You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 14 Next »

THIS IS DRAFT ! 

Assessment of the GDPR implications on eduGAIN constituency was conducted and the results are presented in the Assessment of DP legislation implications document

Based on this assessment, following action points can be attributed to eduGAIN central function (in table only eduGAIN), REFEDS, Identity Federation Operators, Service Providers and Identity Providers. 


Action TopicWhoDescriptionHowStatus
Publishing contacts in metadataeduGAIN

Operational contact information for individual administrators IdPs, SPs, AAs and Identity Federations is collected in the metadata published by Identity Federation Operators. The information is held and published in the eduGAIN database and in the eduGAIN metadata.

Published contacts in metadata  should not be personal but rather to functions.

Advise identity federation operators.

If personal information is unavoidable, Article 15 on the Rights of Access by the data subject applies.

**ANC: true that Art15 applies, but I'm not sure how saying helps? If you want that to be an actionable statement, you need to at least say whether individuals should send their Art15 requests to eduGAIN or their FedOp? I'd suggest the latter

**MA: cant we specify that contacts related to functions are to be used. Then we can consider that no personal data collected, and if somebody still sends it, well its their own "problem".

**PAx: I would say "strongly recommend not to use personal contact addresses in metadata due to GDPR" is a good way to indicate what we're after. Right to Access is available per entity through https://technical.edugain.org/entities. To get a list of all they need to contact the issuing federation. That is also the answer for Article 15 on Right to Rectification and Article 17 on Right to Erasure.


Identity Federations

Operational contact information for individual administrators of IdPs, SPs and AAs is collected in their metadata.

Published contacts in metadata  should not be personal but rather to functions

Recommend their IdPs, SPs and AAs to use non-personal contact information in the metadata. If personal information is unavoidable, Article 15 on the Rights of Access by the data subject applies.

**ANC: as above

**MA: as above

** PAx: as above


SG members contactseduGAINContact information for the eduGAIN Steering Group delegate and deputy of all member federations are collected and published on the technical website.

Inform member federations that information about their SG delegate and deputy is published on the technical website. Processes in eduGAIN should ensure that the individuals mentioned have the appropriate ability to ensure this information is accurate and to understand how it is used (as described in Article 15 Rights of access by the data subject).

**MA: Is it necessary to keep the SG delegates list public? IMHO technical contacts yes, but those are not necesserly the same as SG. Should we consult this with SG on this?

**PAx: No I don't think we need to have that list ublic. It's always possible to aks eduGAIN OT or eduGAIN SG flywheel for the information when you need it.


Data Processor Agreements - DPAIdPs, SPsGDPR regulates the release of personal information from an IdP/AA to SP. Scalable minimal Attribute Assertions should be addressed with use of entity categories. However, where scalable models do not apply, the contracting parties cam make bilateral DPA agreements.

Can make bilateral DPAs where scalable models do not apply.

**ANC: I agree that having a bi-lateral agreement is an option, but it seems unlikely that the SP would be a data processor in this case? If the IdP is handing over more data than necessary, this feels much more likely to be for a purpose set by the SP, in which case the SP is a data controller. I'd also expect it to be much more common for clauses to be incorporated into an existing contract between the parties (e.g. a site licence) rather than a stand-alone agreement?

** PAx: The federation is used both for traditional procurement services and for the more interesting access by user based on need. I think we need to keep bilateral but add something about that it doesn't work in most cases due to the structure of research collaborations.


Identity FederationsSupport the IdPs and SPs, and help them identify where scalable models dont apply.
eduGAIN /REFEDS

Consider to develop a sample bilateral Data Processor Agreement in the BCP package, with the caveat that implementation must be at the risk of the contracting parties

**MA: Are we still planning to do this. If yes, who and what is ETA?

**PAx: I think we should drop it!


GÉANT Data Protection Code of Conduct - CoCoeduGAINThe current version of the CoCo describes an approach to meet the requirements of the EU DPD. It defines behavioural rules for SPs that want to receive attributes from IdPs/AAs about the user that logs in to the service.

Update GÉANT CoCo to reflect the changes between the new GDPR and the old DPD.

After completion, new CoCo v2.0 must be submitted to the EU GDPR competent supervisory authority of approved codes of conduct as described in GDPR Article 40. After the submission of CoCo v2.0. GÉANT shall work together with the competent supervisory authority to get CoCo v2.0 approved as an official GDPR Code of Conduct, effective after 25 May 2018.

In parallel with the approval process, adoption and use of CoCo v2.0 within eduGAIN will be formalised as Best Practice for both SPs and IdPs.

The work on a new version of CoCo commenced by a small team of identity federation specialists with support from DLA Piper. The draft version has been substantially completed and has been sent out to consultation within the international identity federation community.The interim working draft was published in June 2017 and an explanatory memorandum is being prepared in parallel.

** PAx: Second draft published and consultation period is finished.

Identity FederationsPrepare the tooling and processes to enable adoption of GÉANT CoCo v2 by IdPs and SPs
REFEDS Research and Scholarship Entity Category -REFEDS R&SREFEDS

REFEDS R&S is designed to allow data to flow to research and scholarship interaction SPs, that have a legitimate interest in the data.The attributes supported in REFEDS R&S are chosen to represent a privacy baseline such that further minimisation achieves no particular benefit.

The impact of the GDPR is low due to the fact that REFEDS R&S is based on necessary use of the service and utilises the minimal Attribute Assertion (shared user identifier, person name, email address and the optional organisational affiliation).

Should perform an assessment of the GDPR on REFEDS R&S: use of consent, use outside EU/EEA and the applicability as certification mechanism. Explore the potential of certifying the REFEDS R&S as Certification bodies emerge.

**ANC: do you really want to involve certification bodies/processes/etc. in R&S? The whole point of it was to be lightweight, and certification would almost certainly make that impossible

** PAx: I agree with ANC,


eduGAINIncorporate  REFEDS R&S as BCP
Identity FederationsImplement a lightweight audit for before applying the REFEDS R&S tag to ensure that the  data in the attribute bundle is legitimately required by SP. This is supported by a risk management toolkit to help organisations make effective decisions when supporting REFEDS R&S. 
IdPs

As REFEDS R&S is based on necessary use by legitimate interest, the IdPs can remove the consent question. Transparent privacy notice in which the IdP explains to the end user which attributes are released and why can be used instead.

**ANC: fully agree with this statement, so a bit puzzled why you're mentioning "consent" as something REFEDs should be reviewing in the R&S context above?

** PAx: Consent CAN ONLY be used with R&S for export outside EU/EEA due to the legal basis legitimate interest. But how to do descide when to do a consent reqeuest or not?


Security Incident Response Trust Framework for Federated Identity – SIRTFIeduGAIN

SIRTFI aims to enable the coordination of incident response across federated organisations. This assurance framework comprises a list of assertions which an organisation can attest in order to be declared SIRTFI compliant.

In GDPR Chapter IV Section 2 the security practices for data breach of personal data are defined. Security incidents involving breach of personal data are in scope for SIRTFI.

The recommended way to meet the requirement of the GDPR with regard to handling communications around data breaches within the federated environment is to use the SIRTFI framework.

SIRTFI Best Practice will therefore be positioned formally within eduGAIN as recommended practice, and supported by the central function for data breaches.

SIRTFI has also been included in the GÉANT CoCo v2.0 specification to address GDPR requirements on incident response. SIRTFI states that the use of the Traffic Light Protocol (TLP) must be used to facilitate such information sharing.

**ANC: note that the Article 29 draft guidance on breach notification makes their strongest statement yet that all data controllers should have an effective process to detect and deal with security incidents (smile)


The SIRTFI framework was finalised in late 2016, and adoption of SIRTFI throughout the eduGAIN membership is underway.
Use of ConsentIdPs

Where consent is applicable, all consent should always be given freely, and be specific, informed and unambiguous.When Attribute Assertion is based on one of the defined necessary processing models in Chapter II Article 6, consent is not considered applicable.

Negative consent cannot be used, i.e IdP cannot ask the user to uncheck a box in order to stop information being shared.

Consent should only be used when the Attribute Assertion is not necessary.

When one of the entity categories CoCo or REFEDS R&S is used for Attribute Assertion, IdPs should not ask for consent.

Consent mechanisms may be adapted to support the requirement for transparent privacy notices rather than consent.


Identity Federations, eduGAIN

Further, specific investigation of the relationship between use of consent and other attribute release mechanisms is therefore recommended, including seeking specific legal opinion when preparing Best Common Practice (BCP).

**ANC: whenever I've raised this the problem seems to be that protocols don't provide an SP with a way to say "I can use this attribute but I don't need it". As far as I can see it's only those kinds of attributes where consent might be a valid legal ground. I agree a further investigation would be useful (though I think it's a technical one, not a legal one) to conclude and document either the BCP for how to express that kind of attribute or to say that it can't be done with current protocols

** PAx: Or strategy up til today has been to only work with "simple" releases of either a small standard bundle or using strict neccesariy attributes.


Interoperability with Jurisdictions outside the EU and EEASPs outside of EU/EEA

The increased territorial scope in the GDPR makes all SP that supply services to end users within the EU/EEA affected by the GDPR.

SPs outside the EU/EEA must comply with the GDPR for their European users and if they cannot fulfil this requirement they should not offer the services to federated users from within the EU/EEA.

**ANC: I disagree. It's up to the IdP to decide whether or not the benefit of providing a service to its users justifies the risk. And it's also up to the SP to decide whether the risk of offering services to EEA users is justified. So "SPs outside the EU/EEA SHOULD comply with the GDPR, and EEA IdPs SHOULD assess the risks of releasing attributes to them". But, since no one actually knows what a "compliant" non-EEA SP looks like (and the status of any SP could easily change, for example if Privacy Shield is cancelled), by saying this MUST you're giving the perfect excuse to universities who are already saying "unless you can guarantee compliance then we're turning eduGAIN off"; to user communities who would rather use GoogleAuth; and to service management who are nervous about offering services through eduGAIN. "Google isn't saying this scary stuff, so clearly it's safer to use Google" (sad)

** PAx: I would right this as an recommendation, not a must. Is always a risc based descision.

The entity categories CoCo and REFEDS R&S should be used to handle Attribute Assertions from IdPs within the EU/EEA to SPs outside.


Rights of the Data SubjectSPs, Identity Federations, eduGAINThe rights of the data subject are fundamental to the GDPR and therefore it is important for organisations to fully understand and respect these rights.

Create a privacy policy that describes what and how personal data is used in the service. It is recommended that appropriate privacy policies are published for all levels of identity federation services, from eduGAIN centrally to federations to IdPs and SPs to demonstrate transparency of compliance to the GDPR.

The upcoming version 2 of the CoCo will contain information on how to uphold the rights of the End User that can be adapted to provide a framework for such privacy policies.

**ANC: a lot of GDPR is about individuals being able to exercise their rights. If you're drafting template policies at the different levels, I think it would also be helpful to map out which level individuals should contact to exercise each of their rights.

** PAx: Very true. For all templatet we do, policies, notices and others, we should add information where the users should excersive their rights.




  • No labels