<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.5) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-howe-vcon-lifecycle-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="vCon Lifecycle">vCon Lifecycle Management using SCITT</title>
    <seriesInfo name="Internet-Draft" value="draft-howe-vcon-lifecycle-00"/>
    <author fullname="Thomas McCarthy-Howe">
      <organization>Strolid, Inc.</organization>
      <address>
        <email>thomas.howe@strolid.com</email>
      </address>
    </author>
    <author fullname="S. Lasker">
      <organization>Independent</organization>
      <address>
        <email>stevenlasker@hotmail.com</email>
      </address>
    </author>
    <author fullname="Diana James">
      <organization>Marashlian &amp; Donahue, PLLC</organization>
      <address>
        <email>daj@commlawgroup.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="21"/>
    <area>art</area>
    <workgroup>vcon</workgroup>
    <keyword>data privacy</keyword>
    <keyword>data subject rights</keyword>
    <keyword>conversation</keyword>
    <keyword>vcon</keyword>
    <keyword>CDR</keyword>
    <keyword>call detail record</keyword>
    <keyword>call meta data</keyword>
    <keyword>call recording</keyword>
    <keyword>email thread</keyword>
    <keyword>text conversation</keyword>
    <keyword>video recording</keyword>
    <keyword>video conference</keyword>
    <keyword>conference recording</keyword>
    <keyword>SCITT</keyword>
    <keyword>transparency</keyword>
    <abstract>
      <?line 150?>

<t>This document proposes using the SCITT (Supply Chain, Integrity, Transparency, and Trust) protocol to record, communicate and coordinate the lifecycle of Virtual Conversations (vCons), which are standardized containers for conversational data like call recordings, transcripts, and chat logs.
While vCons enable capturing and sharing conversation details for AI analysis and business purposes, they lack mechanisms for proving compliance with privacy regulations and consent management.
SCITT addresses this by providing an immutable, append-only transparency ledger that records key lifecycle events—from vCon creation and consent management to call recording, as well as data processing and deletion—enabling entities to demonstrate regulatory compliance and maintain trust across distributed systems.
The framework specifically addresses consent management challenges under regulations like GDPR and CCPA, where consent can be revoked at any time, requiring coordinated deletion across all parties that have received the vCon.
By combining vCons with SCITT, organizations can build scalable, transparent governance systems that protect personal data rights while enabling responsible use of conversational data for AI and business applications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://howethomas.github.io/vcon-dev/draft-howe-vcon-lifecycle.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-howe-vcon-lifecycle/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Virtualized Conversations Working Group mailing list (<eref target="mailto:vcon@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/vcon/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/vcon/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/vcon-dev/draft-howe-vcon-lifecycle"/>.</t>
    </note>
  </front>
  <middle>
    <?line 158?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Virtual Conversations (vCons) <eref target="https://datatracker.ietf.org/wg/vcon/about">draft-vcon</eref> are powerful means of
   capturing and collaborating on the details of human conversations,
   built to travel.  They feed AI systems, enable entities to respond
   more accurately to customer needs, and manage the health of their
   business more effectively.  The vCon working group focuses on
   passing conversational data, such as data commonly generated and
   collected in business and security environments, from chat logs to
   transcripts to recordings.</t>
      <t>Most systems provide a way to store such information, but there are
   few standards or interoperability within the storage or transmission
   mechanisms.  vCon is a framework for capturing and collaborating on
   the details of a Virtual Conversation, feeding AI systems, and
   enabling entities to respond to customer needs more accurately and
   manage their business's health more effectively.</t>
      <t>The two opposing forces influencing such information passing are
   trying to enforce personal data and communications privacy and providing the ability and
   interest to use conversations in various ways, e.g., AI analysis.</t>
      <t>Although vCons are tools that enable actors to do the right thing,
   they are not tools that enable actors in a distributed system to
   prove it.  However, when combined with the SCITT protocol
   <eref target="https://datatracker.ietf.org/wg/scitt/about">draft-scitt</eref>, proof becomes practical.  SCITT allows Relying Parties
   to obtain information pertinent to the lifecycle of a vCon in a
   "transparent" way.  SCITT achieves this by having producers publish
   information in a Transparency Service, where Relying Parties can
   check the information.</t>
      <t>These relying parties can then use this information to make decisions
based on the current state and context of the vCon to account for changes
in consent, updates in the accuracy of the content, or amendments of the
information it might contain.
SCITT, the Supply Chain, Integrity, Transparency, and Trust protocol,
enables clients to register statements about events, physical or virtual,
such as when things are created or used.
These statements are immutable and are useful to support auditing,
governance, and coordination between various distributed systems.</t>
      <t>When using vCons to define a conversation, and SCITT to record the
events that occur to them, more scalable and transparent systems of
governance and provenance can be constructed to support privacy
efforts.  It is expected that there are many situations where this
governance across security boundaries is common and desired by all
parties.  One real-world example of this is management of consent as
it applies to the use of conversations for different purposes,
such as machine learning.  Using conversations as inputs to machine
learning has great benefit to both customers and businesses, yet only
responsibly within the defense of
personal data rights and compliance with personal data and
communications privacy laws, united together
by consent. Although consent to a call recording or personal data
collection and processing is not always required under the applicable
laws, seeking consent is often the best practice, given the Privacy by Design
principles, multijurisdictional business operations, and the ever-changing
privacy laws. Please see the <eref target="https://datatracker.ietf.org/doc/draft-james-privacy-primer-vcon/">privacy-primer-vcon</eref> for more information on
consent and other data subject protection concepts.</t>
      <t>In all of these cases, the ability to define and express the processing of
conversations depends on the ability to authoritatively define the lifecycle of a vCon:</t>
      <ul spacing="normal">
        <li>
          <t>who originated the vCon in the first place to establish provenance</t>
        </li>
        <li>
          <t>how it was analyzed and amended, to accurately respond to right-to-know requests</t>
        </li>
        <li>
          <t>the authenticity both of the original document for downstream workflow</t>
        </li>
        <li>
          <t>and authenticity of the redactions that come from the original, in service of data minimization efforts</t>
        </li>
        <li>
          <t>the various expressions of digital rights</t>
        </li>
        <li>
          <t>the sharing or deletion in response to the same digital rights</t>
        </li>
      </ul>
      <t>For this document and for purposes of illustration, consent will be used as an example use case.
Proper consent management is fundamental to the responsible protection of data and the ability
to leverage that data. Consent granted by the data subject of a vCon also needs to be stored
and passed, exactly like the other information contained in a vCon. Unlike the rest of the
information contained, the gathered consent is expressly not immutable. Consent, when gathered
for a purpose, can also be revoked by the data subject at any time and surely after a vCon has
been shared for analysis.</t>
      <t>Multiple regulations, including the US-born California Consumer Protection Act (CCPA) <eref target="https://oag.ca.gov/privacy/ccpa">CCPA</eref>
and the EU-born General Data Protection Regulation (GDPR) <eref target="https://gdpr.eu/">GDPR</eref>, outline requirements for
entities to use and dispose of PII information responsibly upon request. Consent, although
illustrative, is not the only example of mutability in the lifecycle of a vCon.
Verification of parties, improvements in the analysis, and additions of contextual attachments
result in updates to a vCon after data is shared, begging for a mechanism to
track and govern such changes.</t>
      <t>To honor the working group's charter to pass conversational data safely between consenting
parties, this draft provides an overview of the requirements, a workflow and an example
consent structure for using SCITT to manage the vCon lifecycle at scale, providing end-to-end,
interoperable services and tooling. The workflow enables entities in the workflow to
collaborate on a vCon while assuring all entities in the workflow adhere to relevant
PII regulations using a SCITT Ledger. Actual implementations of these workflows are left
to implementers and applications; this draft provides an authoritative list of the entries
that should appear on the SCITT transparency ledger to enable them.</t>
      <section anchor="acts-of-trust-and-transparency">
        <name>Acts of Trust and Transparency</name>
        <t>Throughout this workflow, no single entity can prove that other entities performed the
required actions. However, by auditing the SCITT Ledgers of all involved parties, entities
can prove they acted on the acknowledged consent and intent of the Data Subject, holding
other entities accountable for performing required operations.  In short, this audit can
help to prove that "the good guys did the right thing", to measure the compliance of those
outside this architecture who may have chosen different methods of compliance assurance.</t>
      </section>
      <section anchor="standards-based-interoperability">
        <name>Standards-Based Interoperability</name>
        <t>A wide range of industries and business scenarios benefit from virtual conversations,
making them valuable across countless organizations.The breadth of industries and
scenarios that benefit from virtual conversations spans numerous companies.
The power of this technology lies in enabling cross-conversation collaboration.
By implementing a standards-based approach, both collaborative and competitive
companies can easily integrate with solutions for transcription, consent management,
and CRM integration.</t>
        <t>Packaging conversations and associated metadata in the vCon format provides a
standardized means to communicate what has been sent. Due to the personally
identifiable information and digital fingerprinting in vCons, it's critical
to understand and adhere to regulatory requirements for PII management. Defining
and implementing a standard provides stability in information management throughout the lifecycle.</t>
        <t>Recording which vCon elements were sent to various parties holds each accountable
for what was sent, what was received, and when these exchanges occurred.</t>
      </section>
      <section anchor="what-differentiates-scitt-from-a-database">
        <name>What Differentiates SCITT from a Database</name>
        <t>The information written to SCITT could be compared to information in a standard database. What makes SCITT different:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Immutable and Append-Only nature</strong>: Once written, data cannot be modified or deleted</t>
          </li>
          <li>
            <t><strong>Cryptographic security</strong>: Through pre-signed statements, making SCITT a notary that cannot alter contents</t>
          </li>
          <li>
            <t><strong>Independent verifiability</strong>: Parties can verify data without trusting the service provider</t>
          </li>
          <li>
            <t><strong>Separation</strong>: Between the immutable, append-only ledger and the evidentiary metadata store (which can be deleted/redacted for PII governance)</t>
          </li>
          <li>
            <t><strong>Standardized communication</strong>: And enforcement of regulations and compliance</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 <eref target="https://www.rfc-editor.org/info/rfc8174">RFC2119</eref> when, and only when, they appear in all
   capitals, as shown here.</t>
      <t>The following terms, derived from <eref target="https://oag.ca.gov/privacy/ccpa">CCPA</eref>, <eref target="https://gdpr.eu/">GDPR</eref> and <eref target="https://datatracker.ietf.org/doc/draft-james-privacy-primer-vcon/">privacy-primer-vcon</eref>, are used throughout the document:</t>
      <t><strong>Conserver</strong>: A vCon workflow engine that ingests vCons, routing them for
processing and enhancements. A conserver doesn't store a vCon, rather it processes
the vCon for transcription, sentiment, integrity protection on egress, verification
on ingress, retrieving it from, and saving it to a vCon Registry.</t>
      <t><strong>Data Subject</strong>: The individual(s) whose personal information is processed
(also referred to as the "consumer" in many personal data privacy laws).</t>
      <t><strong>Data Originator</strong>: The Entity that records and initiates the vCon,
identifying the parties, including the media of the conversation.
For a phone call, this may include the phone numbers and the audio
recording.  For internet-based calls, such as Microsoft Teams, Zoom,
Google meet, this may include emails and audio/video recording.  The
Data Originator is a facilitator with access to the content of the
call. This document addresses the instance where the Data Originator
is a data processor under the applicable data privacy laws, collecting
and processing data on behalf of a Data Controller. However, Data Originators
may also act as Data Controllers when collecting and processing data for
their own purposes. This document does not address such an instance, and
implementers will need to adjust the technical process accordingly. In general,
Data Originators may be required to collect consent by applicable law when acting
as Data Controllers and by the relevant data processing agreements with Data
Controllers when acting as Data Processors. .  One or all of the
Data Subjects must initiate consent, giving the Data Originator the
right to record the conversation, which may be the Data Controller's
responsibility to identify.</t>
      <t><strong>Data Controller</strong>: An Entity or individual with decision-making
authority over data processing who determines the purposes and
methods of data processing, bears primary responsibility under
privacy laws and is the main target of most privacy and data
protection regulations. Under most data privacy laws, Data Controllers
are required to enter into data processing agreements with their Data Processors, detailing the rules for data collection and processing in accordance with applicable laws.</t>
      <t><strong>Data Processor</strong>: An individual or an Entity, which processes personal
data on behalf of the Data Controller. It is often a third-party service
provider who processes data on behalf of the data controller.  Under HIPAA
data processors are referred to as "business associates." Data processors
may be hired for specialized tasks or to improve efficiency; can subcontract
to other processors, creating a chain of responsibility; must operate within the
scope defined by the data controller; and are expected to maintain trust and adhere
to the controller's guidelines. A Conserver often calls out to Data Processors for
Transcription, Sentiment Analysis, Fraud Detection, email/text messaging.</t>
      <t><em>Processing</em>: Any operation or set of operations which is performed on personal data
or on sets of personal data. Among other things, this includes collection, storage,
use, disclosure, and deletion.</t>
      <t><em>Personal Data</em>: any information relating to an identified or identifiable Data Subject,
including a name, an identification number, location data, an online identifier or to
one or more factors specific to the physical, physiological, genetic, mental, economic,
cultural or social identity of the Data Subject.</t>
      <t><strong>Entity</strong>: A generic reference to companies, groups or individuals
that may share, alter, or use a vCon.  An Entity may be a Data
Originator, Data Controller, Data Processor or some other role that
has not yet been defined that participates in the possession and/or
processing of a vCon.</t>
      <t><strong>Party</strong>: A party, or participant of a vCon, as identified in the vCon draft.</t>
      <t><strong>SCITT Transparency Service</strong>: An append-only ledger for integrity protecting vCons, ensuring the state of a vCon is known at a point in time for conformance to governance and regulatory requirements.</t>
      <t><strong>vCon Registry</strong>: A storage service, capable of storing vCons, including rich metadata and larger attachments including audio and video recordings.</t>
    </section>
    <section anchor="vcon-lifecycle">
      <name>vCon Lifecycle</name>
      <section anchor="example-use-case-consent-management">
        <name>Example Use Case: Consent Management</name>
        <t>The example use case, consent management, has the following requirements, all considered necessary to fulfill the proper sharing of personal information responsibly:</t>
        <ul spacing="normal">
          <li>
            <t>As an individual, I wish to express my data subject rights to express my consent for various purposes, and to withdraw the same.</t>
          </li>
          <li>
            <t>As a member of an organization, I want to operationally assure that the processing of personal data is within the consent I gained from the data subject, and to safely record those activities to provide to both data subjects and governance bodies.</t>
          </li>
          <li>
            <t>As a regulator, I wish to have a measurement system to support compliance, bias and regulatory enforcement of policy.</t>
          </li>
          <li>
            <t>As a technologist, I wish to maintain the integrity of conversational pipelines, maintaining the trust both stakeholders and data subjects have in the trust and transparency of the process.</t>
          </li>
        </ul>
      </section>
      <section anchor="vcon-lifecycle-scope">
        <name>vCon Lifecycle Scope</name>
        <section anchor="creation-distribution-and-deletion">
          <name>Creation, Distribution and Deletion</name>
          <t>The vCon lifecycle comprises a series of phases from creation through distribution to deletion.
Tracking these phases enables fundamental privacy rights, such as the right to know how your
data was processed, and secures AI supply chains by establishing provenance and guaranteeing integrity.</t>
          <t>The phases of a vCon's life include:</t>
          <artwork><![CDATA[
+----------------+     +----------------+     +----------------+
| 1. vConCreated |---->| 2. Recording   |---->| 3. vConSent    |
|                |     |    Added       |     |                |
+----------------+     +----------------+     +----------------+
                                                      |
                                                      v
+----------------+     +----------------+     +----------------+
| 6. vConSentTo  |<----| 5. vConEnhanced|<----| 4. vConReceived|
|    Processors  |     |                |     |                |
+----------------+     +----------------+     +----------------+
        |
        v
+----------------+     +----------------+
| 7. Data        |---->| 8. vConDeletion|
|    Processing  |     |                |
+----------------+     +----------------+
]]></artwork>
          <ol spacing="normal" type="1"><li>
              <t><strong>vConCreated</strong>: The call completes, and a vCon is created with call metadata stored in the vCon Registry.</t>
            </li>
            <li>
              <t><strong>RecordingAdded</strong>: The actual recording is saved and added to the attachments section of the vCon.</t>
            </li>
            <li>
              <t><strong>vConSent</strong>: The Data Originator sends the vCon to the Data Controller with integrity protection using SCITT.</t>
            </li>
            <li>
              <t><strong>vConReceived</strong>: The Data Controller receives the vCon and records this in the SCITT Transparency Service.</t>
            </li>
            <li>
              <t><strong>vConEnhanced</strong>: The Data Controller adds transcription and license information and identifies themselves.</t>
            </li>
            <li>
              <t><strong>vConSentToProcessors</strong>: The Data Controller sends the vCon to relevant Data Processors.</t>
            </li>
            <li>
              <t><strong>Data Processing</strong>: Value-added services are performed on the vCon data.</t>
            </li>
            <li>
              <t><strong>vConDeletion</strong>: The vCon is deleted when no longer needed, when consent is revoked, or when it expires.</t>
            </li>
          </ol>
        </section>
        <section anchor="digital-rights-management">
          <name>Digital Rights Management</name>
          <t>Interwoven with the vCon lifecycle is consent management.  A modern
consent model is envisioned: consent is gathered by the Data
Controller (or the Data Originator acting as a data processor on behalf
of the Data Controller) for particular purposes (such as training or sharing) and
can be withdrawn by the Data Subject on demand.  This withdrawal may
result in revoking the vCon or modifying it to remove non-consenting
portions.</t>
          <artwork><![CDATA[
+------------------+     +------------------+     +------------------+
| 1. ConsentTo     |---->| 2. ConsentFor    |---->| 3. Consent       |
|    Record        |     |    Purpose       |     |    Recorded      |
+------------------+     +------------------+     +------------------+
                                                           |
                                                           v
+------------------+     +------------------+     +------------------+
| 6. RevokeRequest |<----| 5. ConsentReview |<----| 4. ConsentReceipt|
|    Processing    |     |    Revocation    |     |    Sent          |
+------------------+     +------------------+     +------------------+
]]></artwork>
          <t>Lifecycle events in Digital Rights Management include:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>ConsentToRecord</strong>: Consent is requested from the Data Subject to record the conversation.</t>
            </li>
            <li>
              <t><strong>ConsentForPurpose</strong>: Confirmation of consent for specific purposes (e.g., "sales followup") is obtained.</t>
            </li>
            <li>
              <t><strong>ConsentRecorded</strong>: The Data Controller records where consent was confirmed in the transcript or recording.</t>
            </li>
            <li>
              <t><strong>ConsentReceipt Sent</strong>: Notification is sent to Data Subject(s) with a link to review consent details.</t>
            </li>
            <li>
              <t><strong>ConsentReview/Revocation</strong>: Data Subject can review or choose to revoke consent at any time.</t>
            </li>
            <li>
              <t><strong>RevokeRequestProcessing</strong>: If consent is revoked, the request is processed and communicated to all parties.</t>
            </li>
          </ol>
        </section>
        <section anchor="amendment-of-existing-vcons">
          <name>Amendment of Existing vCons</name>
          <t>Under normal circumstances, vCons may be amended. For example, at creation time,
parties to a vCon may be verified through methods such as OAuth. However, if account
credentials are later found to be compromised, the verification status may need revision.
Party verification issues often trigger "Rights to Correct" requests and are fundamental
to responsible data rights management. Other enhancements and modifications may occur
for security reasons, future processing needs, or in response to regulatory changes.</t>
          <artwork><![CDATA[
+----------------+     +----------------+     +----------------+
| 1. DialogAdded |---->| 2. vConProcessed|---->| 3. Data       |
|                |     |                |     |    Redaction   |
+----------------+     +----------------+     +----------------+
]]></artwork>
          <t>Events that may be recorded on the distributed ledger include:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>DialogAdded</strong>: A dialog is saved and added to the vCon.</t>
            </li>
            <li>
              <t><strong>vConProcessed</strong>: The Data Controller processes the vCon.</t>
            </li>
            <li>
              <t><strong>Data Redaction</strong>: Data Processors delete the data or redact the Data Subject.</t>
            </li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="detailed-use-case">
      <name>Detailed Use Case</name>
      <section anchor="vcon-create-consent-and-share">
        <name>vCon Create, Consent and Share</name>
        <artwork><![CDATA[
    +-------------------+                      +-------------------+
    |  Data Originator  |                      |  Data Controller  |
    +---------+---------+                      +---------+---------+
              |                                          |
              | 1. Call Initiation                       |
              |-------->                                 |
              |                                          |
              | 2. Consent to Record                     |
              |-------->                                 |
              |                                          |
              | 3. Consent to Share                      |
              |-------->                                 |
              |                                          |
              | 4. vCon Created                          |
              |                                          |
              | 5. Recording Added                       |
              |                                          |
              | 6. vCon Sent                             |
              |----------------------------------------->|
              |                                          |
              |                                          | 7. vCon Received
              |                                          |
              |                                          | 8. vCon Enhanced
              |                                          |
              |                                          | 9. vCon Sent
              |                                          |-------->
              |                                          |
              |                                          |
    +---------v---------+                      +---------v---------+
    |  Data Originator  |                      |  Data Controller  |
    +-------------------+                      +-------------------+
                                                        |
                                                        v
                                               +-------------------+
                                               |  Data Processor   |
                                               +---------+---------+
                                                         |
                                                         | 10. vCon Received
                                                         |
                                                         | 11. Consent Recorded
                                                         |
                                                         | 12. vCon Enhanced
                                                         |
                                                         | 13. Consent Receipt
                                                         |    Sent
                                                         |
                                                         | 14. Consent Review
                                                         |
                                                         | 15. Value-Add
                                                         |    Services
                                                         |
                                               +---------v---------+
                                               |  Data Processor   |
                                               +-------------------+
]]></artwork>
        <section anchor="data-originator">
          <name>Data Originator</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Initiating Call</strong>: An initiating caller contacts a Data Subject to provide a service.</t>
            </li>
            <li>
              <t><strong>Consent to Record</strong>: The initiating caller requests consent to record the call for training purposes.</t>
            </li>
            <li>
              <t><strong>Consent to Share</strong>: The call completes, confirming consent for
the recording to be used for "sales followup", noting that the
Data Subject can review and revoke consent later. Depending on the types of personal
data communicated on the call and the purpose of its processing, the consent request
language may need to include additional information.</t>
            </li>
            <li>
              <t><strong>vCon Created</strong>: The call completes, the vCon is created, and call metadata is recordedin the vCon Registry.</t>
            </li>
            <li>
              <t><strong>Recording Added</strong>: The recording is saved to the vCon Registry, adding it to the vCon's attachments section.</t>
            </li>
            <li>
              <t><strong>vCon Sent</strong>: The Data Originator completes their responsibilities and sends the vCon to the Data Controller.</t>
            </li>
          </ol>
        </section>
        <section anchor="data-controller">
          <name>Data Controller</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>vCon Received</strong>: The vCon is received from the Data Originator, and a vcon_received operation is recorded in the SCITT Transparency Service.</t>
            </li>
            <li>
              <t><strong>vCon Enhanced with License and Data Controller</strong>: The Data Controller adds transcription, specifies the intended license, and identifies themselves as the Data Controller on the vCon.</t>
            </li>
            <li>
              <t><strong>vCon Sent</strong>: The Data Controller sends the vCon to the Data Processor(s).</t>
            </li>
          </ol>
        </section>
        <section anchor="data-processors">
          <name>Data Processor(s)</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>vCon Received</strong>: The Data Processor validates the vCon's SCITT receipt from the Data Controller.</t>
            </li>
            <li>
              <t><strong>Consent Recorded</strong>: The Data Processor records consent confirmation in the SCITT Transparency Service.</t>
            </li>
            <li>
              <t><strong>vCon Enhanced</strong>: Sentiment analysis and other enhancements are processed through the Data Processor's Conserver workflows.</t>
            </li>
            <li>
              <t><strong>Consent Receipt Sent</strong>: The Data Processor sends notification to the Data Subject(s) with a link to review consent details.</t>
            </li>
            <li>
              <t><strong>Consent Review</strong>: The Data Subject(s) can review vCon information at any time and revoke consent if desired.</t>
            </li>
            <li>
              <t><strong>Data Processor Value-Add</strong>: The Data Processor performs value-added services for the Data Subject(s).</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="revocation-and-the-right-to-be-forgotten">
        <name>Revocation and the Right to Be Forgotten</name>
        <t>At any point, a Data Subject can request revocation or the right to be forgotten, requiring all vCon possessors to act accordingly. vCons must be tracked for where they were sent and who to contact when a Data Subject makes such requests. The SCITT Transparency Service maintains metadata about ingested vCons, ensuring integrity and inclusion protection.</t>
        <artwork><![CDATA[
    +-------------------+                      +-------------------+
    |   Data Subject    |                      |  Data Controller  |
    +---------+---------+                      +---------+---------+
              |                                          |
              | 1. Revoke Consent                        |
              |-------->                                 |
              |                                          |
              | 2. Revoke Request Sent                   |
              |----------------------------------------->|
              |                                          |
              |                                          | 3. Act on Revocation
              |                                          |
              |                                          | 4. Send Request to
              |                                          |    All Processors
              |                                          |-------->
              |                                          |
    +---------v---------+                      +---------v---------+
    |   Data Subject    |                      |  Data Controller  |
    +-------------------+                      +-------------------+
                                                        |
                                                        v
                                               +-------------------+
                                               |  Data Processor   |
                                               +---------+---------+
                                                         |
                                                         | 5. Deletion of Data
                                                         |
                                               +---------v---------+
                                               |  Data Processor   |
                                               +-------------------+
]]></artwork>
        <section anchor="data-subject">
          <name>Data Subject</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Revoke Consent</strong>: The Data Subject revokes consent by some manner: i.e. clicks a link
included in all communications between the Data Processor and the Data Subject(s), through an external system or in
conversation with the data controller.</t>
            </li>
            <li>
              <t><strong>Revoke Request Sent</strong>: If the vcon_consent_revoked operation was handled by the Data Processor,
they MUST contact the Data Controller to communicate the Data Subject's intent.</t>
            </li>
          </ol>
        </section>
        <section anchor="data-controller-revocation">
          <name>Data Controller Revocation</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Act on Consent Revocation Request</strong>: The Data Controller receives the vCon Consent Revocation Request and records it on their SCITT Transparency Service.</t>
            </li>
            <li>
              <t><strong>Send Revocation Request to Data Controllers</strong>: If the vCon was sent to other Data
Processors, they must communicate the revocation request to any Data Processor that hasn't yet acknowledged it.</t>
            </li>
          </ol>
        </section>
        <section anchor="data-processor-revocation">
          <name>Data Processor Revocation</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Deletion of Data</strong>: Any Data Processor that hasn't yet acted on the request must acknowledge it.</t>
            </li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="vcon-lifecycle-events">
      <name>vCon Lifecycle Events</name>
      <t>The following events outline important "moments that matter" in a vCon's lifecycle.
These events are not intended to be stored within the vCon itself, but rather as operations
stored on SCITT to provide context for the vCon's intent at specific points in time:</t>
      <ul spacing="normal">
        <li>
          <t><strong>vcon_created</strong>: The initial vCon document as first recorded. The vCon may start with a basic structure defining minimal metadata, as recordings or attachments may be added asynchronously upon encoding completion.</t>
        </li>
        <li>
          <t><strong>vcon_enhanced</strong>: The vCon has been amended or appended. While vCons are considered immutable, information may be amended or appended—previous values exist in the vCon Registry but may be superseded. Amendments may include transcription corrections or consent changes.</t>
        </li>
        <li>
          <t><strong>vcon_sent</strong>: The vCon was sent to an external party. This operation seals the vCon's integrity, recording what was sent, to whom, and when in the SCITT Transparency Service. A SCITT receipt from the receiving service confirms possession.</t>
        </li>
        <li>
          <t><strong>vcon_received</strong>: The vCon was received from an external entity. This documents possession at a specific time, sealing content integrity and returning a SCITT receipt to the sender.</t>
        </li>
        <li>
          <t><strong>vcon_consent_accepted</strong>: One or more parties have consented to the vCon being recorded and shared for its intended purpose. Consent may not be established during initial vCon creation, as the Data Controller, not the Data Originator (infrastructure provider), is responsible for managing Data Subject consent.</t>
        </li>
        <li>
          <t><strong>vcon_consent_revoked</strong>: One or more parties have revoked consent for one or more purposes. Depending on region, license, and regulatory requirements, one revocation may or may not require all Data Processors to act.</t>
        </li>
        <li>
          <t><strong>vcon_party_redacted</strong>: A party to the vCon has been redacted. This differs from consent revocation, as the vCon may remain viable if a party's information can be redacted while maintaining integrity and usefulness.</t>
        </li>
        <li>
          <t><strong>vcon_deleted</strong>: The vCon has been deleted due to an implicit act such as revocation or no longer being needed. When a Data Controller deletes a vCon, they must inform all recipients to either delete it or assume Data Controller responsibilities.</t>
        </li>
        <li>
          <t><strong>vcon_expired</strong>: The vCon has expired due to license terms or compliance requirements. This triggers deletion and notification to all shared entities.</t>
        </li>
        <li>
          <t><strong>vcon_rcvr_purged</strong>: When a vCon is sent from a Data Controller, the receiving Entity may maintain it indefinitely, for a set period, or delete it upon operation completion. If the Entity no longer needs to maintain the vCon, they can delete it and notify the sender.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of the vCon lifecycle depends heavily on the integrity and availability of the SCITT
Transparency Service. Entities MUST ensure that their SCITT implementations are properly
secured and that access controls are in place to prevent unauthorized modifications.</t>
      <t>The handling of personally identifiable information (PII) throughout the vCon lifecycle
requires careful consideration of privacy regulations and data protection requirements.
Entities MUST implement appropriate technical and organizational measures to protect PII
and ensure compliance with applicable regulations.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This document describes a framework for managing vCons that contain personally identifiable
information. Implementers MUST ensure compliance with applicable privacy regulations,
including but not limited to GDPR <eref target="https://gdpr.eu/">GDPR</eref> and CCPA <eref target="https://oag.ca.gov/privacy/ccpa">CCPA</eref>.</t>
      <t>The framework provides mechanisms for consent management and data subject rights,
but implementers are responsible for ensuring that their implementations properly
respect and enforce these rights.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="references">
      <name>References</name>
      <section anchor="normative-references">
        <name>Normative References</name>
      </section>
      <section anchor="informative-references">
        <name>Informative References</name>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="GEOPRIV">
        <front>
          <title>A Presence-based GEOPRIV Location Object Format</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="December" year="2005"/>
          <abstract>
            <t>This document describes an object format for carrying geographical information on the Internet. This location object extends the Presence Information Data Format (PIDF), which was designed for communicating privacy-sensitive presence information and which has similar properties. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4119"/>
        <seriesInfo name="DOI" value="10.17487/RFC4119"/>
      </reference>
      <reference anchor="GZIP">
        <front>
          <title>GZIP file format specification version 4.3</title>
          <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
          <date month="May" year="1996"/>
          <abstract>
            <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1952"/>
        <seriesInfo name="DOI" value="10.17487/RFC1952"/>
      </reference>
      <reference anchor="HTTPS">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="IANA-COSE-ALG" target="&lt;https://www.iana.org/assignments/cose/cose.xhtml&gt;">
        <front>
          <title>COSE Algorithms</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="JSON">
        <front>
          <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
          <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
          <date month="December" year="2017"/>
          <abstract>
            <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
            <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="90"/>
        <seriesInfo name="RFC" value="8259"/>
        <seriesInfo name="DOI" value="10.17487/RFC8259"/>
      </reference>
      <reference anchor="JWS">
        <front>
          <title>JSON Web Signature (JWS)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7515"/>
        <seriesInfo name="DOI" value="10.17487/RFC7515"/>
      </reference>
      <reference anchor="JWE">
        <front>
          <title>JSON Web Encryption (JWE)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7516"/>
        <seriesInfo name="DOI" value="10.17487/RFC7516"/>
      </reference>
      <reference anchor="JWK">
        <front>
          <title>JSON Web Key (JWK)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7517"/>
        <seriesInfo name="DOI" value="10.17487/RFC7517"/>
      </reference>
      <reference anchor="MAILTO">
        <front>
          <title>The 'mailto' URI Scheme</title>
          <author fullname="M. Duerst" initials="M." surname="Duerst"/>
          <author fullname="L. Masinter" initials="L." surname="Masinter"/>
          <author fullname="J. Zawinski" initials="J." surname="Zawinski"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>This document defines the format of Uniform Resource Identifiers (URIs) to identify resources that are reached using Internet mail. It adds better internationalization and compatibility with Internationalized Resource Identifiers (IRIs; RFC 3987) to the previous syntax of 'mailto' URIs (RFC 2368). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6068"/>
        <seriesInfo name="DOI" value="10.17487/RFC6068"/>
      </reference>
      <reference anchor="MEDIATYPE">
        <front>
          <title>Media Type Specifications and Registration Procedures</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <author fullname="T. Hansen" initials="T." surname="Hansen"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="13"/>
        <seriesInfo name="RFC" value="6838"/>
        <seriesInfo name="DOI" value="10.17487/RFC6838"/>
      </reference>
      <reference anchor="MIME">
        <front>
          <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
          <date month="November" year="1996"/>
          <abstract>
            <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2045"/>
        <seriesInfo name="DOI" value="10.17487/RFC2045"/>
      </reference>
      <reference anchor="PASSporT">
        <front>
          <title>PASSporT: Personal Assertion Token</title>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8225"/>
        <seriesInfo name="DOI" value="10.17487/RFC8225"/>
      </reference>
      <reference anchor="PIDF-LO">
        <front>
          <title>GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations</title>
          <author fullname="J. Winterbottom" initials="J." surname="Winterbottom"/>
          <author fullname="M. Thomson" initials="M." surname="Thomson"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>The Presence Information Data Format Location Object (PIDF-LO) specification provides a flexible and versatile means to represent location information. There are, however, circumstances that arise when information needs to be constrained in how it is represented. In these circumstances, the range of options that need to be implemented are reduced. There is growing interest in being able to use location information contained in a PIDF-LO for routing applications. To allow successful interoperability between applications, location information needs to be normative and more tightly constrained than is currently specified in RFC 4119 (PIDF-LO). This document makes recommendations on how to constrain, represent, and interpret locations in a PIDF-LO. It further recommends a subset of Geography Markup Language (GML) 3.1.1 that is mandatory to implement by applications involved in location-based routing. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5491"/>
        <seriesInfo name="DOI" value="10.17487/RFC5491"/>
      </reference>
      <reference anchor="SMTP">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="TEL">
        <front>
          <title>The tel URI for Telephone Numbers</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="December" year="2004"/>
          <abstract>
            <t>This document specifies the URI (Uniform Resource Identifier) scheme "tel". The "tel" URI describes resources identified by telephone numbers. This document obsoletes RFC 2806. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3966"/>
        <seriesInfo name="DOI" value="10.17487/RFC3966"/>
      </reference>
      <reference anchor="UUID">
        <front>
          <title>New UUID Formats</title>
          <author fullname="Brad Peabody" initials="B." surname="Peabody">
         </author>
          <author fullname="Kyzer R. Davis" initials="K. R." surname="Davis">
         </author>
          <date day="23" month="June" year="2022"/>
          <abstract>
            <t>   This document presents new Universally Unique Identifier (UUID)
   formats for use in modern applications and databases.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-peabody-dispatch-new-uuid-format-04"/>
      </reference>
      <reference anchor="CBOR">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="CDDL">
        <front>
          <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="C. Vigano" initials="C." surname="Vigano"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8610"/>
        <seriesInfo name="DOI" value="10.17487/RFC8610"/>
      </reference>
      <reference anchor="ISOBMFF" target="https://www.iso.org/standard/83102.html">
        <front>
          <title>Information technology -- Coding of audio-visual objects -- Part 12: ISO base media file format</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="January"/>
        </front>
        <refcontent>ISO/IEC 14496-12:2022</refcontent>
      </reference>
      <reference anchor="JMAP">
        <front>
          <title>The JSON Meta Application Protocol (JMAP)</title>
          <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
          <author fullname="C. Newman" initials="C." surname="Newman"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8620"/>
        <seriesInfo name="DOI" value="10.17487/RFC8620"/>
      </reference>
      <reference anchor="JWT">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="SHA-512">
        <front>
          <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
          <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
          <author fullname="T. Hansen" initials="T." surname="Hansen"/>
          <date month="May" year="2011"/>
          <abstract>
            <t>Federal Information Processing Standard, FIPS</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6234"/>
        <seriesInfo name="DOI" value="10.17487/RFC6234"/>
      </reference>
      <reference anchor="SIP-XFER">
        <front>
          <title>Session Initiation Protocol (SIP) Call Control - Transfer</title>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="A. Johnston" initials="A." role="editor" surname="Johnston"/>
          <author fullname="D. Petrie" initials="D." surname="Petrie"/>
          <date month="June" year="2009"/>
          <abstract>
            <t>This document describes providing Call Transfer capabilities in the Session Initiation Protocol (SIP). SIP extensions such as REFER and Replaces are used to provide a number of transfer services including blind transfer, consultative transfer, and attended transfer. This work is part of the SIP multiparty call control framework. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="149"/>
        <seriesInfo name="RFC" value="5589"/>
        <seriesInfo name="DOI" value="10.17487/RFC5589"/>
      </reference>
      <reference anchor="STIR-PASS">
        <front>
          <title>PASSporT Extension for Rich Call Data</title>
          <author fullname="Chris Wendt" initials="C." surname="Wendt">
            <organization>Somos Inc.</organization>
          </author>
          <author fullname="Jon Peterson" initials="J." surname="Peterson">
            <organization>Neustar Inc.</organization>
          </author>
          <date day="5" month="June" year="2023"/>
          <abstract>
            <t>   This document extends PASSporT, a token for conveying
   cryptographically-signed call information about personal
   communications, to include rich meta-data about a call and caller
   that can be signed and integrity protected, transmitted, and
   subsequently rendered to the called party.  This framework is
   intended to include and extend caller and call specific information
   beyond human-readable display name comparable to the "Caller ID"
   function common on the telephone network and is also enhanced with a
   integrity mechanism that is designed to protect the authoring and
   transport of this information for different authoritative use-cases.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-stir-passport-rcd-26"/>
      </reference>
      <reference anchor="vCard">
        <front>
          <title>jCard: The JSON Format for vCard</title>
          <author fullname="P. Kewisch" initials="P." surname="Kewisch"/>
          <date month="January" year="2014"/>
          <abstract>
            <t>This specification defines "jCard", a JSON format for vCard data. The vCard data format is a text format for representing and exchanging information about individuals and other entities, for example, telephone numbers, email addresses, structured names, and delivery addresses. JSON is a lightweight, text-based, language- independent data interchange format commonly used in Internet applications.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7095"/>
        <seriesInfo name="DOI" value="10.17487/RFC7095"/>
      </reference>
      <reference anchor="vCon-white-paper" target="https://github.com/vcon-dev/vcon/blob/main/docs/vCons_%20an%20Open%20Standard%20for%20Conversation%20Data.pdf">
        <front>
          <title>vCon: an Open Standard for Conversation Data</title>
          <author initials="T." surname="Howe" fullname="Thomas Howe">
            <organization>STROLID Inc.</organization>
          </author>
          <author initials="D." surname="Petrie" fullname="Daniel Petrie">
            <organization>SIPez LLC</organization>
          </author>
          <author initials="M." surname="Lieberman" fullname="Mitch Lieberman">
            <organization>Conversational X</organization>
          </author>
          <author initials="A." surname="Quayle" fullname="Alan Quayle">
            <organization>TADHack and TADSummit</organization>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CDR" target="https://www.itu.int/rec/T-REC-Q.825">
        <front>
          <title>Recommendation Q.825: Specification of TMN applications at the Q3 interface: Call detail recording</title>
          <author>
            <organization>ITU</organization>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 685?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Thank you to Allistair Woodman for connecting the first dots between VCon and SCITT</t>
        </li>
        <li>
          <t>Thank you to Jeff Pulver and Cody Launius for their collaboration and support</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
