[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: Bill Manning <bmanning@isi.edu>
cc: shollenbeck@verisign.com (Hollenbeck, Scott), ietf-provreg@cafax.se, brunner@nic-naa.net
From: Eric Brunner-Williams in Portland Maine <brunner@nic-naa.net>
Date: Mon, 19 Feb 2001 13:28:16 -0500
In-Reply-To: Your message of "Mon, 19 Feb 2001 08:46:11 PST." <200102191646.f1JGkBV15164@zed.isi.edu>
Sender: owner-ietf-provreg@cafax.se
Subject: Re: grrp-reqs-06, 11. Security Considerations [3]


So the answer is "many" if the question is "how many distinct flows exist?".

There exist two or more flows within the "technical information", depending
upon the model (Bill's note).

There exist two or more flows within the "social information", depending
upon the model (Eric's note).

So, the reason why we have a "Security Considerations" section, but not a
"Data Collection Considerations" section is ... 

To speak to Bill's earlier question:
% 	What is the distinction between "technical" and "non-technical"?

   Covered, zone vs non, per Scott.

% 	Are these definitions immutatble within/between juristictions?

   IMO no, given the variations between the US, the OEDC and EC data regiemes.

% 	Will they withstand legal review?

   See above.

% 	In which venues?

   See above.

Eric

Home | Date list | Subject list