You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

To answer the question “What steps are needed to protect data and privacy?” for each purpose, the PDP should be informed by available inputs, including:

Available Inputs – Hyperlinked

Procedure for Handling Conflicts with National Laws (2003-2014)

WHOIS Studies (2012-2014) , especially

Privacy & Proxy Services Accreditation PDP (2013-)

Article 29 Data Protection Working Party Letters (2003-2014)

NORC Study of WHOIS Privacy/Proxy Prevalence (2010)

EWG Recommendations for a Next-Generation RDS, especially

  • Section 6a, Data Protection Principles
  • Section 6b, Principles for Data Access by Law Enforcement
  • Section 7, Improving Registrant Privacy
  • Annex H, Model for Relay and Reveal
  • EWG Research: Data Protection Considerations Applicable to Collection of gTLD Reg Data Memo
  • EWG Research: WHOIS Privacy and Proxy Service Provider Practices Survey
  • EWG Tutorial Pages 28-30
  • EWG FAQs 31-38
  • Statements/Blogs by Ajayi and Perrin

Process Framework for a PDP on Next-Generation RDS, especially

  • 3-Phase Approach detailed on Page 9, Row 5

See also Public Comments on Issue Report for input to be considered by PDP WG.

  • No labels