<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.34 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lukianets-open-ethics-transparency-protocol-03" category="exp" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="OETP">Open Ethics Transparency Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-lukianets-open-ethics-transparency-protocol-03"/>
    <author initials="N." surname="Lukianets" fullname="Nikita Lukainets">
      <organization>Open Ethics Initiative</organization>
      <address>
        <email>n.lukianets@openethics.ai</email>
      </address>
    </author>
    <date year="2023" month="May" day="21"/>
    <area>General</area>
    <workgroup>dispatch</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 46?>

<t>The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT Products and their Components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Format is an extensible JSON-based format.</t>
    </abstract>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Open Ethics Transparency Protocol (OETP or Protocol) describes the creation and exchange of voluntary ethics Disclosures for IT products. It is brought as a solution to increase the transparency of how IT products are built and deployed. This document provides details on how disclosures for data collection and data processing practice are formed, stored, validated, and exchanged in a standardized and open format.</t>
      <t>OETP provides facilities for:</t>
      <ul spacing="normal">
        <li>
          <strong>Informed consumer choices</strong> : End-users able to make informed choices based on their own ethical preferences and product disclosure.</li>
        <li>
          <strong>Industrial-scale monitoring</strong> : Discovery of best and worst practices within market verticals, technology stacks, and product value offerings.</li>
        <li>
          <strong>Legally-agnostic guidelines</strong> : Suggestions for developers and product-owners, formulated in factual language, which are legally-agnostic and could be easily transformed into product requirements and safeguards.</li>
        <li>
          <strong>Iterative improvement</strong> : Digital products, specifically, the ones powered by artificial intelligence could receive nearly real-time feedback on how their performance and ethical posture could be improved to cover security, privacy, diversity, fairness, power balance, non-discrimination, and other requirements.</li>
        <li>
          <strong>Labeling and certification</strong> : Mapping to existing and future regulatory initiatives and standards.</li>
      </ul>
      <t>The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT products and their components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Format is an extensible JSON-based format.</t>
    </section>
    <section anchor="requirement-levels">
      <name>Requirement Levels</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Disclosure:</dt>
        <dd>
          <t>Disclosure (Ethics Disclosure, or self-disclosure) is application-specific information about the data collection, data processing, and decision-making practices of a Product, provided by the Product Vendor (an individual developer or an organization).</t>
        </dd>
        <dt>Disclosure Feed:</dt>
        <dd>
          <t>A historical sequence of Disclosures, made for a specific Product.</t>
        </dd>
        <dt>Disclosure Identity Provider:</dt>
        <dd>
          <t>The automated Disclosure processing is enabled by requests to both the Open Ethics Disclosure database powered by Disclosure Identity Providers (DIP) and the Product's OETP Disclosure file, stored in the product's website root following OETP specification. DIP serves as a service point to generate and retrieve generated disclosures.</t>
        </dd>
        <dt>Vendor:</dt>
        <dd>
          <t>A legal person (an individual developer or an organization) that owns one or several end-user Products, or acts as a Supplier and provides Components for other Vendors.</t>
        </dd>
        <dt>Integrator:</dt>
        <dd>
          <t>A legal person (an individual developer or an organization) that deploys technology-powered services to the end-users based on Product(s) from third-party Vendors.</t>
        </dd>
        <dt>Product:</dt>
        <dd>
          <t>An IT system in the form of software, software as a service system, application, software component, application programming interface, or a physically embodied automated decision-making agent.</t>
        </dd>
        <dt>Component:</dt>
        <dd>
          <t>An IT system supplied by Vendor and integrated/embedded into end-user Products. Components themselves do not necessarily interface with end-users.</t>
        </dd>
        <dt>Upstream Component:</dt>
        <dd>
          <t>A Component that sends its outputs to the Product Downstream in the data processing chain. Disclosure for the Upstream Component is represented as a Child relative to the Disclosure node of the Downstream Product.</t>
        </dd>
        <dt>Downstream Component:</dt>
        <dd>
          <t>A Component that receives inputs from the Components Upstream in the data processing chain. Disclosure for the Downstream Component is represented as a Parent relative to the Disclosure node of the Upstream Component.</t>
        </dd>
        <dt>Automated Decision-Making (ADM):</dt>
        <dd>
          <t>Automated decision-making is the process of making a decision by automated means without any human involvement. These decisions can be based on factual data, as well as on digitally created profiles or inferred data.</t>
        </dd>
        <dt>OETP Disclosure Format:</dt>
        <dd>
          <t>A machine-readable Disclosure with predefined structure, supplied in the JSON format.</t>
        </dd>
        <dt>Validation:</dt>
        <dd>
          <t>A sequence of automated software-based checks to control validity and security elements in the OETP Disclosure.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>A third-party legal person trusted to perform Verification checks and to issue Verification Proofs.</t>
        </dd>
        <dt>Auditing software:</dt>
        <dd>
          <t>An automated software-based tool authorized to perform Verification checks and to issue Verification Proofs.</t>
        </dd>
        <dt>Verification:</dt>
        <dd>
          <t>A procedure to control the correspondence of the elements in the OETP Disclosure and the actual data processing and data collection practices of the Vendors.</t>
        </dd>
        <dt>Verification Proof:</dt>
        <dd>
          <t>A result of the formal Disclosure Verification procedure presented to a requestor.</t>
        </dd>
        <dt>Chaining:</dt>
        <dd>
          <t>A process of combining Disclosures of individual Components into a composite high-level Disclosure for a Product.</t>
        </dd>
        <dt>Label:</dt>
        <dd>
          <t>User-facing graphical illustrations and textual descriptions of the Product that facilitate understanding of the values and risks the Product carries.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocol-model">
      <name>Protocol Model</name>
      <t>The Disclosure creation and delivery consist of the two parts, starting from (I) the submission of the Disclosure form, chaining of the Suppliers' Disclosures, Signature of the disclosed information, and the delivery part (II) that first checks that the Disclosure is Valid, and then that the information specified in it is Verified by the third-parties. <xref target="_figure-disclosure-creation"/> shows disclosure creation steps.</t>
      <!-- <img src="../diagrams/images/disclosure-creation/disclosure-creation.svg" alt="Creation of the Disclosure"> -->

<section anchor="creation-of-disclosure">
        <name>Creation of Disclosure</name>
        <t>The initial Disclosure is created by filling out a standardized disclosure form (for example, see 1. <eref target="https://openethics.ai/label/">https://openethics.ai/label/</eref>). A Vendor representative, a Product Owner, or a Developer, <bcp14>MUST</bcp14> submit data-processing and data-collection information about the Product. The information about the end-point URL, as well as a contact email address, <bcp14>MUST</bcp14> be specified. Disclosure <bcp14>MAY</bcp14> also be created in a fully automated way as a part of the CI/CD DevOps pipeline. <xref target="_figure-disclosure-submission-basic"/> shows basic disclosure submission process.</t>
        <!-- <img src="../diagrams/images/disclosure-submission-basic/disclosure-submission-basic.svg" alt="Basic Disclosure Submission"> -->

<section anchor="cryptographic-signature">
          <name>Cryptographic Signature</name>
          <t>The Disclosure is organized into a predefined data schema and <bcp14>MUST</bcp14> be cryptographically signed by the Signature Generator (Open Ethics or federated providers) using standard SHA3-512 hash implementation. The integrity hash <bcp14>MUST</bcp14> be appended to a disclosure as the <tt>OETP.schema.integrity</tt> element.</t>
        </section>
        <section anchor="immutable-storage">
          <name>Immutable Storage</name>
          <t>Both the signature integrity hash and the Disclosure <bcp14>SHOULD</bcp14> be stored in the log-centric root database and <bcp14>MAY</bcp14> be mirrored by other distributed databases for redundancy and safety.</t>
        </section>
        <section anchor="visual-labeling">
          <name>Visual Labeling</name>
          <t>Open Ethics Label <bcp14>SHOULD</bcp14> be automatically generated by mirroring the submitted Disclosure into a set of graphical icons and simple human-readable descriptions. Additional Labels <bcp14>MAY</bcp14> be generated following successful third-party Verification and by mapping the regulatory requirements to Verified Disclosures.</t>
        </section>
      </section>
      <section anchor="access-to-disclosure">
        <name>Access to Disclosure</name>
        <section anchor="initial-request-to-a-disclosure-file">
          <name>Initial Request to a Disclosure file</name>
          <t>The most recent OETP file <bcp14>SHOULD</bcp14> be stored in the root of the Product's specified end-point URL, allowing requests to the OETP file from third-party domains. When establishing a Vendor relationship, the Integrator or a downstream Vendor <bcp14>MAY</bcp14> examine the Disclosure for their Components using the following HTTP request: <tt>GET https://testexample.com/oetp.json</tt>, where <em>testexample.com</em> is the URL of the Supplier's end-point.</t>
        </section>
        <section anchor="access-to-visual-trust-labels">
          <name>Access to Visual Trust Labels</name>
          <t>A Vendor <bcp14>SHOULD</bcp14> place a visual Label generated as a result of the Disclosure process in the Product informational materials (for example Marketing Materials, User Guides, Safety Instructions, Privacy Policy, Terms of Service, etc). The Label reflects the content of the Disclosure and <bcp14>SHOULD</bcp14> be displayed in any digital media by embedding a software widget. Visual labels in the print media <bcp14>SHOULD</bcp14> carry a visually distinguishable Integrity signature to enable manual Validation by the User.</t>
        </section>
        <section anchor="requirements-for-placement-of-integrity-signature-in-visual-label">
          <name>Requirements for placement of Integrity Signature in Visual Label</name>
          <ul spacing="normal">
            <li>
              <strong>Labels in the online digital media</strong> <bcp14>MUST</bcp14> be generated automatically based on the content of the Disclosure and <bcp14>MUST</bcp14> contain a URL allowing to check the complete Integrity hash and explore more detailed information about the Disclosure.</li>
            <li>
              <strong>Labels in the offline media</strong> <bcp14>MUST</bcp14> be generated automatically based on the content of the Disclosure and should carry the first 10 digits of the corresponding Integrity hash.</li>
          </ul>
        </section>
        <section anchor="conformity-assessment-marks">
          <name>Conformity assessment marks</name>
          <t>Based on the Verification performed for the OETP Disclosure file, the labels <bcp14>MAY</bcp14> include Conformity assessment marks, Certification marks, as well as marks showing adherence to certain standards. These marks <bcp14>MAY</bcp14> be generated and displayed automatically based on the Verification Proofs.</t>
        </section>
        <section anchor="accessibility-considerations">
          <name>Accessibility considerations</name>
          <t>Accessibility of the Labels for the visually impaired Users <bcp14>SHOULD</bcp14> be considered. The OETP Processing system <bcp14>MUST</bcp14> provide alternative forms of the Label so that text-to-speech tools could be used to narrate the Label.</t>
        </section>
      </section>
      <section anchor="verification-and-validation-of-disclosure">
        <name>Verification and Validation of Disclosure</name>
        <section anchor="automated-disclosure-processing">
          <name>Automated Disclosure processing</name>
          <t>The automated Disclosure processing is enabled by requests to both the Open Ethics Disclosure database powered by Disclosure Identity Providers and the Product's OETP Disclosure file.</t>
          <t>To allow efficient decentralization and access to the disclosures of autonomous systems, such as AI systems powered by trained machine learning models, the vendor (or a developer) <bcp14>MUST</bcp14> send requests to a Disclosure Identity Provider. Disclosures <bcp14>MAY</bcp14> be resolved using URIs. To satisfy the mentioned requirements for disclosure RI, it is proposed in <xref target="OETP-RI"/> to use the following formats:</t>
          <ul spacing="normal">
            <li>
              <tt>oetp://&lt;hash&gt;</tt> - Here integrity <tt>&lt;hash&gt;</tt> is the SHA3-512 generated during the disclosure process.</li>
            <li>
              <tt>oetp://&lt;component&gt;@&lt;alias&gt;[:&lt;disclosure&gt;]</tt> - Here <tt>&lt;component&gt;</tt> is the ID assigned via Disclosure Identity Provider under its <tt>&lt;alias&gt;</tt> during the first disclosure.</li>
            <li>
              <tt>oetp://&lt;domain&gt;[:&lt;disclosure&gt;]</tt> - For verified domains (Domain Validation), disclosure could be accessed using product's <tt>&lt;domain&gt;</tt> instead of <tt>&lt;component&gt;@&lt;alias&gt;</tt>.)</li>
          </ul>
        </section>
        <section anchor="validation-of-vendor39s-disclosures">
          <name>Validation of Vendor's Disclosures</name>
          <t>The OETP Processing system <bcp14>MUST</bcp14> compare integrity hashes in the Open Ethics Disclosure database and entries that arrive as a result of the Disclosure Request response.</t>
        </section>
        <section anchor="verification-of-vendor39s-disclosures">
          <name>Verification of Vendor's Disclosures</name>
          <t>Every disclosure <bcp14>SHOULD</bcp14> be checked for the existence of the external Verification from Auditors for the entire Disclosures or one of the Disclosure elements.</t>
        </section>
        <section anchor="progressive-verification">
          <name>Progressive Verification</name>
          <t>To raise a level of trust in a Disclosure, a Vendor <bcp14>MAY</bcp14> decide to opt-in for a third-party Disclosure Verification. OETP suggests a Progressive Verification scheme where multiple independent external Verification Proofs COULD be issued by third parties to confirm the information specified in the Disclosure.</t>
          <t>The Progressive Verification applies to a whole Disclosure, or to specific elements of the Disclosure.</t>
          <t><xref target="_figure-disclosure-progressive-verification"/> displays a general scheme for Disclosure requests and responses.</t>
          <!-- <img src="../diagrams/images/disclosure-progressive-verification/disclosure-progressive-verification.svg" style="float: left; margin-right: 10px;" alt="Progressive Verification Scheme for Disclosures" /> -->

<t>The following elements <bcp14>MAY</bcp14> serve as sources for various kinds of Verification proofs:
* Qualified Auditor reports
* Qualified Vendor of Auditing software tests
* Certification Authority assessments
* Conformity assessments
* User Feedback
* Market Brokers
* Real-time Loggers</t>
        </section>
      </section>
      <section anchor="end-to-end-transparency-and-formation-of-the-composite-disclosure">
        <name>End-to-end transparency and formation of the composite Disclosure</name>
        <t>The IT industry is getting more mature with Vendors becoming more specialized. Surface-level transparency is not sufficient as supply chains are becoming more complex and distributed across various Components. The following steps <bcp14>MUST</bcp14> be satisfied for the end-to-end transparency:</t>
        <section anchor="open-supplier-policy">
          <name>Open Supplier Policy</name>
          <t>Every Integrator or a Vendor <bcp14>SHOULD</bcp14> disclose the information about their Suppliers (sub-processing Vendors), indicating the scope of the data processing in the Components they provide.</t>
          <t>If the Supplier information is not provided, Disclosure <bcp14>SHOULD</bcp14> contain information that a Vendor (Integrator) has not provided Supplier information.</t>
          <section anchor="first-party-components">
            <name>First-party Components</name>
            <t>For greater transparency, Vendors may decide to reveal Components even if they originate from themselves (first-party Components). For the first-party Component, the Supplier identity information <bcp14>SHOULD NOT</bcp14> be provided because it was already disclosed earlier.</t>
            <t>Required: (<xref target="component-information"/>) only</t>
          </section>
          <section anchor="third-party-components">
            <name>Third-party Components</name>
            <t>When disclosing Components originating from the third-party Vendors <bcp14>SHOULD</bcp14> provide both the Supplier identity information and Component information</t>
            <t>Required: (<xref target="supplier-identity"/>, <xref target="component-information"/>)</t>
          </section>
          <section anchor="elements-of-supplier-disclosure">
            <name>Elements of Supplier disclosure</name>
            <section anchor="supplier-identity">
              <name>Supplier identity</name>
              <ul spacing="normal">
                <li>Vendor Name</li>
                <li>Vendor URL</li>
                <li>Vendor ID</li>
                <li>Vendor DPO Contact Email</li>
              </ul>
            </section>
            <section anchor="component-information">
              <name>Component information</name>
              <ul spacing="normal">
                <li>Component Scope of use</li>
                <li>Personal Data Being Processed by Component</li>
                <li>Is a Safety Component (YES)/(NO)</li>
                <li>Component URL (if different from the Vendor URL)</li>
                <li>Component Disclosure URL (if different from the default <tt>Component URL/oetp.json</tt>)</li>
                <li>Component DPO Contact (if different from Vendor DPO Contact Email)</li>
              </ul>
            </section>
          </section>
        </section>
        <section anchor="request-for-supplier39s-disclosures">
          <name>Request for Supplier's Disclosures</name>
          <t>The OETP Processing system <bcp14>MUST</bcp14> send GET requests to the URLs of each Component to obtain their Disclosures. Based on the response to each Disclosure request, the OETP Processing system <bcp14>MUST</bcp14> specify which Components have Disclosures and which don't have Disclosures.</t>
          <t><xref target="_figure-disclosure-chaining-request"/> shows the process of how Disclosure Chaining requests and responses happen.</t>
          <!-- <img src="../diagrams/images/disclosure-chaining-request/disclosure-chaining-request.svg" alt="Disclosure Chaining: Request-Response"> -->

</section>
        <section anchor="disclosure-chaining">
          <name>Disclosure Chaining</name>
          <t>The same Request-response operation applies recursively for Components of the Components, for the Components of the Components of the Components, etc. It is proposed to view the supply chain as a tree-like hierarchical data structure, where the information about Components is assembled using Level Order Tree Traversal algorithm.</t>
          <t>In this tree:
* Node is a structure that contains the Component's Disclosure;
* Root is the top Node representing a Product's Disclosure information;
* Edge is the connection between one Node and another, representing the scope of the Data Processing by the Component.</t>
          <t><xref target="_figure-disclosure-chaining-tree"/> displays the order of the Disclosure Chaining with Level Order Tree Traversal algorithm.</t>
          <!-- <img src="../diagrams/images/disclosure-chaining-tree/disclosure-chaining-tree.svg" alt="Disclosure Chaining: Level Order Traversal"> -->

</section>
        <section anchor="generation-of-the-composite-disclosure">
          <name>Generation of the Composite Disclosure</name>
          <t>The current consensus from the user &amp; developer community suggests that Composite Disclosure should follow The "Weakest Link" model. According to this model, the risk that the Product is carrying should not be considered any less than the risk for each of the Components. A similar approach in dealing with software licenses has been successful by allowing to generate Software Bills of Materials (SBOMs) by providing package information in the <xref target="SPDX"/> files.</t>
          <t>Formally this approach could be illustrated with the use of a conjunction table for risk modeling (see <xref target="conjunction-table-risk-modeling"/>). The Truth Table for Logical AND operator below takes one risk factor and evaluates risk outcomes as High (H) or Low (L) for hypothetical Disclosure options of the Product(P) and its Component(C).</t>
          <table anchor="conjunction-table-risk-modeling">
            <name>Conjunction Table for Risk Modeling</name>
            <thead>
              <tr>
                <th align="center">Disclosed risk of P</th>
                <th align="center">Disclosed risk of  C</th>
                <th align="center">Composite P &amp; C</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">L</td>
                <td align="center">L</td>
                <td align="center">
                  <strong>L</strong></td>
              </tr>
              <tr>
                <td align="center">L</td>
                <td align="center">H</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
              <tr>
                <td align="center">H</td>
                <td align="center">L</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
              <tr>
                <td align="center">H</td>
                <td align="center">H</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
            </tbody>
          </table>
          <t>Further evaluation of this approach is required.</t>
        </section>
      </section>
    </section>
    <section anchor="example-oetp-disclosure-file">
      <name>Example OETP Disclosure File</name>
      <figure anchor="_figure-example-oetp-json">
        <name>Example OETP Disclosure File</name>
        <sourcecode type="JSON"><![CDATA[
{
    "schema": {
        "name": "Open Ethics Transparency Protocol",
        "version": "0.9.3 RFC",
        "integrity": "156d624b8f2dbea87128a2147f255842652475c5dc595c79f64c90c7ff486d59007c3e18c993e3163395812e26b70ea70dfc413f7ca128869d115f12e5699bf2"
    },
    "snapshot": {
        "product": {
            "url": "testexample.com",
            "description": ""
        },
        "timestamp": 1608273946,
        "generator": {
            "name": "Open Ethics",
            "alias": "oe",
            "type": "root",
            "website": "https://openethics.ai"
        },
        "label": {
            "data": {
                "type": "open",
                "practice": ""
            },
            "source": {
                "type": "open",
                "practice": ""
            },
            "decision": {
                "type": "restricted",
                "practice": ""
            }
        }
    }
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="response-content">
        <name>Response content</name>
        <t>OETP exchanges data using JSON <xref target="RFC8259"/> which is a lightweight data-interchange format. A JSON-based application can be attacked in multiple ways such as sending data in an improper format or embedding attack vectors in the data. It is important for any application using JSON format to validate the inputs before being processed. To mitigate this attack type, the JSON Key Profile is provided for OETP responses.</t>
      </section>
      <section anchor="spoofing">
        <name>Spoofing</name>
        <t>OETP Processors should be aware of the potential for spoofing attacks where the attacker publishes an OETP disclosure with the <tt>OETP.snapshot</tt> value from another product, or, perhaps with an outdated <tt>OETP.snapshot.label</tt> element. For example, an OETP Processor could suppress the display of falsified entries by comparing the snapshot integrity from the submission database and a calculated hash for the <tt>OETP.snapshot</tt> object. In that situation, the OETP Processor might also take steps to determine whether the disclosures originated from the same publisher require further investigation of the Disclosure Feed and alert the downstream OETP Processors.</t>
      </section>
      <section anchor="falsification">
        <name>Falsification</name>
        <t>Dishonest or falsified Disclosures is a problem that is hard to address generally. The approach to it is public control and systematic checks. Vendors or user-facing applications and services could further raise the level of trust in their Disclosures by implementing programmatic control scoring mechanisms, as well as the external verification by trusted Auditors.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Disclosures <bcp14>MAY</bcp14> be resolved using their URIs. To allow this requirement, the <tt>oetp://</tt> URI scheme should be registered with IANA.</t>
    </section>
    <section anchor="areas-for-future-study">
      <name>Areas for Future Study</name>
      <t>The following topics not addressed in this version of the document are possible areas for the future study:</t>
      <ul spacing="normal">
        <li>Extensibility of the OETP Disclosure Format.</li>
        <li>Evaluate other methods of Generation of the Composite Disclosure based on the Disclosure Tree</li>
        <li>Disclosure Chaining mechanisms and various use-cases.</li>
        <li>Typical scenarios and templates for Disclosure submissions.</li>
        <li>Mapping of the regulatory requirements and future Disclosure elements.</li>
        <li>Standardizing Privacy Disclosure and PII data-collection practices.</li>
        <li>Enhancing Label accessibility with ARIA W3C Recommendation and other approaches.</li>
        <li>Use of the OETP Disclosure in the ADM explainability (XAI).</li>
        <li>Disclosure formats for families of "Generative AI" technologies such as Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), Conditional Variational Autoencoders (CVAEs), Attention Mechanisms, Transformer-based Models.</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="SPDX" target="https://spdx.dev/">
          <front>
            <title>SPDX Specification – Version 2.2</title>
            <author>
              <organization>The Linux Foundation</organization>
            </author>
            <date year="2020"/>
          </front>
          <format type="PDF" target="https://spdx.dev/wp-content/uploads/sites/41/2020/08/SPDX-specification-2-2.pdf"/>
          <format type="HTML" target="https://spdx.github.io/spdx-spec/"/>
        </reference>
        <reference anchor="OETP-RI" target="https://github.com/OpenEthicsAI/OETP-RI-scheme">
          <front>
            <title>Resource Identifier Scheme for OETP</title>
            <author>
              <organization>Open Ethics Initiative</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
      </references>
    </references>
    <?line 381?>

<section anchor="appendix">
      <name>Appendix</name>
      <section anchor="figures">
        <name>Figures</name>
        <t>Diagrams could be built from code using the below <tt>*.puml</tt> files automatically using <eref target="https://plantuml.com/">PlantUML</eref>.</t>
        <section anchor="creation-of-disclosure-1">
          <name>Creation of Disclosure</name>
          <figure anchor="_figure-disclosure-creation">
            <name>Creation of the Disclosure</name>
            <sourcecode type="PUML"><![CDATA[
@startuml

title Disclosure Creation Process

skinparam roundCorner 15

actor "Supplier A" as SA
actor "Supplier B" as SB
actor Vendor as V

component "Component A" as CA
component "Component B" as CB
file "Disclosure A" as DA
file "Disclosure B" as DB
file "Composite Disclosure" as D

V-right->(Creation):disclose
SA-up->CA
SB-up->CB
CA-up->DA
CB-up->DB
DA-up->(Chaining)
DB-up->(Chaining)
(Creation)->(Chaining)
(Chaining)->(Validation)
(Validation)->(Verification)
(Verification)->D
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="basic-disclosure-submission">
          <name>Basic Disclosure Submission</name>
          <figure anchor="_figure-disclosure-submission-basic">
            <name>Basic Disclosure Submission</name>
            <sourcecode type="PUML"><![CDATA[
@startuml
title Basic Disclosure Submission

skinparam roundCorner 15
autonumber

actor Vendor
database "Disclosure Identity Provider" as ID
control "Signature Generator" as SIG
database "Federated Identity Provider" as DIS

Vendor -> ID: Request with Disclosure payload
ID -> ID: Validate input
ID -> SIG: Structured Data, Initialized

ID <-- SIG: SHA3-512 integrity hash
    group Distributed Identity Storage
DIS <-- SIG: SHA3-512 integrity hash
end
ID -> ID: Log OETP file and a corresponding intgrity hash
Vendor <-- ID: OETP Disclosure File
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="progressive-verification-scheme-for-disclosures">
          <name>Progressive Verification Scheme for Disclosures</name>
          <figure anchor="_figure-disclosure-progressive-verification">
            <name>Progressive Verification Scheme for Disclosures</name>
            <sourcecode type="PUML"><![CDATA[
@startuml

title Progressive Verification with multiple Auditors

skinparam roundCorner 15
autonumber
actor User
User -> Vendor: Disclosure Request
User <-- Vendor: OETP Disclosure File

database "Disclosure Identity Provider" as ID

User -> ID: Disclosure Validation and Verification Request

group Progressive Disclosure Verification
    ID -> ID: Retrieve and Compare Disclosure Integrity
    ID -> "Auditor 1": Disclosure Verification Request
    ID <-- "Auditor 1": Verification Proof 1
    ID -> "Auditor N": Disclosure Verification Request
    ID <-- "Auditor N": Verification Proof N
end

User <-- ID: Verification response

User -> Vendor: Service Request
User <-- Vendor: Service Response
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="disclosure-chaining-request-response">
          <name>Disclosure Chaining: Request-Response</name>
          <figure anchor="_figure-disclosure-chaining-request">
            <name>Disclosure Chaining: Request-Response</name>
            <sourcecode type="PUML"><![CDATA[
@startuml
title Disclosure Chaining: Request-Response


start
repeat
  :Request Component's Disclosure;
    if (Disclosure Obtained?) then (yes)
      :Validate Disclosure;
      :Verify Disclosure;
      :Chain Disclosure;
      :Obtain list of Child Components;
      if (Supplier information exists?) then (yes)
        :Update Tree with (yet)
        Unchained Disclosures;
      else (no)
        #Gold:**Alert** "Vendor has not provided
        Supplier information";
      endif
    else (no)
      #pink:**Alert** "Vendor has not provided
      any Disclosure";
      stop
    endif
repeat while (Unchained Disclosures in the Disclosure Tree?) is (yes) not (no)
:**Generate**
Composite Disclosure;
#palegreen:**Display** Label for "Composite Disclosure";
stop

@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="disclosure-chaining-level-order-traversal">
          <name>Disclosure Chaining: Level Order Traversal</name>
          <figure anchor="_figure-disclosure-chaining-tree">
            <name>Disclosure Chaining: Level Order Traversal</name>
            <sourcecode type="PUML"><![CDATA[
@startmindmap
title Disclosure Chaining: Level Order Traversal

skinparam roundCorner 15
* Root (Product)
        * 1 (Component)
                * 3 (Component)
                        * 7 (Component)
                * 4 (Component)
        * 2 (Component)
                * 5 (Component)
                        * 8 (Component)
                        * 9 (Component)
                * 6 (Component)
@endmindmap
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Part of this work related to Verification and Validation of Disclosure and Disclosure Chaining was supported by the H2020 Programme of the European Commission under Article 15 of Grant Agreement No. 951972 StandICT.eu 2023</t>
      <t>The Open Ethics community and expert volunteers contributed with their valuable feedback, discussions, and comments. Thank you Ashley Duque Kienzle, Angela Kim, Ioannis Zempekakis, Karl Müdespacher, Ida Varošanec, Claudia Del Pozo, Joerg Buss, Mariia Kriuchok, Minhaaj Rehman, Oleksii Molchanovskyi, Roberta Barone, Phil Volkofsky and others.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
