, and individual members. The Participating Members (as defined in
174 section 1.5 and in associated By-laws) of the Plenary shall be responsible for voting on recommendations
175 provided by the Standing Committees and Working Groups and will participate in elections for Management
176 Council Delegates, Management Council Officers, and the Plenary Chair.
177 [2.1.] 2.1.1. The Plenary Chair. <**G: Numbering typo.> The Plenary shall be headed by the Plenary Chair.
178 The Chair shall be responsible for directing the actions, managing the votes, and providing general leadership to
179 the Plenary. Nominees for this position shall be approved by the Nominations Committee and selected by simple
180 majority vote of the Participating Members that comprise the Plenary.
5. 181 [2.2.] 2.1.2. Plenary Standing Committees. <**H: Numbering typo.> Standing Committees shall be
182 responsible for addressing and coordinating ongoing/permanent issues. Standing Committees shall produce
183 their own charters and voting procedures which shall be [circulated for comment to the Plenary and then]
184 approved by the Management Council. <**I: Overcentralization.> Additional measures may be taken by the
185 Management Council to provide balanced and experienced representation on the Standing Committees [by
186 modifying the participation and voting rights in a Standing Committee's charter, subject to Section 1.4.1].
187 <**J: Rule hygiene.> All recommendations proposed by the Committees shall be reviewed and approved by the
188 Privacy Standing Committee prior to submission to the Plenary for approval. ¶ The designated Standing
189 Committees shall be:
190 * Policy Coordination Committee. The Policy Coordination Committee is responsible for coordinating
191 policies to facilitate and promote the establishment of the Identity Ecosystem and the rules for participation.
192 <** See sec. 1.2.1.>
193 * Standards Coordination Committee. The Standards Coordination Committee is responsible for
194 coordinating, reviewing, and recommending the adoption of technical standards to facilitate interoperability within
195 the Identity Ecosystem. <** See sec. 1.2.2.>
196 * Accreditation Coordination Committee. The Accreditation Coordination Committee is responsible for
197 coordinating accreditation requirements for Identity Ecosystem participants. <** See secs. 1.2.1 and 1.3 (third
198 bullet).>
199 * Privacy Coordination Committee. The Privacy Coordination Committee is responsible for seeing that
200 other Committees’ and Working Groups’ work products adhere to the Privacy-enhancing and Voluntary Guiding
201 Principle. To that end, this group should have a “gatekeeper” function; meaning no recommendations on policies,
202 standards or other work products should be reviewed or approved by the Plenary unless first approved by the
203 Privacy Coordination Committee. This committee should be staffed by individuals with extensive experience in
204 the privacy field, and comprising a balance of viewpoints across a spectrum of experience, including advocacy
205 organizations and the private sector. <** See sec. 1.3 (first bullet).>
206 * Nominations Committee. The Nominations Committee is responsible for evaluating candidate
207 qualifications to serve as the Chair on the Plenary and Management Council or as a Delegate (Stakeholder
208 group and At-Large). Selection criteria outlined in this Charter will enable the selection of persons that can work
209 for the welfare of the Identity Ecosystem as a whole, while minimizing self-interested conduct that could hinder
210 the effectiveness and legitimacy of the Steering Group.
211 The Management Council may establish more Standing Committees as necessary to accomplish the work of
212 the Steering Group.
213 2.3. 2.1.3. Plenary Working Groups. <**K: Numbering typo.> Members shall establish domain expert
214 Working Groups as necessary to accomplish the work of the Steering Group. Working Groups may be proposed
215 by the Plenary or the Management Council and shall be officially established by the Management Council.
216 Participation in and meetings of the Plenary Working Groups shall be open to Participating and Observing
217 Members; however, only Participating Members may vote on work products and recommendations. ¶ Working
218 Groups shall produce their own charters and voting procedures which shall be approved by the Management
219 Council. Based on their work, Working Groups may propose recommendations and work products for
220 consideration by the Plenary. All recommendations proposed by the Working Groups shall be reviewed and
221 approved by the Privacy Standing Committee prior to submission to the Plenary for approval. ¶ The following
222 Working Groups shall be established by the Plenary and Management Council:
223 * Usability and Accessibility Working Group. This working group is responsible for evaluating
224 technologies and identity solutions within the Identity Ecosystem to confirm that they are easy-to-use and
225 accessible for all potential users, in accordance with the NSTIC Guiding Principles. <** See sec. 1.3 (fourth
226 bullet).>
227 * Security Working Group. This working group is responsible for evaluating technologies and identity
228 solutions within the Identity Ecosystem to confirm that they meet applicable requirements for confidentiality,
229 integrity, and availability, and are capable of timely restoration after any disruption. The work of this group should
6. 230 be conducted in accordance with the NSTIC Guiding Principle for the security and resilience of identity solutions
231 <** See sec. 1.3 (second bullet).>
232 * International Coordination Working Group. This working group is rResponsible for reviewing and,
233 where appropriate, coordinating alignment with similar international identity standards and policies.
234 <**L: Typo.>
235 Additional Working Groups may be established by the Management Council or the Plenary as necessary to
236 accomplish the work of the Steering Group.
237 3. Identity Ecosystem Management Council.
238 The Management Council Management Council shall provide guidance to the Plenary on the broad objectives
239 envisioned by the Strategy; produce workplans to prioritize work items and monitor progress; procure necessary
240 resources; and ensure that Steering Group work activities align with the NSTIC Guiding Principles and Goals.
241 All recommendations from the Plenary Working Groups and Standing Committees shall be voted on by the
242 stakeholder group delegates elected to the Management Council. <**M: Rule hygiene.> The voting process will
243 be structured and defined in the Steering Group By-laws established during the initial meeting of the Steering
244 Group. The Management Council shall also be the final ratification authority in the Steering Group.
245 <**N: Overcentralization.>
246 3.1. Management Council Composition. The Management Council shall be composed of 14 delegates,
247 who are elected from the stakeholder groups and two at-large delegates. The Management Council may include
248 additional stakeholder groups at any time as necessary. ¶ In addition to Management Council Delegates, the
249 Management Council shall have three (3) officers:
250 * The Chair: This position shall provide general leadership to the Management Council; oversee votes,
251 and direct meetings of the Management Council. The Chair shall be a non-voting officer.
252 * The Vice-Chair: This position shall assist the Steering Group in maintaining alignment with NSTIC
253 objectives and the NSTIC Guiding Principles. The Vice-Chair shall be a non-voting officer.
254 * The Ombudsman: This position shall be responsible for upholding the NSTIC Guiding Principles and
255 Steering Group charter, representing and advocating for consumers or other individuals and underrepresented
256 groups, safeguarding against individual stakeholder groups exerting excessive influence, monitoring and
257 reporting on Management Council activities, managing grievances from the Plenary, and facilitating public
258 comment and citizen outreach. The Ombudsman shall be a non-voting officer.
259 3.2. Management Council Selection. The Management Council Delegates and Officers shall be selected
260 through the following processes:
261 * Delegates: Management Council Delegates shall be selected through a general election held within
262 each Stakeholder Group represented in the Plenary. The nomination of each candidate for the election will be
263 approved by the Nomination Committee.
264 * At-Large Delegates: The election or selection process of At-Large Delegates shall be determined by
265 the Steering Group during its initial meetings, as with all Management Council Delegates nominees shall be
266 approved by the Nominations Committee.
267 * Chair: The Chair of the Management Council shall be selected through a general election of the Identity
268 Ecosystem Plenary. The nomination of each candidate for election shall be approved by the Nominations
269 Committee.
270 * Vice-Chair: This position shall be filled by the Director of the NSTIC National Program Office
271 * Ombudsman: This position shall be provided by the Secretariat. The criteria for selection shall be
272 established by the Management Council.
7. 273 Management Council positions, selections, elections, and appointments shall be conducted in accordance
274 with By-laws created by the Steering Group during its initial meetings. <**): Rule hygiene.>
275 3.2.1. Delegate Selection Criteria. The Management Council Delegates (Stakeholder Group and At-
276 Large) shall be selected in accordance with the following criteria:
277 * Visionary Capability: Delegates shall be capable of understanding and contributing to the multi-
278 disciplinary aspects of the Identity Ecosystem and the specific goals of the Strategy.
279 * Team Effectiveness: Delegates shall be capable of working effectively as a team within the scope of
280 the Management Council.
281 * Outreach: Delegates shall be able to clearly communicate the actions of the Management Council to
282 their individual Stakeholder Group to facilitate consensus building and support the work of the Steering Group.
283 * Expertise: Delegates shall be recognized experts in their fields of endeavor.
284 * Commitment: Delegates shall be able to commit to contribute sufficient time and effort to accomplish
285 Management Council activities.
286 3.2.2. Stakeholders. For the purposes of Management Council Delegate selections Members shall self-
287 identify into one of the following 14 stakeholder groups:
288 * Privacy & Civil Liberties. This group focuses on the protection of individuals’ privacy and civil
289 liberties.
290 * Usability & Human Factors. This group focuses on technologies and solutions that are usable and
291 incorporate the human, cognitive, and social properties unique to the characteristics of humans.
292 * Consumer Advocates. This group focuses on addressing the interests and accessibility of
293 consumers and other individual end-user populations.
294 * U.S. Federal Government. This group focuses on the interests of the departments and agencies that
295 comprise the U.S. Federal Government. Under its various forms and component programs, the government acts
296 as an identity provider, attribute provider, and relying party. This group’s Management Council Delegate will be
297 responsible for advocating for the Federal Government as a Stakeholder; unlike the Vice-Chair who advocates
298 on behalf of the NSTIC itself.
299 * U.S. State, Local, Tribal, and Territorial Government. This group focuses on the interests of the
300 various state, local, tribal, and territorial governments that exist within the U.S.
301 * Research, Development & Innovation. This group focuses on research, teaching, and technology
302 development in support of the Identity Ecosystem.
303 * Identity & Attribute Providers. This group focuses on the processes and technologies associated
304 with establishing, managing, and securing digital identities and attributes.
305 * Interoperability. This group focuses on supporting interoperability within the Identity Ecosystem,
306 inclusive of Trust Framework Providers and standards development organizations.
307 * Information Technology (IT) Infrastructure. This group focuses on IT infrastructure relevant to the
308 functioning of the Identity Ecosystem, inclusive of different types of communications and network traffic, as well
309 as virtual and distributed functions that produce and provide hardware, software, and IT systems and services.
310 * Regulated Industries. This group focuses on industries covered by sector-specific regulations that
311 may be affected by the development of the Identity Ecosystem Framework.
312 * Small Business & Entrepreneurs. This group focuses on the impact of the development of the
313 Identity Ecosystem Framework on small businesses and individual business owners/operators.
8. 314 * Security. This group focuses on IT security services that support the confidentiality, integrity, and
315 availability of identity solutions
316 * Relying Parties. This group focuses on transaction decisions based upon receipt, validation, and
317 acceptance of an entity’s authenticated credential(s) and identity attributes.
318 * Unaffiliated Individuals. This group consists of any individual who does not self-identify into one of
319 the other stakeholder groups.
320 The Steering Group shall periodically review the list of designated stakeholder groups to confirm that it
321 accurately reflects the broad array of Identity Ecosystem stakeholders and provides balanced representation for
322 all parties. The Steering Group may add, modify, remove, or otherwise alter the stakeholder groups as it deems
323 necessary [by amending the By-laws]. <**P: Rule hygiene.>
324 4. Secretariat.
325 The Secretariat shall serve as the administrative body of the Steering Group. In this role, the Secretariat shall
326 manage the internal operations of the Steering Group to include human and financial resources, meeting
327 coordination, communications, and material support and interaction with external organizations. The Secretariat
328 shall be responsible for maintaining transparency, openness, and alignment with the Guiding Principles in all
329 Steering Group operations. The Secretariat shall appoint an individual to act as the Identity Ecosystem’s
330 Ombudsman.
331 END OF DRAFT CHARTER
PRODUCTION INFORMATION
This is file "NSTICdraftCharterAugust2012comments.pdf". There is a related ASCII document "NSTICdraftCharterFebruary2012.txt"
The normative February 2012 NIST Draft Charter (PDF) is here: http://www.nist.gov/nstic/reports/SG_Draft_Charter.pdf
Mirrored Charter, with internal cites (HTML) is found here: http://j.mp/NSTICchtr
The source text for this document and its ASCII sistyer version is the www.nstic.us mirror of NIST's draft Charter. This text reflects the
original February 2012 draft's substantive content, but is marked [like this to show change proposals]. The ASCII text was cleaned up
as to format, but not content, to allow for editing and regular-expression searches.
jamie.clark@oasis-open.org
332 PROPOSED AMENDMENTS REFLECTED IN THIS DOCUMENT
333 General comment: The proposed rules should allow reconsideration of these issues, in six months. These proposals
334 distinguish the few changes that may be immediately advisable. Only the three "IMMEDIATE" proposals are reflected in
335 the ASCII version of this document. Where possible, proposed amendments are located in the Bylaws, not the Charter,
336 which should only be the place for overriding general principles.
337 Types of amendments:
338 IMMEDIATE: (3): I, N, O.
339 Typos (10): A, B, C, D, E, F, G, H, K. L.
340 Rule hygiene / logic (4): J, M, O, P.
341 Overcentralization (2): I, N.
342 A. Class of amendment: Typo. Later.
343 Place: Line 15. Section 1.
344 Edit: Add "p." in footnote 1 before the page number "1".
345 Reason: Use same page number format as in rest of footnotes.
9. 346 B. Class of amendment: Typo. Later.
347 Place: Line 109. Section 1.3, second bullet point.
348 Edit: Add period to end of last sentence.
349 Reason: Punctuation.
350 C. Class of amendment: Typo. Later.
351 Place: Line 120. Section 1.3, fourth bullet point.
352 Edit: Add "pp." in NIST's footnote 5 before the number "25."
353 Reason: Use same page number format as in rest of footnotes.
354 D. Class of amendment: Typo. Later.
355 Place: Line 124. Section 1.4.1.
356 Edit: Change "publically" to "publicly."
357 Reason: Use same spelling for word throughout document. (Compare to line 127.)
358 E. Class of amendment: Typo. Later.
359 Place: Line 163. Section 1.7.
360 Edit: Delete second period at end of last sentence.
361 Reason: Grammar.
362 F. Class of amendment: Typo. Later.
363 Place: Line 167. Section 1.7.1.
364 Edit: Delete second period at end of last sentence.
365 Reason: Grammar.
366 G. Class of amendment: Numbering typo. Later.
367 Place: Line 177. Section 2.1.1.
368 Edit: Renumber as "2.1".
369 Reason: Section numbers are incorrectly sequenced.
370 H. Class of amendment: Numbering typo. Later.
371 Place: Line 181. Section 2.1.2.
372 Edit: Renumber as "2.2".
373 Reason: Section numbers are incorrectly sequenced.
374 I. Class of amendment: IMMEDIATE; Overcentralization.
375 Place: Line 183. Section 2.1.2.
376 Edit: Add "circulated for comment to the Plenary and then" before the words "approved by the Management
377 Council".
378 Reason: NIST's draft gives too much unchecked power to the 14-voter Management Council to override the
379 entire membership. In this case, charters and charter changes should be seen by the members before approval.
380 J. Class of amendment: Rule hygiene. Later.
381 Place: Line 186. Section 2.1.2.
382 Edit: Add "by modifying the participation and voting rights in a Standing Committee's charter, subject to Section
383 1.4.1" after the words "on the Standing Committees".
384 Reason: When ground rules (like participant balance) are changed, they should be documented somewhere
385 clearly, like the committee's charter, not made as a one-off fiat.
386 K. Class of amendment: Numbering typo. Later.
387 Place: Line 213. Section 2.1.3.
388 Edit: Renumber as "2.3".
389 Reason: Section numbers are incorrectly sequenced.
10. 390 L. Class of amendment: Typo. Later.
391 Place: Line 233. Section 2.1.3, third bullet point.
392 Edit: Decapitalize the word "Responsible".
393 Reason: Grammar. Not a defined term.
394 M. Class of amendment: Rule hygiene. Later.
395 Place: Line 241. Section 3.
396 Edit: Delete the words "stakeholder group delegates elected to the".
397 Reason: Corrects ambiguity. This should not change the intended meaning, but makes it clear that the
398 Management Council acts here, not a subset of it. The deleted words might be misread to suggest that the 14
399 stakeholder-class delegates vote, but the two at-large members do not, on this topic.
400 N. Class of amendment: IMMEDIATE. Overcentralization.
401 Place: Line 243. Section 3.
402 Edit: Delete the last sentence.
403 Reason: The allocation of powers of the Management Council versus the committees or Plenary should be
404 specifically described. This one-sentence rule that the MC is final authority over everything may undermine or
405 contradict other rules. (For example, it might be read as a veto of the review power of the Privacy Standing
406 Committee, at line 201-03.) It also encourages stakeholders to focus all their work and lobbying on a relatively
407 small, elite panel. This might be re-visited in six months, but is too much power to take away from the rest of the
408 Steering Group at the outset, if stakeholders are to take their committee and Plenary participation seriously.
409 O. Class of amendment: IMMEDIATE. Rule hygiene.
410 Place: Line 273. Section 3.2.
411 Edit: Delete the words "during its initial meetings".
412 Reason: Corrects ambiguity. The change makes it clear that Bylaws can be changed. The deleted words might
413 be misread to suggest that the original Bylaws, regardless of later changes, govern this topic.
414 P. Class of amendment: Rule hygiene. Later.
415 Place: Line 322. Section 3.2.2.
416 Edit: Add the words "by amending the By-laws" at the end of the last sentence.
417 Reason: When ground rules (like stakeholder classes) are changed, they should be documented somewhere
418 clearly, like the By-laws. Otherwise it is not clear how a change would be made. This is significant, because the
419 balance in NIST's suggested 14 classes may be the subject of proposed amendments later.