Dear EPDP Team,

 

Please note that the updated trademark infringement use case has been posted on the wiki: https://community.icann.org/x/-KCjBg. Note that there are a couple of action items in the template for EPDP Team members to work on revised language for certain sections. Please share any further comments or suggestions with the mailing list.

 

For those working on new use cases, you can also find there the updated template posted there – please use this version. As a reminder, new use cases need to be submitted by Friday 5 July.

 

Safe travels home,

 

Caitlin, Berry and Marika

 

From: Gnso-epdp-team <gnso-epdp-team-bounces@icann.org> on behalf of Caitlin Tubergen <caitlin.tubergen@icann.org>
Date: Thursday, June 27, 2019 at 17:16
To: "gnso-epdp-team@icann.org" <gnso-epdp-team@icann.org>
Subject: [Gnso-epdp-team] Notes and action items from EPDP Meeting 2 of 2 - ICANN65 - 27 June 2019

 

Dear EPDP Team,

 

Please find the notes and action items from today’s face-to-face meeting below. To the volunteers who agreed to produce additional use cases, please use this updated use case template.

 

Thank you, and to those of you traveling home from ICANN65, safe travels!

 

Best regards,

 

Marika, Berry, and Caitlin

 

EPDP Team Meeting 2 of 2

ICANN65

27 June 2019

 

Action Items

  1. Based on feedback provided during today’s meeting, EPDP Support Staff to circulate updated use case template. Please use please use this updated use case template. (COMPLETED)
  2. EPDP Team Members who wish to submit additional use cases to submit use cases by Friday, 5 July.
  3. Georgios and Marc A. to work together to develop a first draft of policy questions to send to the Strawberry Team for the EPDP Team’s review.
  4. Georgios to review the safeguards for the registrant and provide guidance on where these safeguards may appropriately belong (requestor, entity disclosing nonpublic registration data, etc.).

 

Recap of Tuesday, 25 June

 

Objectives for the Day

 

Engagement with ICANN org to discuss next steps in relation to outreach with DPAs

 

                EPDP Team Response

 

Updated Intellectual Property Use Case from Tuesday’s Discussion

 

EPDP Team Feedback:

·         Use Case:

·         Requesting data was changed to processing data - proposal to change back to requesting as the processing occurs after the data is requested, and this use case involves the request.

·         Subsection A

·         Service providers should be added here, as agents may not fully capture this idea.

·         Concept of service providers is too broad; agent is more legally defined.

·         Perhaps brand protection service provider could be used for greater specificity.

·         Perhaps define the term agents to include brand protection service providers.

·         Proposal to add footnote, noting that brand protection service providers are included in this category.

·         Subsection B

·         Change “requested” to “needed”

·         Trademark infringement is the use case - this seems to only apply to cybersquatting, or is this broader? 

·         B should be changed to match the title

·         Subsection C

·         Precise formulation of data elements should replace the text in the box

·         The labelling of C “maximum data fields to be disclosed in this use case” to make it more clear

·         Email address, telephone number, and fax should be added to this list currently in the field. 

·         All contact fields should be added here to give some assurance that you can make contact.

·         Necessity of disclosure of specific elements needs to be considered.

·         Registration data was defined in the Phase 1 Final Report - given that it is a defined term, this should be consistent. Additionally, registrant and RNH need to be made consistent.

·         Postal address should be changed to reflect the relevant data fields, street address, city, etc.

·         The more the use case is broadened, the harder it is to pin down the data fields necessary - this will make it hard for the automation of responses.

·         It would be helpful to document the rationale of the necessary data elements for the sake of implementation and drafting the policy.

·         The requestor would provide the rationale as to why that data element should be disclosed. 

·         All fields will not be disclosed systematically - the requestor would specify which information it would like disclosed and provide a rationale as to why

·         Subsection D

·         6(1)(f) is a valid legal basis for this particular use case, which specifies trademark owners. There may, however, be cases with criminal investigations by law enforcement, which may involve a different legal basis. Is a separate use case needed for this?

·         There may be multiple legal bases that apply here. 6(1)(f) is not incorrect here; it may just be incomplete

·         Who will be doing the balancing test here? Does this mean the balancing test is always in favor of the trademark holder?

·         Assuming that 6(1)(f) is the lawful basis, who is to perform the balancing test?

·         What other legal bases could be involved here? It doesn’t seem it could fall outside 6(1)(f).

·         Discussing the lawful basis of the requestor, that would likely need to be included in another subsection.

·         Subsection E

·         If a requestor has a need to obtain information on multiple domain names, it seems foolish to force the requestor and the CP process each request individually.

·         Bulk access could be elaborated to include section 3.3.1 of the RAA

·         RDAP is set up in a way that you can only request one domain name at a time. 

·         Items 2 - 4 may not be applicable to the requestor - this seems to be general systems on the system rather than burdens or safeguards to the requestor

·         Even though RDAP provides one response at a time, the system could gather the responses together

·         With respect to e5, what is meant by auditing - who will be doing the auditing, and for what purpose?

·         The point is there will be auditing of the requesting and use of the data, but how the auditing will be done is not appropriate for this template.

·         With respect to 3, each individual release of data related to a particular domain name needs to be reviewed. This means there are no shortcuts.

·         With respect to 3, no bulk access should be deleted.

·         Some of the items mentioned here are not necessarily safeguards for the requestor.

·         Opposed to deleting the parenthetical in e3 regarding bulk access

·         E4: there are ways to direct requests automatically - it’s not up to the requestor to figure out where to send the request - the technology generally points the user in the right direction.

·         The point of this exercise is to identify use cases where there could be automated responses, which is consistent with the EC letter

·         Automating is subject to applicable law.

·         Legal decisions need to be made individually for each request.

·         Subsection F

·         Should not end up in a situation where legitimate requests are being rejected because they are deemed abusive. 

·         F2: this is vague and would likely be a feature of the system not a safeguard of the entity disclosing the nonpublic registration data. Entities may not always disclose data if there is no data or if it’s not legal.

·         Fishing expeditions should not be allowed by the system.

·         We don’t want to unnecessarily block legitimate requests.

·         If ICANN compliance is going to be auditing the CP’s use of the system, we may need to put markers down to add additional safeguards so that CPs can respond to audit requests.

·         Clarity on rate-limiting is necessary here b/c companies like MarkMonitor will be submitting a lot of requests.

·         CPs need to be able to protect their systems.

·         Subsection G

·         G3: “decision significantly affecting them” needs to be further defined

·         G seems to mix of items. Would it be possible to define the policy requirements for the data subject?

·         Many of the concepts here are a part of GDPR, so it may be redundant since this is already the law.

·         Art. 25 is relevant here - we need to do privacy by default.

·         It may be good to use these concepts as an opportunity to show the team’s work (G1, 2, 4, 5) 3 seems inapplicable here b/c it seems relevant for a bank loan.

·         Who is going to apply the safeguards? It may be wiser to note who is going to provide these safeguards (the requestor, the entity providing data, etc.) There may be a need for the further working out of these safeguards.

·         Action: Georgios to specify where the items in g below - is it the system, the requestor, or the entity disclosing the data? 

·         These should be closely mapped to the system requirements, but they should not be deleted.

·         There should be a clause that says measures will be taken to safeguard the data subject.

·         Is there a parallel risk assessment activity going on as we are doing this? 

·         ICANN org is not conducting a shadow DPIA while this is being conducted.

·         Re: parallel processes being OK for the TSG. One of those parallel processes should be a parallel risk assessment - perhaps this could be done by John Crain’s team.

·         It may be helpful to wait until we are further down the road to assess the risks - at this point, we are not sure who will be running this system, so this discussion seems premature.

·         Subsection H: Safeguards applicable to the access/disclosure system

·         Alex to provide further feedback to review the updates.

·         Subsection I

·         Perhaps change the wording to eligibility criteria for those requesting accreditation

·         Code of Conduct may be more appropriately placed under safeguards by requestor

·         What is the group thinking of when it refers to evidence of ownership of IP rights? 

·         What does the group mean by accreditation - what does accreditation actually do for the requestor?

·         A code of conduct has not been done before - if this will be a prerequisite to the system, this will be difficult to agree to - perhaps it would be better to call it a data processing agreement rather than a code of conduct.

·         Need to be very clear on what accreditation actually means and what it gets you. The Team should first define what is meant by this concept before saying if it’s needed or not.

·         Do not want to limit how IP rights are to be evidenced - for example, there are common law trademarks. 

·         Request to delete 2 “only issue disclosure requests with respect to the trademark(s) where ownership is evidenced”

·         Team needs to consider accreditation at a high level. Modalities of accreditation can vary largely.

·         Action: Support staff to capture the discussion and send an updated version to the Team for review. This case will be parked for now, and the Team can return to any individual case as needed in the future.



LEA Use Case

 

EPDP Team feedback on diagrams:

 

LEA Use Case Template

 

EPDP Team Feedback - General Comments

 

Is it helpful to think of the overarching purpose for the use cases?

 

Project Plan

 

EPDP Team feedback: