Skip to content

Distinction between policies which can be enforced by technology and by law #286

@elf-pavlik

Description

@elf-pavlik

A while ago we had discussion around https://protect.oeg.fi.upm.es/odrl-access-control-profile/oac.html

I was emphasizing that many of ODRL policies can be enforced by technology, lead to access denied, they can only be enforced by legal action. I think we should provide distinct ways to express policies based on how they can get enforced.

Interesting example here would problems related to acl:Control access mode. While Resource Owner setting policies using this mode may get impression that it will prevent users without acl:Control to share their access, I would consider such thinking as naive.

In Delegation use case i list various pretty straight forward way how someone without acl:Control access can still fully share their access by using impersonation pattern. It may be clearer if policies restricting delegation are set as one that can be enforced by law not by technology. I think we may ended up with this naive notion of security associated with acl:Control because we didn't provide way to express policies which are not enforceable by technology.

TODO

  • add use cases and requirements related to setting policies enforceable by law
  • define how those policies can be communicated, for any level of access granted (eg. just read) - Data Grants could be good candidate

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions