Logo

051040043 - EPDP-Phase 2A Team Call - Shared screen with speaker view
Terri Agnew
18:48
Please review ICANN Expected Standards of Behavior here: https://www.icann.org/resources/pages/expected-standards-2016-06-28-en**Reminder, when using chat, please select all panelists and attendees in order for chat to be captured after the meeting.
Berry Cobb
20:28
https://docs.google.com/document/d/1CqczmN_ShkDFgx05q8AyUX5iDM2u5dul/edit
Terri Agnew
28:29
**Reminder, when using chat, please select all panelists and attendees in order for chat to be captured after the meeting.
Berry Cobb
29:44
https://docs.google.com/document/d/1UCP86uPZJBA_oh_4lfa6GwisfqnXUgbi5kdq-VOQCS0/edit#
stephanieeperrin
36:56
I am not sure exactly who the “security research community” is, and what efforts they currently make to protect the personal information of those who fall within their sights….
stephanieeperrin
37:27
My understanding is that they sell data to their security clients, is that not the case?
Thomas Rickert (ISPCP)
37:31
I agree, Laureen
stephanieeperrin
39:21
I think we should not try to play with the term “anonymous”. It means what it says.
stephanieeperrin
40:31
If Lexis Nexis is the user, is anything really anonymous? Ditto Google and Facebook?
Brian Beckham (WIPO)
46:59
I am unmuted on my end
Brian Beckham (WIPO)
47:29
yes can also put a vcomment in chat -- apolgies
Terri Agnew
47:42
@Brian, let us know if a dial out would be helpful
Brian Beckham (WIPO)
48:07
Wonder if adding something like "without some technical means of reverse engineering" would assist here? (Something to get at the fact that this requires a an effort to unmask.) Could even be as a footnote to the term "virtually"
Brian Beckham (WIPO)
48:26
Something to that effect...
Laureen Kapin
50:52
From Breyer: “if the identification of the data subject was prohibited by law or practically impossible on account of the fact that it requires a disproportionate effort in terms of time, cost and man-power, so that the risk of identification appears in reality to be insignificant.”
Brian Beckham (WIPO)
52:24
No Problem Laureen -- the spirit of the quote you put in the chat is what I was trying to convey (if useful, of course).
Hadia Elminiawi (ALAC)
53:03
@Becky I agree we are saying the same thing
Caitlin Tubergen
55:10
https://docs.google.com/document/d/1dIWcohcoy4wTLNKB8Rs85izf8Fldn1pJP7fHx1_5bbw/edit
Hadia Elminiawi (ALAC)
57:29
Nis2 is included in Question 6
Hadia Elminiawi (ALAC)
58:45
If I got the numbers correct - I am looking at the questions without numbers
Hadia Elminiawi (ALAC)
01:01:21
The last question - says" do theses facts affect your answers to questions 1-3"
stephanieeperrin
01:04:02
If we start talking about types of risk, we very soon get to my favorite type of risk: repetitional risk. Mostly throughout this entire process we have only focused on financial risk, through GDPR enforcement.
Hadia Elminiawi (ALAC)
01:04:21
ok
stephanieeperrin
01:04:30
Reputational, rather
Hadia Elminiawi (ALAC)
01:07:18
Let's discuss
Hadia Elminiawi (ALAC)
01:07:56
Ok makes sense to have Melina with us
Laureen Kapin
01:08:10
I"m happy to support Melina's views on her proposed question.
Keith Drazek (Verisign)
01:08:44
+1 in the interest of time and scheduling for the plenary and update to GNSO Council, please tee up the discussion now.
Terri Agnew
01:16:11
**Reminder, when using chat, please select all panelists and attendees in order for chat to be captured after the meeting.
Hadia Elminiawi (ALAC)
01:16:11
@Volker yes, but I think the intent was to ask for further safeguards
Laureen Kapin
01:16:58
I agree that the prior question and last sentences of 4(b) does get at add'l mitigation/safeguards.
Keith Drazek (Verisign)
01:17:54
Thanks Becky, all, for your important work here in support of the plenary.
Laureen Kapin
01:17:58
Hooray upon nearly getting to submission!
Tara Whalen
01:18:05
+1
Hadia Elminiawi (ALAC)
01:18:11
Thank you Becky and all
Hadia Elminiawi (ALAC)
01:18:16
bye for now