<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dsmullen-ppd-architecture-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PPDArch">Privacy Preference Declaration for Home Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-architecture-04"/>
    <author fullname="Daniel Smullen">
      <organization>CableLabs</organization>
      <address>
        <email>d.smullen@cablelabs.com</email>
      </address>
    </author>
    <author fullname="Brian Scriber">
      <organization>CableLabs</organization>
      <address>
        <email>brian.scriber@computer.org</email>
      </address>
    </author>
    <date year="2025" month="December" day="07"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 42?>

<t>This document proposes a framework that empowers users to define and enforce privacy policies within their home networks through a Privacy Preference Declaration (PPD) protocol and architecture. As connected devices proliferate, this approach enhances user control by enabling user-defined privacy settings for different data types, automatic policy discovery by new devices, and accountability measures such as notifications, network restrictions, or perhaps reporting non-compliance with users' defined preferences to designated authorities. The framework aims to cultivate a privacy-conscious home network environment through clear, enforceable privacy governance.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drspangle.github.io/draft-dsmullen-ppd-architecture/draft-dsmullen-ppd-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dsmullen-ppd-architecture/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/drspangle/draft-dsmullen-ppd-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The rapid growth of Internet-connected devices in the home has introduced new and often overwhelming challenges to personal privacy.
While many of these devices collect sensitive data by design, the tools offered to users to understand or control that collection are fragmented, confusing, or entirely absent.
When privacy settings do exist, they are often buried in obscure menus, expressed in legal or technical jargon, and lack the contextual clarity needed to support meaningful decision-making.</t>
      <t>This results in a deeply flawed model: users are expected to defend their own privacy across a chaotic landscape of inconsistent, ad hoc controls—many of which are ineffective or misleading.
At the same time, device vendors face growing pressure to meet user expectations and comply with evolving privacy regulations.
In response, they often develop bespoke privacy mechanisms that are complex to implement, difficult to maintain, and ultimately fail to provide users with clarity or confidence.
These mechanisms are typically built in isolation, without shared patterns or cross-device consistency, leading to privacy interfaces that are overengineered, underused, and poorly aligned with real user needs.</t>
      <t><xref target="RFC7258"/> frames mass data collection as a technical threat, urging protocol designers to limit exposure through encryption and data minimization.
While this principle is crucial in adversarial, internet-scale contexts, the model proposed in this document takes a different approach: rather than hiding data flows, it seeks to govern them.
Privacy here is not achieved by making devices blind, but by ensuring they are accountable to user-defined preferences.</t>
      <t>This shift benefits both users and developers.
End users gain the ability to make contextual, informed privacy decisions without being overwhelmed by constant prompts or opaque controls.
Developers, in turn, are provided with a clearer, more predictable way to meet privacy expectations—reducing the need to reinvent complex and often inadequate consent and configuration systems.
What is needed is not more prompts or disclaimers, but a coherent mechanism for devices to retrieve, interpret, and respect user-directed privacy choices.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Privacy, as framed in this document, is not centered on anonymity or data minimization in the abstract, but rather on empowering users to understand and shape how their data is collected, used, and shared within their home networks.
This framework introduces a definition of privacy grounded in two core pillars: transparency and user control.
Transparency requires individuals to be provided with a clear and comprehensive understanding of what data is being collected by devices in their environment, how that data is processed and shared, and under what conditions.
This understanding must be accessible and meaningful to non-expert users, ensuring that privacy decisions are made with full awareness of their implications.
User control refers to the ability of individuals to define and enforce privacy preferences across the entire device ecosystem within their home.
Control must be both actionable and enforceable, enabling users to express nuanced policies—such as permitting temperature data collection while prohibiting third-party sharing—and ensuring that devices are held accountable to these expectations.</t>
      <t>The perspective of this document stands in contrast to the approach taken in <xref target="RFC6973"/>, which emphasizes privacy as the reduction of observability, linkability, and identifiability within protocol design.
<xref target="RFC6973"/> recommends minimizing data collection and anonymizing information wherever possible, framing privacy primarily as a technical safeguard against unwanted inference.
In this framework, by contrast, privacy is not defined solely by what is withheld, but by what is understood and governed by the user.
In emphasizing user agency and data governance, this work finds conceptual alignment with <xref target="RFC8280"/>, which frames privacy as a fundamental human right that protocol designers should consider.
<xref target="RFC8280"/> underscores the importance of enabling user autonomy and informed decision-making, values that resonate strongly with this document’s goals.
However, the perspective of this document is more operationally focused: rather than advocating for abstract rights-respecting design principles, it proposes a concrete architectural approach to operationalize those rights within the home environment.
Where <xref target="RFC8280"/> calls for privacy-supportive capabilities in protocol design, this document seeks to instantiate those capabilities through specific, enforceable mechanisms that allow users to express, distribute, and apply their privacy preferences in practice.
Ultimately, this framework reconceives privacy not as a static property to be preserved by systems, but as a dynamic relationship between users and their devices—one that must be actively mediated through transparency and meaningful control.</t>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>Privacy is not about anonymity, but about providing end users with the ability to be aware of how their data is being collected, used, and shared.
It aims to empower users with the knowledge and tools necessary to manage their personal information effectively.</t>
      </section>
      <section anchor="transparency">
        <name>Transparency</name>
        <t>Transparency holds that users possess a clear and comprehensive understanding of what data is collected, how it is utilized, and how it is shared by devices within their network.
It involves making the data practices of devices visible and comprehensible to ensure users are fully informed.</t>
      </section>
      <section anchor="user-control">
        <name>User Control</name>
        <t>User control empowers users to exert meaningful influence over the data collection and dissemination practices of these devices.
It ensures that users have the capability to define their privacy preferences and enforce policies that align with their comfort levels and expectations.</t>
      </section>
    </section>
    <section anchor="limitations-of-existing-mechanisms">
      <name>Limitations of Existing Mechanisms</name>
      <t>Current mechanisms for managing data privacy within the home environment exhibit limitations.</t>
      <section anchor="device-specific-configurations">
        <name>Device-specific Configurations</name>
        <t>Individual devices often employ unique privacy settings, thereby complicating user management of privacy across the entire network.
This complexity can inadvertently lead to unintended data sharing</t>
      </section>
      <section anchor="ineffective-and-unusable-user-interfaces">
        <name>Ineffective and Unusable User Interfaces</name>
        <t>Navigating and configuring privacy settings on individual devices can be a time-consuming and frustrating experience for users.
These ineffective interfaces often lead users to habitually agree to relax their privacy preferences without fully understanding the implications of their decisions.
This fosters a general resignation towards privacy management, making it difficult for users to exert meaningful control over their personal data and ultimately compromising their privacy expectations.</t>
      </section>
      <section anchor="dnt-and-p3p">
        <name>DNT and P3P</name>
        <t>Protocols like Do Not Track (DNT) and Platform for Privacy Preferences Project (P3P) have not achieved widespread adoption and have proven inadequate for addressing nuanced privacy needs.
These protocols lack the granularity required to express fine-grained user preferences and may not effectively prevent unintended data collection or sharing.
For instance, consider a smart security camera within a home network.
While DNT or P3P can signal a user's general preference not to be tracked or share data, they do not enable users to specify detailed privacy settings, such as allowing the camera to record video but not audio, or restricting data sharing to only within the home network.
Users need more precise control options to manage their privacy effectively and ensure their preferences are respected across different devices and contexts.
These limitations, coupled with the increasing complexity of the IoT ecosystem, hinder the effective exercise of user control over their data within the home environment and pose a significant threat to user privacy.</t>
      </section>
    </section>
    <section anchor="vision">
      <name>Vision</name>
      <t>This document proposes a framework aimed at changing how users express their privacy preferences within their home network.
The new paradigm aspires to achieve a seamless and user-friendly experience, where privacy settings do not hinder the use of devices, reduce the burden of configuration management, and eliminate the need to navigate through long, unintelligible legal-language privacy policies.
By simplifying the process for defining privacy preferences, this approach aims to alleviate privacy fatigue and combat the pervasive feelings of resignation that users often experience regarding their privacy choices.
This will empower users to make informed decisions without duress, fostering greater trust and confidence in integrating internet-of-things devices into their homes.
In essence, the vision is to provide users with intuitive mechanisms for expressing privacy preferences, thus ensuring their concerns are addressed effectively and promoting a more private home environment.</t>
      <section anchor="use-case-smart-thermostat-with-location-tracking">
        <name>Use Case: Smart Thermostat with Location Tracking</name>
        <t>Scenario: A user purchases a smart thermostat that offers location-based temperature adjustments.</t>
        <t>User Preference: The user desires temperature adjustments based on their presence at home but wishes to prevent the thermostat from collecting and transmitting precise location data.</t>
        <t>Expected Outcome: The PPD protocol allows the user to define a policy where the thermostat can only determine presence/absence within the home without collecting precise GPS coordinates.
The thermostat must clearly inform the user of this limitation and any potential impact on functionality (e.g., less precise temperature adjustments).
Regulatory frameworks such as the General Data Protection Regulation (GDPR) in the EU and the California Consumer Privacy Act (CCPA) in the U.S. already require companies to obtain explicit consent before collecting and processing sensitive personal data, including precise location information.
The PPD protocol ensures that consent is gathered in a manner that is transparent and comprehensible to the user, preventing scenarios where users might feel pressured or overwhelmed by the decision-making process.</t>
        <t>This protocol empowers individuals to make educated choices regarding their privacy settings by offering clear and concise information about data collection practices, potential risks, and benefits.
It places the user in control, fostering an environment where privacy decisions are made without duress, thus promoting confidence and trust in integrating internet-of-things devices into their daily lives.</t>
      </section>
      <section anchor="use-case-smart-speaker-with-selective-voice-recording-retention">
        <name>Use Case: Smart Speaker with Selective Voice Recording Retention</name>
        <t>Scenario: A user gets a smart speaker that can record and store voice data.</t>
        <t>User Preference: The user wants to keep general conversations for service improvement but prefers sensitive information to be selectively deleted and not retained.</t>
        <t>Expected Outcome: The PPD protocol enables the user to configure the speaker to identify and delete recordings containing sensitive information while retaining other voice data as long as necessary.
The speaker must inform the user about its data collection and storage practices, providing an option to manage selective deletion.</t>
        <t>This outcome significantly enhances the user experience by ensuring privacy preferences are respected seamlessly within the context of their own network.
Users can manage their sensitive information without needing to reveal details to the smart speaker service, which means the user's privacy is upheld.
The smart speaker service only sees the retention preferences, avoiding the risks associated with handling sensitive data, including the preferences themselves which may be considered sensitive.</t>
        <t>Moreover, this streamlined approach means that device manufacturers do not need to expend resources on developing special user interfaces for managing these preferences.
Instead, the preferences are integrated within the home network, allowing for a cohesive and user-friendly experience.
This integration prevents the need for users to navigate separate interfaces or endure educational prompts to manage their privacy settings, fostering a smoother and more intuitive interaction with the device.</t>
      </section>
      <section anchor="use-case-home-security-camera-with-facial-recognition">
        <name>Use Case: Home Security Camera with Facial Recognition</name>
        <t>Scenario: A user installs a home security camera with facial recognition capabilities.</t>
        <t>User Preference: The user desires facial recognition for security purposes but wishes to restrict the storage of captured images and the use of facial recognition data for any purpose other than security within the home.</t>
        <t>Expected Outcome: The PPD protocol allows the user to configure the camera to only store and process facial recognition data for security purposes within the home network and prohibits the sharing of this data with third parties.</t>
        <t>This approach provides numerous benefits for both the camera manufacturer and the user.
For the user, it ensures that their privacy preferences are respected and that their personal data is used solely for the intended security purposes.
By having control over the storage and usage of their facial recognition data, users can feel more secure and confident in their privacy being upheld.
This can lead to a higher level of trust in the device and its manufacturer.</t>
        <t>For the camera manufacturer, implementing such a protocol reduces the risk of data breaches and the misuse of sensitive facial recognition data, which can lead to legal complications and damage to their reputation.
It streamlines the development process, as they do not need to create complex user interfaces for managing these preferences.
Instead, integrating the PPD protocol within the home network allows for seamless and user-friendly privacy management.
This approach can also make the product more attractive to privacy-conscious consumers, increasing its marketability and potentially leading to higher sales.
This outcome showcases a mutually beneficial relationship where user privacy is prioritized, and manufacturers can offer a more privacy-preserving and appealing product.</t>
      </section>
    </section>
    <section anchor="goals">
      <name>Goals</name>
      <section anchor="enhance-user-control">
        <name>Enhance User Control</name>
        <ul spacing="normal">
          <li>
            <t>Empower users with the ability to define and enforce clear, concise, and easily understandable privacy policies for their home networks.</t>
          </li>
          <li>
            <t>Provide users with the means to effectively exercise control over the collection, use, and dissemination of their personal data by devices within their home network.</t>
          </li>
        </ul>
      </section>
      <section anchor="promote-interoperability">
        <name>Promote Interoperability</name>
        <ul spacing="normal">
          <li>
            <t>Establish a standardized mechanism for devices from diverse manufacturers to discover and adhere to user-defined privacy policies, thereby facilitating consistent privacy management across the home network.</t>
          </li>
        </ul>
      </section>
      <section anchor="enable-flexibility">
        <name>Enable Flexibility</name>
        <ul spacing="normal">
          <li>
            <t>Provide a framework that allows for the customization of privacy policies to accommodate the unique privacy requirements and preferences of individual users and households.</t>
          </li>
        </ul>
      </section>
      <section anchor="facilitate-transparency">
        <name>Facilitate Transparency</name>
        <ul spacing="normal">
          <li>
            <t>Ensure that devices within the home network are obligated to provide clear and concise information regarding their data collection and usage practices to users.</t>
          </li>
          <li>
            <t>Establish a mechanism for users to easily understand the implications of their privacy policy settings on the functionality of devices within their home network.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This document focuses on defining a high-level architectural framework for a Privacy Preference Declaration (PPD) protocol specifically designed for home network environments.
This document concentrates on the conceptual framework, key architectural components, and fundamental principles for enabling users to express and enforce their privacy preferences on devices within their home networks.</t>
      <t>This document does not delve into specific implementation details, such as message formats, data structures, security algorithms, or user interface design.
Furthermore, this document does not address enforcement mechanisms, legal and regulatory considerations, or specific security protocols.</t>
      <t>Specific implementation details and message formats will be addressed in subsequent RFCs.
This document aims to be complementary to existing and future standards related to home networking, IoT security, and data privacy.</t>
      <t>This document provides the foundation for subsequent work, including:</t>
      <ul spacing="normal">
        <li>
          <t>Privacy Preference Declaration Taxonomy: This document will define a taxonomy of privacy preference categories and attributes, including a mechanism for registration and management of these categories.</t>
        </li>
        <li>
          <t>Privacy Preference Declaration Protocol Specification: This document will specify the message formats, data structures, and communication procedures for the PPD protocol, including mechanisms for device discovery, policy retrieval, and compliance reporting.</t>
        </li>
      </ul>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>This document makes the following assumptions:</t>
        <ul spacing="normal">
          <li>
            <t>User Control: It is assumed that users have a reasonable level of control over their home network infrastructure.
This includes the ability to configure routers, install software updates, and manage device access to the network.
This control is essential for users to effectively manage their privacy preferences and enforce them on devices within their home network.</t>
          </li>
          <li>
            <t>Resource Constraints: It is assumed that the home network environment and devices operating therein have resource limitations, such as limited processing power and bandwidth.
We limit this assumption by considering that the PPD protocol and its associated mechanisms should be designed with these constraints in mind, minimizing overhead and ensuring efficient operation even on resource-constrained devices.</t>
          </li>
          <li>
            <t>Security Considerations: It is assumed that home networks in scope of this document are susceptible to typical security threats, including insider threats (or non-malicious misconfiguration) and vulnerability to local attacks.
We limit this assumption by considering specific security threats to protect user privacy and the integrity of the privacy policy.
This includes considerations for secure policy dissemination, device authentication, and protection against unauthorized access and modification of privacy preferences.</t>
          </li>
          <li>
            <t>Single User Policy: This document assumes that each device implementing the protocol is governed by a single, unified privacy policy defined by its primary user.
While other individuals within the same physical environment (e.g., household) may have different privacy preferences, the protocol is designed with the expectation that a device conforms to the policy established by its primary user.
Future extensions could explore mechanisms for managing and reconciling multiple user-defined policies on a single device, particularly in shared or multi-user environments.</t>
          </li>
          <li>
            <t>Policy Agreement: It is assumed that devices joining the network are expected not only to retrieve the household privacy policy but also to explicitly agree to abide by its terms.
This agreement forms a crucial part of the association process and is essential for ensuring device compliance with user privacy preferences. Failing to agree to the policy is a failure to adhere to the protocol.</t>
          </li>
          <li>
            <t>Policy Enforcement: At a minimum, devices must acknowledge that they have received and reviewed the user's privacy policy.
This acknowledgment provides a basic mechanism for users to ensure device accountability and decide whether to onboard it onto the network.
Future extensions could introduce more robust enforcement mechanisms to address non-compliance, such as network access restrictions or reporting to a designated authority.
These measures would enhance the integrity of the privacy framework and reinforce user trust.</t>
          </li>
        </ul>
      </section>
      <section anchor="key-components">
        <name>Key Components</name>
        <t>User Interface: A user-friendly interface (e.g., mobile app, web portal) for creating and managing privacy preferences.</t>
        <t>Preference Repository: A secure and reliable mechanism for storing user preferences (e.g., local device, cloud service).</t>
        <t>Declaration Protocol: A standardized protocol for devices to:</t>
        <ul spacing="normal">
          <li>
            <t>Discover and retrieve user-defined privacy policies.</t>
          </li>
          <li>
            <t>Report their data collection and sharing practices.</t>
          </li>
          <li>
            <t>Request user consent for specific data uses.</t>
          </li>
        </ul>
        <t>Enforcement Mechanisms: Mechanisms for devices to enforce user-defined privacy restrictions.</t>
      </section>
      <section anchor="data-flows">
        <name>Data Flows</name>
        <t>This section outlines the high-level data interactions between users, devices, and the Preference Repository in the Privacy Preference Declaration (PPD) framework.
It describes how privacy preferences are defined by users, retrieved by devices, and used to guide behavior in a home network environment.</t>
        <t>The process begins when a user defines a set of privacy preferences that apply to their household.
These preferences may express rules such as which types of data may be collected, under what conditions data may be processed or shared, or which retention practices are acceptable.
The design of the user interface used to author these preferences, including its presentation, usability, or input modalities, is out of scope for this document, and will be addressed separately.
Likewise, the underlying vocabulary and structure of the privacy preferences, including data categories and associated constraints, is specified in (Privacy Preference Declaration Taxonomy).</t>
        <t>Once created, the user’s preferences are stored in a secure Preference Repository, which may reside locally on a networked controller or be accessible through other trusted infrastructure.
When a new device joins the home network, it initiates an onboarding process during which it discovers the repository and establishes a secure channel.
Following onboarding, the device performs association, which involves retrieving the household privacy policy and issuing a formal acknowledgment of its terms.
Devices may optionally report their data handling declarations to the repository at this stage.</t>
        <t>If a device seeks to perform actions not permitted under the baseline policy, for example, collecting or sharing data beyond what the user has authorized may initiate a consent request workflow.
However, the design and behavior of this consent mechanism is explicitly out of scope for this document.
Inappropriate or poorly designed consent flows, such as those that involve excessive prompting, ambiguous language, or misleading options, can inadvertently pressure users into accepting data practices that conflict with their preferences.
Even without malicious intent, these experiences may degrade trust and lead to outcomes inconsistent with user expectations.
Future specifications should ensure that consent interactions are clear, proportionate, and respectful, helping users make informed decisions without friction or fatigue.</t>
        <t>When the household policy is updated, or when a device’s previous association has expired, the device is required to re-associate by re-retrieving and accepting the latest version of the policy.
Reassociation ensures that devices remain accountable to current user expectations over time.
Devices are not expected to re-collect consent for data uses already covered by existing, valid consent.</t>
        <t>To support efficient transmission of privacy policies, consent records, and compliance data (particularly in constrained environments typical of home IoT systems) a compact, machine-readable encoding is recommended.
<xref target="RFC8949"/>, offers an efficient format for structured data that is well-suited for this context.
CBOR balances low-overhead serialization with the ability to represent extensible and semantically rich policy structures.
While this document does not mandate any specific encoding, CBOR should be considered as a candidate for future protocol-level message formats.</t>
        <t>It is important to note that the minimum requirement under this architecture is limited to the discovery, retrieval, and formal acknowledgment of the user’s privacy policy.
This acknowledgment provides a foundational mechanism for establishing device accountability.
However, this document does not define how policy enforcement must be carried out by the device, nor does it specify how to handle cases where a device cannot fully comply with a given policy.
These aspects, including runtime enforcement, conflict resolution, or auditing, may be addressed in future work.</t>
        <t>Finally, while this document defines the overall data flow and interaction sequence, it does not define message formats, communication protocol details, or consent interface specifications.
These elements will be specified in a companion document, (Privacy Preference Declaration Protocol Specification).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For a privacy framework to be effective, it must not only support the expression of user preferences but also ensure that those preferences are protected during transmission, retrieval, and enforcement.
This section outlines the necessary safeguards for ensuring the confidentiality, authenticity, and integrity of the privacy policy, as well as the anonymity of the household during key protocol operations.</t>
      <section anchor="secure-policy-dissemination">
        <name>Secure Policy Dissemination</name>
        <t>Communication between devices and the Preference Repository must be protected against unauthorized access and tampering.
Cryptographic mechanisms such as encryption and mutual authentication should be employed to ensure that only legitimate devices can retrieve privacy policies and that those policies are delivered without modification.</t>
      </section>
      <section anchor="anonymity-and-metadata-protection">
        <name>Anonymity and Metadata Protection</name>
        <t>Even when privacy policies themselves do not contain sensitive personal information, the act of retrieving or acknowledging a policy may reveal characteristics about the household—such as the types of devices in use, specific user preferences, or behavioral patterns over time.
<xref target="RFC7258"/> cautions against protocol designs that expose unnecessary metadata, treating the accumulation of such information as a legitimate technical threat.
This framework takes that warning seriously: metadata exposure during policy retrieval and device onboarding must be minimized to avoid turning privacy infrastructure into a new source of privacy leakage.
Concepts from <xref target="RFC9577"/> may help inform this effort. <xref target="RFC9577"/> introduces techniques for authorization without identification, enabling a client to prove it is authorized without revealing who it is.
While <xref target="RFC9577"/> is optimized for pseudonymous web authentication over the public internet, and assumes a centralized token issuer model, its core ideas—particularly around unlinkable token presentation—could be adapted to the PPD protocol to reduce metadata correlation and minimize household identifiability during policy exchanges.
However, this must be done carefully, as the assumptions of <xref target="RFC9577"/> do not fully align with the goals or context of a local, user-governed home network.</t>
      </section>
      <section anchor="policy-integrity">
        <name>Policy Integrity</name>
        <t>Devices must be guaranteed that the policy retrieved is authentic and unaltered. Integrity protections, such as digital signatures, are necessary to ensure that users’ preferences cannot be tampered with—either in transit or at rest—by other devices, malicious actors, or misconfigurations.</t>
      </section>
      <section anchor="device-authentication">
        <name>Device Authentication</name>
        <t>Devices participating in the privacy framework must authenticate themselves before accessing the Preference Repository.
This ensures that policy dissemination is limited to known, authorized devices, and that users can maintain trust in the integrity of their home network's privacy relationships.
By aligning with the concerns raised in <xref target="RFC7258"/> and incorporating ideas from <xref target="RFC9577"/> where appropriate, this framework seeks to protect users not only from overt data collection, but also from silent inference and passive metadata surveillance.
At the same time, it avoids treating anonymity as an end in itself.
The goal is to support privacy with accountability—where user-defined preferences are respected, devices are identifiable only as much as necessary, and no more, and the user retains ultimate visibility and influence over what occurs within their domain.</t>
      </section>
      <section anchor="policy-agreement-and-enforcement">
        <name>Policy Agreement and Enforcement</name>
        <t>Devices must not only acknowledge receipt of the privacy policy but also explicitly agree to abide by its terms.
This agreement should be recorded and verifiable.
Enforcement mechanisms should be in place to address non-compliance, including network access restrictions or reporting to a designated authority.</t>
      </section>
    </section>
    <section anchor="policy-language">
      <name>Policy Language</name>
      <t>The specific details of the Privacy Policy Language, including its syntax, structure, and extensibility mechanisms, are considered out of scope for this document, which focuses on the overall framework.
The Privacy Policy Language, along with a taxonomy of privacy concepts and attributes, will be fully defined in a separate RFC, the "Privacy Preference Declaration Taxonomy," allowing for more detailed exploration and development of this crucial component of the PPD framework.</t>
      <section anchor="language-requirements">
        <name>Language Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Human-readable: Policies should be easily understandable by users.</t>
          </li>
          <li>
            <t>Machine-readable: Policies should be machine-processable for automated enforcement.</t>
          </li>
          <li>
            <t>Extensible: The language should be flexible enough to accommodate evolving privacy needs and technologies.</t>
          </li>
          <li>
            <t>Internationalization-compatible: Policies and identifiers used within them may need to support multilingual environments and non-ASCII characters.</t>
          </li>
        </ul>
        <t>To ensure consistent interpretation and comparison of string-based policy elements, such as device names, labels, or category identifier string handling practices should align with the guidelines defined in <xref target="RFC7564"/>.
This is particularly important when identifiers or user-facing labels are created, stored, or matched across vendors or systems that operate in different locales or character encodings.</t>
      </section>
      <section anchor="proposed-approach">
        <name>Proposed Approach</name>
        <t>Consider leveraging existing privacy policy languages (e.g., P3P) or drawing lessons from privacy labeling systems used in modern application ecosystems—such as Apple’s App Privacy Labels and Google’s Data Safety section for Android apps.
While these approaches are not protocols per se, they demonstrate how structured, declarative privacy metadata can be communicated to users and systems in a consistent way.</t>
        <t>Alternatively, a new, concise, and user-friendly privacy policy language may be developed specifically for the PPD framework.
One possibility is to define an intermediate representation—similar in spirit to the intermediate representation used in compilers such as LLVM—that captures the fundamental privacy constraints and regulatory considerations (e.g., from GDPR, CCPA) in a machine-readable form.
This representation would support automated enforcement while being straightforward to translate into human-readable language.</t>
        <t>Future specifications should also define guidance for how string identifiers—such as device roles, policy tags, or consent status labels—are formatted, compared, and stored, to avoid ambiguities across systems.
In contexts where internationalized strings are involved, alignment with <xref target="RFC7564"/> should be considered to ensure interoperability and consistency.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>This document defines an architectural framework for enabling users to express and enforce privacy preferences within home network environments.
Several aspects critical to a fully operational implementation are intentionally left out of scope here and are expected to be addressed in future specifications or companion documents.</t>
      <section anchor="policy-taxonomy-and-semantics">
        <name>Policy Taxonomy and Semantics</name>
        <t>A separate document, tentatively titled "Privacy Preference Declaration Taxonomy", will define:</t>
        <ul spacing="normal">
          <li>
            <t>A common vocabulary and set of categories for expressing privacy preferences.</t>
          </li>
          <li>
            <t>Attributes and semantics for data types, sharing constraints, and processing conditions.</t>
          </li>
          <li>
            <t>An extensibility model for incorporating future data types and policy dimensions.</t>
          </li>
        </ul>
        <t>This taxonomy is foundational for consistent policy interpretation across heterogeneous devices and vendors.</t>
      </section>
      <section anchor="protocol-specification-and-message-formats">
        <name>Protocol Specification and Message Formats</name>
        <t>A companion document, "Privacy Preference Declaration Protocol Specification", is expected to define:</t>
        <ul spacing="normal">
          <li>
            <t>Message formats for device onboarding, policy retrieval, acknowledgment, and compliance reporting.</t>
          </li>
          <li>
            <t>Optional mechanisms for consent request flows.</t>
          </li>
          <li>
            <t>Transport-layer considerations and discovery mechanisms.</t>
          </li>
          <li>
            <t>Recommended encoding formats, such as <xref target="RFC8949"/>, for efficient representation of structured data.</t>
          </li>
        </ul>
      </section>
      <section anchor="consent-request-workflow-design-specifications">
        <name>Consent Request Workflow Design Specifications</name>
        <t>The mechanism by which devices request additional user consent for data uses not covered by the baseline policy is out of scope.
However, future specifications should:</t>
        <ul spacing="normal">
          <li>
            <t>Define clear constraints to prevent manipulative or fatiguing consent flows (e.g., dark patterns).</t>
          </li>
          <li>
            <t>Ensure that consent interactions are transparent, infrequent, proportionate, and user-respecting.</t>
          </li>
          <li>
            <t>Explore user interface standards or API affordances to preserve meaningful choice.</t>
          </li>
        </ul>
        <t>This is a particularly sensitive area and must balance user experience, privacy expectations, and implementation feasibility.</t>
      </section>
      <section anchor="enforcement-and-policy-compliance">
        <name>Enforcement and Policy Compliance</name>
        <t>This architecture does not define how privacy policies are to be enforced by devices or how non-compliance is to be detected or remediated.
Future work may include:</t>
        <ul spacing="normal">
          <li>
            <t>Runtime enforcement models and device-side implementation expectations.</t>
          </li>
          <li>
            <t>Auditing mechanisms for verifying compliance.</t>
          </li>
          <li>
            <t>Deconfliction strategies for devices unable to meet all user-defined constraints.</t>
          </li>
          <li>
            <t>Options for escalation (e.g., network access restrictions, notifications, or isolation).</t>
          </li>
        </ul>
      </section>
      <section anchor="user-interface-design-specifications">
        <name>User Interface Design Specifications</name>
        <t>The user-facing interface used to author, modify, and review privacy preferences is out of scope.
Future design guidance may address:</t>
        <ul spacing="normal">
          <li>
            <t>User experience design principles for presenting privacy concepts clearly and accessibly.</t>
          </li>
          <li>
            <t>Models for progressive disclosure of policy impact.</t>
          </li>
          <li>
            <t>Multi-user and household-role-specific control models (e.g., parental vs. administrative roles).</t>
          </li>
        </ul>
      </section>
      <section anchor="internationalization-and-identifier-comparison">
        <name>Internationalization and Identifier Comparison</name>
        <t>In contexts where privacy preferences or taxonomy elements involve user-facing or vendor-defined string identifiers, additional work may be required to:</t>
        <ul spacing="normal">
          <li>
            <t>Define string normalization and comparison rules, particularly for internationalized text.</t>
          </li>
          <li>
            <t>Ensure identifier consistency across diverse vendors and locales.</t>
          </li>
          <li>
            <t>Consider alignment with the <xref target="RFC7564"/> for handling Unicode-aware identifiers in a secure and interoperable way.</t>
          </li>
        </ul>
      </section>
      <section anchor="interoperability-testing-and-reference-implementations">
        <name>Interoperability Testing and Reference Implementations</name>
        <t>Future work may also include:</t>
        <ul spacing="normal">
          <li>
            <t>Development of reference implementations of the PPD protocol and repository components.</t>
          </li>
          <li>
            <t>Interoperability testing across devices and vendors.</t>
          </li>
          <li>
            <t>Conformance guidelines and self-certification procedures.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC8280">
          <front>
            <title>Research into Human Rights Protocol Considerations</title>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
            <author fullname="C. Cath" initials="C." surname="Cath"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973). The other parts of this document explain the background of the guidelines and how they were developed.</t>
              <t>This document is the first milestone in a longer-term research effort. It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8280"/>
          <seriesInfo name="DOI" value="10.17487/RFC8280"/>
        </reference>
        <reference anchor="RFC9577">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document defines an HTTP authentication scheme for Privacy Pass, a privacy-preserving authentication mechanism used for authorization. The authentication scheme specified in this document can be used by Clients to redeem Privacy Pass tokens with an Origin. It can also be used by Origins to challenge Clients to present Privacy Pass tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9577"/>
          <seriesInfo name="DOI" value="10.17487/RFC9577"/>
        </reference>
        <reference anchor="RFC7564">
          <front>
            <title>PRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application Protocols</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Application protocols using Unicode characters in protocol strings need to properly handle such strings in order to enforce internationalization rules for strings placed in various protocol slots (such as addresses and identifiers) and to perform valid comparison operations (e.g., for purposes of authentication or authorization). This document defines a framework enabling application protocols to perform the preparation, enforcement, and comparison of internationalized strings ("PRECIS") in a way that depends on the properties of Unicode characters and thus is agile with respect to versions of Unicode. As a result, this framework provides a more sustainable approach to the handling of internationalized strings than the previous framework, known as Stringprep (RFC 3454). This document obsoletes RFC 3454.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7564"/>
          <seriesInfo name="DOI" value="10.17487/RFC7564"/>
        </reference>
      </references>
    </references>
    <?line 469?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
