<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lukianets-open-ethics-transparency-protocol-08" category="exp" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="OETP">Open Ethics Transparency Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-lukianets-open-ethics-transparency-protocol-08"/>
    <author initials="N." surname="Lukianets" fullname="Nikita Lukainets">
      <organization>Open Ethics Initiative</organization>
      <address>
        <email>n.lukianets@openethics.ai</email>
      </address>
    </author>
    <date year="2025" month="July" day="29"/>
    <area>General</area>
    <workgroup>dispatch</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 46?>

<t>The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT Products and their Components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Schema is an extensible JSON-based format.</t>
    </abstract>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Open Ethics Transparency Protocol (OETP or Protocol) describes the creation and exchange of voluntary ethics Disclosures for IT products. It is brought as a solution to increase the transparency of how IT products are built and deployed. This document provides details on how disclosures for data collection and data processing practice are formed, stored, validated, and exchanged in a standardized and open format.</t>
      <t>OETP provides facilities for:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Informed consumer choices</strong> : End-users able to make informed choices based on their own ethical preferences and product disclosure.</t>
        </li>
        <li>
          <t><strong>Industrial-scale monitoring</strong> : Discovery of best and worst practices within market verticals, technology stacks, and product value offerings.</t>
        </li>
        <li>
          <t><strong>Legally-agnostic guidelines</strong> : Suggestions for developers and product-owners, formulated in factual language, which are legally-agnostic and could be easily transformed into product requirements and safeguards.</t>
        </li>
        <li>
          <t><strong>Iterative improvement</strong> : Digital products, specifically, the ones powered by artificial intelligence could receive nearly real-time feedback on how their performance and ethical posture could be improved to cover security, privacy, diversity, fairness, power balance, non-discrimination, and other requirements.</t>
        </li>
        <li>
          <t><strong>Labeling and certification</strong> : Mapping to existing and future regulatory initiatives and standards.</t>
        </li>
      </ul>
      <t>The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT products and their components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Schema is an extensible JSON-based format.</t>
    </section>
    <section anchor="requirement-levels">
      <name>Requirement Levels</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Disclosure:</dt>
        <dd>
          <t>Disclosure (Ethics Disclosure, or self-disclosure) is application-specific information about the data collection, data processing, and decision-making practices of a Product, provided by the Product Vendor (an individual developer or an organization).</t>
        </dd>
        <dt>Disclosure Feed:</dt>
        <dd>
          <t>A historical sequence of Disclosures, made for a specific Product.</t>
        </dd>
        <dt>Disclosure Identity Provider:</dt>
        <dd>
          <t>The automated Disclosure processing is enabled by requests to both the Open Ethics Disclosure database powered by Disclosure Identity Providers (DIP) and the Product's OETP Disclosure file, stored in the product's website root following OETP specification. DIP serves as a service point to generate and retrieve generated disclosures.</t>
        </dd>
        <dt>OETP Disclosure Schema:</dt>
        <dd>
          <t>A predefined structure for Disclosure, supplied in the form of the JSON schema. The current version of the JSON schema is available on GitHub <eref target="https://github.com/OpenEthicsAI/OETP/tree/main/schema">https://github.com/OpenEthicsAI/OETP/tree/main/schema</eref> and is visualized on <eref target="https://openethics.ai/oetp/">https://openethics.ai/oetp/</eref>.</t>
        </dd>
        <dt>Transparency Manifest:</dt>
        <dd>
          <t>A JSON file, typically named <tt>OETP.json</tt> or <tt>transparency.json</tt>, storing the Disclosure using the defined OETP Disclosure Schema.</t>
        </dd>
        <dt>Vendor:</dt>
        <dd>
          <t>A legal person (an individual developer or an organization) that owns one or several end-user Products, or acts as a Supplier and provides Components for other Vendors.</t>
        </dd>
        <dt>Integrator:</dt>
        <dd>
          <t>A legal person (an individual developer or an organization) that deploys technology-powered services to the end-users based on Product(s) from third-party Vendors.</t>
        </dd>
        <dt>Product:</dt>
        <dd>
          <t>An IT system in the form of software, software as a service system, application, software component, application programming interface, or a physically embodied automated decision-making agent.</t>
        </dd>
        <dt>Component:</dt>
        <dd>
          <t>An IT system supplied by Vendor and integrated/embedded into end-user Products. Components themselves do not necessarily interface with end-users.</t>
        </dd>
        <dt>Upstream Component:</dt>
        <dd>
          <t>A Component that sends its outputs to the Product Downstream in the data processing chain. Disclosure for the Upstream Component is represented as a Child relative to the Disclosure node of the Downstream Product.</t>
        </dd>
        <dt>Downstream Component:</dt>
        <dd>
          <t>A Component that receives inputs from the Components Upstream in the data processing chain. Disclosure for the Downstream Component is represented as a Parent relative to the Disclosure node of the Upstream Component.</t>
        </dd>
        <dt>Automated Decision-Making (ADM):</dt>
        <dd>
          <t>Automated decision-making is the process of making a decision by automated means without any human involvement. These decisions can be based on factual data, as well as on digitally created profiles or inferred data.</t>
        </dd>
        <dt>Validation:</dt>
        <dd>
          <t>A sequence of automated software-based checks to control validity and security elements in the OETP Disclosure.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>A third-party legal person trusted to perform Verification checks and to issue Verification Proofs.</t>
        </dd>
        <dt>Auditing software:</dt>
        <dd>
          <t>An automated software-based tool authorized to perform Verification checks and to issue Verification Proofs.</t>
        </dd>
        <dt>Verification:</dt>
        <dd>
          <t>A procedure to control the correspondence of the elements in the OETP Disclosure and the actual data processing and data collection practices of the Vendors.</t>
        </dd>
        <dt>Verification Proof:</dt>
        <dd>
          <t>A result of the formal Disclosure Verification procedure presented to a requestor.</t>
        </dd>
        <dt>Chaining:</dt>
        <dd>
          <t>A process of combining Disclosures of individual Components into a composite high-level Disclosure for a Product.</t>
        </dd>
        <dt>Label:</dt>
        <dd>
          <t>User-facing graphical illustrations and textual descriptions of the Product that facilitate understanding of the values and risks the Product carries.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocol-model">
      <name>Protocol Model</name>
      <t>The Disclosure creation and delivery consist of the two parts, starting from (I) the submission of the Disclosure form, chaining of the Suppliers' Disclosures, Signature of the disclosed information, and the delivery part (II) that first checks that the Disclosure is Valid, and then that the information specified in it is Verified by the third-parties. <xref target="_figure-disclosure-creation"/> shows disclosure creation steps.</t>
      <!-- <img src="../diagrams/images/disclosure-creation/disclosure-creation.svg" alt="Creation of the Disclosure"> -->

<section anchor="creation-of-disclosure">
        <name>Creation of Disclosure</name>
        <t>The initial Disclosure is created by filling out a standardized disclosure form (for example, see 1. <eref target="https://openethics.ai/label/">https://openethics.ai/label/</eref>). A Vendor representative, a Product Owner, or a Developer, <bcp14>MUST</bcp14> submit data-processing and data-collection information about the Product. The information about the end-point URL, as well as a contact email address, <bcp14>MUST</bcp14> be specified. Disclosure <bcp14>MAY</bcp14> also be created in a fully automated way as a part of the CI/CD DevOps pipeline. <xref target="_figure-disclosure-submission-basic"/> shows basic disclosure submission process.</t>
        <!-- <img src="../diagrams/images/disclosure-submission-basic/disclosure-submission-basic.svg" alt="Basic Disclosure Submission"> -->

<section anchor="cryptographic-signature">
          <name>Cryptographic Signature</name>
          <t>The Disclosure is organized into a predefined data schema and <bcp14>MUST</bcp14> be cryptographically signed by the Signature Generator (Open Ethics or federated providers) using standard SHA3-512 hash implementation. The integrity hash <bcp14>MUST</bcp14> be appended to a disclosure as the <tt>OETP.schema.integrity</tt> element.</t>
        </section>
        <section anchor="immutable-storage">
          <name>Immutable Storage</name>
          <t>Both the signature integrity hash and the Disclosure <bcp14>SHOULD</bcp14> be stored in the log-centric root database and <bcp14>MAY</bcp14> be mirrored by other distributed databases for redundancy and safety.</t>
        </section>
        <section anchor="visual-labeling">
          <name>Visual Labeling</name>
          <t>Open Ethics Label <bcp14>SHOULD</bcp14> be automatically generated by mirroring the submitted Disclosure into a set of graphical icons and simple human-readable descriptions. Additional Labels <bcp14>MAY</bcp14> be generated following successful third-party Verification and by mapping the regulatory requirements to Verified Disclosures.</t>
        </section>
      </section>
      <section anchor="access-to-disclosure">
        <name>Access to Disclosure</name>
        <section anchor="initial-request-to-a-disclosure-file">
          <name>Initial Request to a Disclosure file</name>
          <t>The most recent OETP file <bcp14>SHOULD</bcp14> be stored in the root of the Product's specified end-point URL, allowing requests to the OETP file from third-party domains. When establishing a Vendor relationship, the Integrator or a downstream Vendor <bcp14>MAY</bcp14> examine the Disclosure for their Components using the following HTTP request: <tt>GET https://testexample.com/oetp.json</tt>, where <em>testexample.com</em> is the URL of the Supplier's end-point.</t>
        </section>
        <section anchor="access-to-visual-trust-labels">
          <name>Access to Visual Trust Labels</name>
          <t>A Vendor <bcp14>SHOULD</bcp14> place a visual Label generated as a result of the Disclosure process in the Product informational materials (for example Marketing Materials, User Guides, Safety Instructions, Privacy Policy, Terms of Service, etc). The Label reflects the content of the Disclosure and <bcp14>SHOULD</bcp14> be displayed in any digital media by embedding a software widget. Visual labels in the print media <bcp14>SHOULD</bcp14> carry a visually distinguishable Integrity signature to enable manual Validation by the User.</t>
        </section>
        <section anchor="requirements-for-placement-of-integrity-signature-in-visual-label">
          <name>Requirements for placement of Integrity Signature in Visual Label</name>
          <ul spacing="normal">
            <li>
              <t><strong>Labels in the online digital media</strong> <bcp14>MUST</bcp14> be generated automatically based on the content of the Disclosure and <bcp14>MUST</bcp14> contain a URL allowing to check the complete Integrity hash and explore more detailed information about the Disclosure.</t>
            </li>
            <li>
              <t><strong>Labels in the offline media</strong> <bcp14>MUST</bcp14> be generated automatically based on the content of the Disclosure and should carry the first 10 digits of the corresponding Integrity hash.</t>
            </li>
          </ul>
        </section>
        <section anchor="conformity-assessment-marks">
          <name>Conformity assessment marks</name>
          <t>Based on the Verification performed for the OETP Disclosure file, the labels <bcp14>MAY</bcp14> include Conformity assessment marks, Certification marks, as well as marks showing adherence to certain standards. These marks <bcp14>MAY</bcp14> be generated and displayed automatically based on the Verification Proofs.</t>
        </section>
        <section anchor="accessibility-considerations">
          <name>Accessibility considerations</name>
          <t>Accessibility of the Labels for the visually impaired Users <bcp14>SHOULD</bcp14> be considered. The OETP Processing system <bcp14>MUST</bcp14> provide alternative forms of the Label so that text-to-speech tools could be used to narrate the Label without the lost of meaning.</t>
          <t>1) A Label <bcp14>MUST</bcp14> contain a title. Title could be either marked by the <tt>aria-label</tt> attribute for the narration software or be labeled by another content tag(s) present via <tt>aria-labelledby</tt> attribute, pointing to the ID(s) describing the label content.</t>
          <figure anchor="_figure-example-oel-snippet">
            <name>Example Label Snippet Content</name>
            <sourcecode type="HTML"><![CDATA[
<!-- Open Ethics Label snippet: visible content -->
<a href="https://openethics.ai/label" target="_blank">
    <div id="label" aria-label="Open Ethics Label">
        <img src="/src/images/Open Ethics logo.svg" class="oesign svg" height="30" alt="Open Ethics Logo" role="img" aria-hidden="true">
        <!-- Dynamic Content of the Open Ethics Label goes here -->
    </div>
</a>
]]></sourcecode>
          </figure>
          <t>2) Every icon that is present in the visual Label <bcp14>MUST</bcp14> contain a title, describing the property illustrated by the icon. A more extended description <bcp14>MAY</bcp14> be provided when necessary. The following patterns are suggested:</t>
          <ul spacing="normal">
            <li>
              <t>Pattern for images embedded using SVG tags: <tt>&lt;img&gt; + role="img" + alt="[title text here]"</tt> OR <tt>&lt;img&gt; + role="img" + aria-label="[title text here]"</tt></t>
            </li>
            <li>
              <t>Pattern for images embedded using IMG tags: <tt>&lt;svg&gt; + role="img" + &lt;title&gt; + &lt;desc&gt; + aria-labelledby="[ID]"</tt></t>
            </li>
          </ul>
          <figure anchor="_figure-example-oel-icon-label-source-open">
            <name>Example of the SVG icon with ARIA attributes for Accessibility</name>
            <sourcecode type="XML"><![CDATA[
<svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-labelledby="iconOpenSourceCodeTitle iconOpenSourceCodeDescription">
<title id="iconOpenSourceCodeTitle">Algorithms and code libraries: Open Source Code</title>
<desc id="iconOpenSourceCodeDescription">This product/component has disclosed that it mainly uses the Open Source Code as a part of its codebase.</desc>
<circle cx="8" cy="8" r="7" fill="#FFFFFF" class="branding-accent" />
<path d="M10.56 4.83221C9.70667 4.08053 8.64 3.75839 7.46667 3.97315C5.44 4.18792 3.84 6.01342 3.84 8.16107V8.26845C3.84 8.37584 3.84 8.48322 3.84 8.5906C3.94666 9.98658 4.8 11.1678 6.08 11.9195C6.4 11.1678 6.61333 10.5235 6.82667 9.87919C6.18667 9.44966 5.86667 8.80537 5.86667 8.05369C5.86667 7.51678 6.08 7.08725 6.4 6.7651C7.14667 6.01342 8.21333 5.79866 9.06667 6.33557C9.81333 6.7651 10.1333 7.51678 10.1333 8.37584C10.0267 9.02013 9.70667 9.55704 9.17333 9.87919C9.38667 10.5235 9.70667 11.1678 9.92 11.9195C10.4533 11.5973 10.9867 11.1678 11.4133 10.6309C12.0533 9.77181 12.2667 8.69798 12.16 7.62416C12.0533 6.55033 11.52 5.47651 10.56 4.83221Z" fill="#333333" class="branding-main" />
<path d="M8 0C3.62667 0 0 3.54362 0 7.94631C0 12.349 3.62667 16 8 16C12.3733 16 16 12.4564 16 7.94631C16 3.43624 12.3733 0 8 0ZM9.92 12.8859C9.81333 12.8859 9.70667 12.9933 9.49333 12.8859C9.38667 12.8859 9.28 12.7785 9.17333 12.5638L8.10667 9.77181C8.10667 9.55705 8.21333 9.34228 8.42667 9.2349C8.85333 9.02013 9.06667 8.80537 9.17333 8.37584C9.17333 8.05369 9.17333 7.73154 8.96 7.51678C8.74667 7.19463 8.42667 6.97987 8.10667 6.97987C7.46667 6.97987 6.93333 7.30201 6.93333 7.94631C6.82667 8.48322 7.04 8.91275 7.57333 9.2349C7.89333 9.34228 8 9.55705 7.89333 9.87919L6.82667 12.6711C6.72 12.8859 6.61333 12.8859 6.61333 12.9933C6.61333 12.9933 6.50667 12.9933 6.4 12.9933C6.29333 12.9933 6.29333 12.9933 6.18667 12.9933C5.01333 12.5638 4.05333 11.7047 3.52 10.5235C2.98667 9.55705 2.88 8.80537 2.88 8.37584V8.26846C2.88 5.58389 4.8 3.43624 7.36 3.11409C10.1333 2.68456 12.5867 4.61745 13.12 7.30201C13.5467 9.66443 12.2667 12.0268 9.92 12.8859Z" fill="#333333" class="branding-main" />
</svg>
]]></sourcecode>
          </figure>
        </section>
      </section>
      <section anchor="verification-and-validation-of-disclosure">
        <name>Verification and Validation of Disclosure</name>
        <section anchor="automated-disclosure-processing">
          <name>Automated Disclosure processing</name>
          <t>The automated Disclosure processing is enabled by requests to both the Open Ethics Disclosure database powered by Disclosure Identity Providers and the Product's OETP Disclosure file.</t>
          <t>To allow efficient decentralization and access to the disclosures of autonomous systems, such as AI systems powered by trained machine learning models, the vendor (or a developer) <bcp14>MUST</bcp14> send requests to a Disclosure Identity Provider. Disclosures <bcp14>MAY</bcp14> be resolved using URIs. To satisfy the mentioned requirements for disclosure RI, it is proposed in <xref target="OETP-RI"/> to use the following formats:</t>
          <ul spacing="normal">
            <li>
              <t><tt>oetp://&lt;hash&gt;</tt> - Here integrity <tt>&lt;hash&gt;</tt> is the SHA3-512 generated during the disclosure process.</t>
            </li>
            <li>
              <t><tt>oetp://&lt;component&gt;@&lt;alias&gt;[:&lt;disclosure&gt;]</tt> - Here <tt>&lt;component&gt;</tt> is the ID assigned via Disclosure Identity Provider under its <tt>&lt;alias&gt;</tt> during the first disclosure.</t>
            </li>
            <li>
              <t><tt>oetp://&lt;domain&gt;[:&lt;disclosure&gt;]</tt> - For verified domains (Domain Validation), disclosure could be accessed using product's <tt>&lt;domain&gt;</tt> instead of <tt>&lt;component&gt;@&lt;alias&gt;</tt>.)</t>
            </li>
          </ul>
        </section>
        <section anchor="validation-of-vendor39s-disclosures">
          <name>Validation of Vendor's Disclosures</name>
          <t>The OETP Processing system <bcp14>MUST</bcp14> compare integrity hashes in the Open Ethics Disclosure database and entries that arrive as a result of the Disclosure Request response.</t>
        </section>
        <section anchor="verification-of-vendor39s-disclosures">
          <name>Verification of Vendor's Disclosures</name>
          <t>Every disclosure <bcp14>SHOULD</bcp14> be checked for the existence of the external Verification from Auditors for the entire Disclosures or one of the Disclosure elements.</t>
        </section>
        <section anchor="progressive-verification">
          <name>Progressive Verification</name>
          <t>To raise a level of trust in a Disclosure, a Vendor <bcp14>MAY</bcp14> decide to opt-in for a third-party Disclosure Verification. OETP suggests a Progressive Verification scheme where multiple independent external Verification Proofs COULD be issued by third parties to confirm the information specified in the Disclosure.</t>
          <t>The Progressive Verification applies to a whole Disclosure, or to specific elements of the Disclosure.</t>
          <t><xref target="_figure-disclosure-progressive-verification"/> displays a general scheme for Disclosure requests and responses.</t>
          <!-- <img src="../diagrams/images/disclosure-progressive-verification/disclosure-progressive-verification.svg" style="float: left; margin-right: 10px;" alt="Progressive Verification Scheme for Disclosures" /> -->

<t>The following elements <bcp14>MAY</bcp14> serve as sources for various kinds of Verification proofs:
* Qualified Auditor reports
* Qualified Vendor of Auditing software tests
* Certification Authority assessments
* Conformity assessments
* User Feedback
* Market Brokers
* Real-time Loggers</t>
        </section>
      </section>
      <section anchor="end-to-end-transparency-and-formation-of-the-composite-disclosure">
        <name>End-to-end transparency and formation of the composite Disclosure</name>
        <t>The IT industry is getting more mature with Vendors becoming more specialized. Surface-level transparency is not sufficient as supply chains are becoming more complex and distributed across various Components. The following steps <bcp14>MUST</bcp14> be satisfied for the end-to-end transparency:</t>
        <section anchor="open-supplier-policy">
          <name>Open Supplier Policy</name>
          <t>Every Integrator or a Vendor <bcp14>SHOULD</bcp14> disclose the information about their Suppliers (sub-processing Vendors), indicating the scope of the data processing in the Components they provide.</t>
          <t>If the Supplier information is not provided, Disclosure <bcp14>SHOULD</bcp14> contain information that a Vendor (Integrator) has not provided Supplier information.</t>
          <section anchor="first-party-components">
            <name>First-party Components</name>
            <t>For greater transparency, Vendors may decide to reveal Components even if they originate from themselves (first-party Components). For the first-party Component, the Supplier identity information <bcp14>SHOULD NOT</bcp14> be provided because it was already disclosed earlier.</t>
            <t>Required: (<xref target="component-information"/>) only</t>
          </section>
          <section anchor="third-party-components">
            <name>Third-party Components</name>
            <t>When disclosing Components originating from the third-party Vendors <bcp14>SHOULD</bcp14> provide both the Supplier identity information and Component information</t>
            <t>Required: (<xref target="supplier-identity"/>, <xref target="component-information"/>)</t>
          </section>
          <section anchor="elements-of-supplier-disclosure">
            <name>Elements of Supplier disclosure</name>
            <section anchor="supplier-identity">
              <name>Supplier identity</name>
              <ul spacing="normal">
                <li>
                  <t>Vendor Name</t>
                </li>
                <li>
                  <t>Vendor URL</t>
                </li>
                <li>
                  <t>Vendor ID</t>
                </li>
                <li>
                  <t>Vendor DPO Contact Email</t>
                </li>
              </ul>
            </section>
            <section anchor="component-information">
              <name>Component information</name>
              <ul spacing="normal">
                <li>
                  <t>Component Scope of use</t>
                </li>
                <li>
                  <t>Personal Data Being Processed by Component</t>
                </li>
                <li>
                  <t>Is a Safety Component (YES)/(NO)</t>
                </li>
                <li>
                  <t>Component URL (if different from the Vendor URL)</t>
                </li>
                <li>
                  <t>Component Disclosure URL (if different from the default <tt>Component URL/oetp.json</tt>)</t>
                </li>
                <li>
                  <t>Component DPO Contact (if different from Vendor DPO Contact Email)</t>
                </li>
              </ul>
            </section>
          </section>
        </section>
        <section anchor="request-for-supplier39s-disclosures">
          <name>Request for Supplier's Disclosures</name>
          <t>The OETP Processing system <bcp14>MUST</bcp14> send GET requests to the URLs of each Component to obtain their Disclosures. Based on the response to each Disclosure request, the OETP Processing system <bcp14>MUST</bcp14> specify which Components have Disclosures and which don't have Disclosures.</t>
          <t><xref target="_figure-disclosure-chaining-request"/> shows the process of how Disclosure Chaining requests and responses happen.</t>
          <!-- <img src="../diagrams/images/disclosure-chaining-request/disclosure-chaining-request.svg" alt="Disclosure Chaining: Request-Response"> -->

</section>
        <section anchor="disclosure-chaining">
          <name>Disclosure Chaining</name>
          <t>The same Request-response operation applies recursively for Components of the Components, for the Components of the Components of the Components, etc. It is proposed to view the supply chain as a tree-like hierarchical data structure, where the information about Components is assembled using Level Order Tree Traversal algorithm.</t>
          <t>In this tree:
* Node is a structure that contains the Component's Disclosure;
* Root is the top Node representing a Product's Disclosure information;
* Edge is the connection between one Node and another, representing the scope of the Data Processing by the Component.</t>
          <t><xref target="_figure-disclosure-chaining-tree"/> displays the order of the Disclosure Chaining with Level Order Tree Traversal algorithm.</t>
          <!-- <img src="../diagrams/images/disclosure-chaining-tree/disclosure-chaining-tree.svg" alt="Disclosure Chaining: Level Order Traversal"> -->

</section>
        <section anchor="generation-of-the-composite-disclosure">
          <name>Generation of the Composite Disclosure</name>
          <t>The current consensus from the user &amp; developer community suggests that Composite Disclosure should follow The "Weakest Link" model. According to this model, the risk that the Product is carrying should not be considered any less than the risk for each of the Components. A similar approach in dealing with software licenses has been successful by allowing to generate Software Bills of Materials (SBOMs) by providing package information in the <xref target="SPDX"/> files.</t>
          <t>Formally this approach could be illustrated with the use of a conjunction table for risk modeling (see <xref target="conjunction-table-risk-modeling"/>). The Truth Table for Logical AND operator below takes one risk factor and evaluates risk outcomes as High (H) or Low (L) for hypothetical Disclosure options of the Product(P) and its Component(C).</t>
          <table anchor="conjunction-table-risk-modeling">
            <name>Conjunction Table for Risk Modeling</name>
            <thead>
              <tr>
                <th align="center">Disclosed risk of P</th>
                <th align="center">Disclosed risk of  C</th>
                <th align="center">Composite P &amp; C</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">L</td>
                <td align="center">L</td>
                <td align="center">
                  <strong>L</strong></td>
              </tr>
              <tr>
                <td align="center">L</td>
                <td align="center">H</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
              <tr>
                <td align="center">H</td>
                <td align="center">L</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
              <tr>
                <td align="center">H</td>
                <td align="center">H</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
            </tbody>
          </table>
          <t>Further evaluation of this approach is required.</t>
        </section>
      </section>
    </section>
    <section anchor="example-oetp-disclosure-file">
      <name>Example OETP Disclosure File</name>
      <figure anchor="_figure-example-oetp-json">
        <name>Example OETP Disclosure File</name>
        <sourcecode type="JSON"><![CDATA[
{
    "schema": {
        "name": "Open Ethics Transparency Protocol",
        "version": "0.9.3 RFC",
        "integrity": "156d624b8f2dbea87128a2147f255842652475c5dc595c79f64c90c7ff486d59007c3e18c993e3163395812e26b70ea70dfc413f7ca128869d115f12e5699bf2"
    },
    "snapshot": {
        "product": {
            "url": "testexample.com",
            "description": ""
        },
        "timestamp": 1608273946,
        "generator": {
            "name": "Open Ethics",
            "alias": "oe",
            "type": "root",
            "website": "https://openethics.ai"
        },
        "label": {
            "data": {
                "type": "open",
                "practice": ""
            },
            "source": {
                "type": "open",
                "practice": ""
            },
            "decision": {
                "type": "restricted",
                "practice": ""
            }
        }
    }
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="response-content">
        <name>Response content</name>
        <t>OETP exchanges data using JSON <xref target="RFC8259"/> which is a lightweight data-interchange format. A JSON-based application can be attacked in multiple ways such as sending data in an improper format or embedding attack vectors in the data. It is important for any application using JSON format to validate the inputs before being processed. To mitigate this attack type, the JSON Key Profile is provided for OETP responses.</t>
      </section>
      <section anchor="spoofing">
        <name>Spoofing</name>
        <t>OETP Processors should be aware of the potential for spoofing attacks where the attacker publishes an OETP disclosure with the <tt>OETP.snapshot</tt> value from another product, or, perhaps with an outdated <tt>OETP.snapshot.label</tt> element. For example, an OETP Processor could suppress the display of falsified entries by comparing the snapshot integrity from the submission database and a calculated hash for the <tt>OETP.snapshot</tt> object. In that situation, the OETP Processor might also take steps to determine whether the disclosures originated from the same publisher require further investigation of the Disclosure Feed and alert the downstream OETP Processors.</t>
      </section>
      <section anchor="falsification">
        <name>Falsification</name>
        <t>Dishonest or falsified Disclosures is a problem that is hard to address generally. The approach to it is public control and systematic checks. Vendors or user-facing applications and services could further raise the level of trust in their Disclosures by implementing programmatic control scoring mechanisms, as well as the external verification by trusted Auditors.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Disclosures <bcp14>MAY</bcp14> be resolved using their URIs. To allow this requirement, the <tt>oetp://</tt> URI scheme should be registered with IANA.</t>
    </section>
    <section anchor="areas-for-future-study">
      <name>Areas for Future Study</name>
      <t>The following topics not addressed in this version of the document are possible areas for the future study:</t>
      <ul spacing="normal">
        <li>
          <t>Extensibility of the OETP Disclosure Schema.</t>
        </li>
        <li>
          <t>Evaluate other methods of Generation of the Composite Disclosure based on the Disclosure Tree</t>
        </li>
        <li>
          <t>Disclosure Chaining mechanisms and various use-cases.</t>
        </li>
        <li>
          <t>Typical scenarios and templates for Disclosure submissions.</t>
        </li>
        <li>
          <t>Mapping of the regulatory requirements and future Disclosure elements.</t>
        </li>
        <li>
          <t>Standardizing Privacy Disclosure and PII data-collection practices.</t>
        </li>
        <li>
          <t>Enhancing Label accessibility with ARIA W3C Recommendation and other approaches.</t>
        </li>
        <li>
          <t>Use of the OETP Disclosure in the ADM explainability (XAI).</t>
        </li>
        <li>
          <t>Disclosure Schemas for families of "Generative AI" technologies such as Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), Conditional Variational Autoencoders (CVAEs), Attention Mechanisms, Transformer-based Models.</t>
        </li>
        <li>
          <t>Interoperability of the agentic disclosure and the Model Context Protocol (MCP)</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SPDX" target="https://spdx.dev/">
          <front>
            <title>SPDX Specification – Version 2.2</title>
            <author>
              <organization>The Linux Foundation</organization>
            </author>
            <date year="2020"/>
          </front>
          <format type="PDF" target="https://spdx.dev/wp-content/uploads/sites/41/2020/08/SPDX-specification-2-2.pdf"/>
          <format type="HTML" target="https://spdx.github.io/spdx-spec/"/>
        </reference>
        <reference anchor="OETP-RI" target="https://github.com/OpenEthicsAI/OETP-RI-scheme">
          <front>
            <title>Resource Identifier Scheme for OETP</title>
            <author>
              <organization>Open Ethics Initiative</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
      </references>
    </references>
    <?line 413?>

<section anchor="appendix">
      <name>Appendix</name>
      <section anchor="figures">
        <name>Figures</name>
        <t>Diagrams could be built from code using the below <tt>*.puml</tt> files automatically using <eref target="https://plantuml.com/">PlantUML</eref>.</t>
        <section anchor="creation-of-disclosure-1">
          <name>Creation of Disclosure</name>
          <figure anchor="_figure-disclosure-creation">
            <name>Creation of the Disclosure</name>
            <sourcecode type="PUML"><![CDATA[
@startuml

title Disclosure Creation Process

skinparam roundCorner 15

actor "Supplier A" as SA
actor "Supplier B" as SB
actor Vendor as V

component "Component A" as CA
component "Component B" as CB
file "Disclosure A" as DA
file "Disclosure B" as DB
file "Composite Disclosure" as D

V-right->(Creation):disclose
SA-up->CA
SB-up->CB
CA-up->DA
CB-up->DB
DA-up->(Chaining)
DB-up->(Chaining)
(Creation)->(Chaining)
(Chaining)->(Validation)
(Validation)->(Verification)
(Verification)->D
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="basic-disclosure-submission">
          <name>Basic Disclosure Submission</name>
          <figure anchor="_figure-disclosure-submission-basic">
            <name>Basic Disclosure Submission</name>
            <sourcecode type="PUML"><![CDATA[
@startuml
title Basic Disclosure Submission

skinparam roundCorner 15
autonumber

actor Vendor
database "Disclosure Identity Provider" as ID
control "Signature Generator" as SIG
database "Federated Identity Provider" as DIS

Vendor -> ID: Request with Disclosure payload
ID -> ID: Validate input
ID -> SIG: Structured Data, Initialized

ID <-- SIG: SHA3-512 integrity hash
    group Distributed Identity Storage
DIS <-- SIG: SHA3-512 integrity hash
end
ID -> ID: Log OETP file and a corresponding intgrity hash
Vendor <-- ID: OETP Disclosure File
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="progressive-verification-scheme-for-disclosures">
          <name>Progressive Verification Scheme for Disclosures</name>
          <figure anchor="_figure-disclosure-progressive-verification">
            <name>Progressive Verification Scheme for Disclosures</name>
            <sourcecode type="PUML"><![CDATA[
@startuml

title Progressive Verification with multiple Auditors

skinparam roundCorner 15
autonumber
actor User
User -> Vendor: Disclosure Request
User <-- Vendor: OETP Disclosure File

database "Disclosure Identity Provider" as ID

User -> ID: Disclosure Validation and Verification Request

group Progressive Disclosure Verification
    ID -> ID: Retrieve and Compare Disclosure Integrity
    ID -> "Auditor 1": Disclosure Verification Request
    ID <-- "Auditor 1": Verification Proof 1
    ID -> "Auditor N": Disclosure Verification Request
    ID <-- "Auditor N": Verification Proof N
end

User <-- ID: Verification response

User -> Vendor: Service Request
User <-- Vendor: Service Response
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="disclosure-chaining-request-response">
          <name>Disclosure Chaining: Request-Response</name>
          <figure anchor="_figure-disclosure-chaining-request">
            <name>Disclosure Chaining: Request-Response</name>
            <sourcecode type="PUML"><![CDATA[
@startuml
title Disclosure Chaining: Request-Response


start
repeat
  :Request Component's Disclosure;
    if (Disclosure Obtained?) then (yes)
      :Validate Disclosure;
      :Verify Disclosure;
      :Chain Disclosure;
      :Obtain list of Child Components;
      if (Supplier information exists?) then (yes)
        :Update Tree with (yet)
        Unchained Disclosures;
      else (no)
        #Gold:**Alert** "Vendor has not provided
        Supplier information";
      endif
    else (no)
      #pink:**Alert** "Vendor has not provided
      any Disclosure";
      stop
    endif
repeat while (Unchained Disclosures in the Disclosure Tree?) is (yes) not (no)
:**Generate**
Composite Disclosure;
#palegreen:**Display** Label for "Composite Disclosure";
stop

@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="disclosure-chaining-level-order-traversal">
          <name>Disclosure Chaining: Level Order Traversal</name>
          <figure anchor="_figure-disclosure-chaining-tree">
            <name>Disclosure Chaining: Level Order Traversal</name>
            <sourcecode type="PUML"><![CDATA[
@startmindmap
title Disclosure Chaining: Level Order Traversal

skinparam roundCorner 15
* Root (Product)
        * 1 (Component)
                * 3 (Component)
                        * 7 (Component)
                * 4 (Component)
        * 2 (Component)
                * 5 (Component)
                        * 8 (Component)
                        * 9 (Component)
                * 6 (Component)
@endmindmap
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Part of this work related to Verification and Validation of Disclosure and Disclosure Chaining was supported by the H2020 Programme of the European Commission under Article 15 of Grant Agreement No. 951972 StandICT.eu 2023</t>
      <t>The Open Ethics community and expert volunteers contributed with their valuable feedback, discussions, and comments. Thank you Ashley Duque Kienzle, Angela Kim, Ioannis Zempekakis, Karl Müdespacher, Ida Varošanec, Claudia Del Pozo, Joerg Buss, Mariia Kriuchok, Minhaaj Rehman, Oleksii Molchanovskyi, Roberta Barone, Phil Volkofsky and others.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
