You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

To answer the question “What steps should be taken to control data access for each user/purpose?” the PDP should be informed by available inputs on this topic, including:

Available Inputs – Hyperlinked

WHOIS Task Force Final Report (2003)

WHOIS Task Force Final Report (2007)

WHOIS Studies (2012-2014) , especially

Other Recent WHOIS Program Improvements (2012-), especially

Article 29 Data Protection Working Party Letters (2003-2014)

EWG Recommendations for a Next-Generation RDS, especially

  • Section 4b, Principles for Unauthenticated and Gated Data Access
  • Section 4c, RDS User Accreditation Principles
  • Annex E, Unauthenticated and Gated Access Examples
  • EWG Research: RDS User Accreditation RFI
  • EWG Tutorial Pages 15-21, 42-60
  • EWG FAQs 25-30, 68
  • Video FAQs “Does the RDS eliminate free public access to data?” and
    “What would I need to do to access gated RDS data?” and “What are RDS contacts?”
  • Statements/Blogs by Hollenbeck and Perrin

Process Framework for a PDP on Next-Generation RDS, especially

  • 3-Phase Approach detailed on Page 9, Row 2
  • No labels