<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dsmullen-ppd-architecture-10" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PPDArch">Privacy Preference Declaration for Home Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-architecture-10"/>
    <author fullname="Daniel Smullen">
      <organization>CableLabs</organization>
      <address>
        <email>d.smullen@cablelabs.com</email>
      </address>
    </author>
    <author fullname="Brian Scriber">
      <organization>CableLabs</organization>
      <address>
        <email>brian.scriber@computer.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="22"/>
    <keyword>privacy preferences</keyword>
    <keyword>home networks</keyword>
    <keyword>internet of things</keyword>
    <keyword>device transparency</keyword>
    <abstract>
      <?line 37?>

<t>This document describes an architecture for signaling household privacy preferences to devices in home networks through Privacy Preference Declarations (PPDs).  The architecture enables a PPD participant to discover a PPD service endpoint, establish trust in that endpoint through the applicable protocol and security profile, retrieve the applicable household policy instance, and acknowledge receipt of that policy instance.  The acknowledgment establishes that a specific policy instance was made available to the participant; it does not, by itself, assert anything about the participant's subsequent behavior.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drspangle.github.io/draft-dsmullen-ppd-architecture/draft-dsmullen-ppd-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dsmullen-ppd-architecture/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/drspangle/draft-dsmullen-ppd-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Internet-connected home devices commonly collect sensitive data, yet the tools
available to households for understanding or controlling that collection are
often fragmented, confusing, or absent. When privacy settings do exist, they
frequently vary widely in semantics and presentation across devices and
services.</t>
      <t>The result is a fragmented operational model. Households must manage privacy
through device-specific controls, while vendors and service providers have no
common way to receive household privacy preferences across devices. That lack
of a shared signaling model makes it harder for households to understand which
participants have been presented with which privacy expectations, and harder
for implementers to support interoperable behavior.</t>
      <t><xref target="RFC7258"/> frames mass data collection as a technical threat, urging protocol designers to limit exposure through encryption and data minimization.
While this principle is crucial in adversarial, internet-scale contexts, the model proposed in this document takes a different approach: rather than hiding data flows, it seeks to govern them.
Privacy here is not achieved by making devices blind, but by making user-defined preferences visible to devices and associated services.</t>
      <t>This use of privacy is related to, but distinct from, the privacy guidance in <xref target="RFC6973"/>, which emphasizes reduced observability, linkability, and identifiability in protocol design.
Those properties remain important, but PPD focuses on a different home-network problem: a user needs a consistent way to express household privacy preferences and to know that those preferences were made available to participating devices or associated services.
This document is also aligned with the user-agency goals described in <xref target="RFC8280"/>, but it is narrower and more operational.
It describes an architecture for privacy-preference signaling and recordkeeping, not a general framework for human-rights analysis or for constraining device behavior.
Home networks are a significant and operationally important IoT environment.
They commonly place a local administrative boundary around large numbers of devices, many with limited or no end-user interface, making them a concrete target for a privacy-preference signaling architecture.
In this architecture, discovery identifies candidate participant-facing service endpoints.
Trust in a selected endpoint, and in the policy instances it presents, is established separately through the applicable protocol and security mechanisms rather than by discovery alone.
This also addresses an asymmetry common in current deployments: the household user is often required to acknowledge device- or vendor-defined terms, while the household has no comparable way to record that a participating device or associated service was presented with the household's privacy policy.
PPD introduces a reciprocal signaling path in which presentation and acknowledgment of a household policy instance can be recorded by the household domain.
The objective is to provide a coherent architectural basis for devices and associated services to retrieve, acknowledge, and keep current with household privacy preferences within that administrative domain.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The terms below define both protocol roles and core concepts used by this architecture.
The definitions of privacy, transparency, and user control are included here because they describe the conceptual scope of PPD rather than separate protocol mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl>
          <dt>Privacy:</dt>
          <dd>
            <t>In this document, the ability of users to understand and shape how data about them, their household, or their home environment is collected, used, retained, and shared by devices and associated services.</t>
          </dd>
          <dt>Transparency:</dt>
          <dd>
            <t>The property that data practices are made visible and understandable to the user, including what data is collected, how it is processed, where it is shared, and what policy preferences apply.</t>
          </dd>
          <dt>User control:</dt>
          <dd>
            <t>The ability of a user or household to define privacy preferences and make those preferences visible to devices or associated services in a consistent and actionable way.</t>
          </dd>
          <dt>Privacy Preference Declaration (PPD):</dt>
          <dd>
            <t>A structured expression of household privacy preferences that can be discovered, retrieved, and acknowledged by PPD participants.</t>
          </dd>
          <dt>PPD service endpoint:</dt>
          <dd>
            <t>A participant-facing service, and the baseline discovery target for participants, through which a PPD participant discovers, retrieves, and acknowledges applicable policy instances.</t>
          </dd>
          <dt>Policy authority:</dt>
          <dd>
            <t>The authoritative source of household policy state and of any inputs used to derive an effective policy for a participant.  The policy authority may be local or remote.  Participants are not required to discover or address the policy authority directly in the baseline architecture.</t>
          </dd>
          <dt>Household policy:</dt>
          <dd>
            <t>A policy selected or maintained for a home network that represents the household's privacy preferences.</t>
          </dd>
          <dt>Effective policy derivation:</dt>
          <dd>
            <t>The logical function, performed by or on behalf of the policy authority, that determines the effective policy instance for a participant.</t>
          </dd>
          <dt>Effective policy:</dt>
          <dd>
            <t>The policy instance that applies to a particular PPD participant at a particular time, after effective policy derivation has resolved household policy state and any applicable participant-specific inputs.</t>
          </dd>
          <dt>PPD participant:</dt>
          <dd>
            <t>A device, or a trusted intermediary such as a backend service acting on behalf of a device, that participates in PPD by retrieving and acknowledging an applicable policy instance.</t>
          </dd>
          <dt>Policy instance:</dt>
          <dd>
            <t>A specific version or representation of an effective policy that can be identified for acknowledgment and recordkeeping.</t>
          </dd>
          <dt>Association:</dt>
          <dd>
            <t>The state established when a PPD participant has retrieved the current applicable effective policy and acknowledged receipt of that specific policy instance.</t>
          </dd>
          <dt>Current association:</dt>
          <dd>
            <t>Association state that still corresponds to the latest applicable effective policy for the participant and remains fresh according to the renewal model enforced by the PPD service endpoint.</t>
          </dd>
          <dt>Association freshness:</dt>
          <dd>
            <t>The property that an association remains within the bounded interval, or before the renewal deadline, accepted by the PPD service endpoint for treating that association as current.</t>
          </dd>
          <dt>Stale association:</dt>
          <dd>
            <t>Association state that still refers to the latest applicable effective policy instance, but whose freshness can no longer be confirmed because renewal did not occur within the bounded interval accepted by the PPD service endpoint.</t>
          </dd>
          <dt>Needs reassociation:</dt>
          <dd>
            <t>A state in which current association cannot be confirmed because the applicable effective policy changed, participant state relevant to effective policy derivation changed, or enough state was lost that the existing association no longer applies reliably.</t>
          </dd>
          <dt>Reassociation:</dt>
          <dd>
            <t>The process by which a PPD participant recovers from stale association or a needs-reassociation state and re-establishes current association.</t>
          </dd>
          <dt>Broken association:</dt>
          <dd>
            <t>A state in which stored or reported information is contradictory or incomplete enough that current association cannot be determined reliably.</t>
          </dd>
          <dt>Policy acknowledgment:</dt>
          <dd>
            <t>A signal that a PPD participant has received a specific effective policy instance.  A policy acknowledgment is not a statement that the device is compatible with every policy term or that the device will behave in a particular way.</t>
          </dd>
          <dt>Network-observed device:</dt>
          <dd>
            <t>A device that is visible to the local network through ordinary network observation but that has not established association through PPD.</t>
          </dd>
          <dt>Unmanaged device:</dt>
          <dd>
            <t>A network-observed device that is not known to participate in PPD or is not currently manageable through PPD association.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="limitations-of-existing-mechanisms">
      <name>Limitations of Existing Mechanisms</name>
      <t>Current mechanisms for managing data privacy within the home environment exhibit limitations.</t>
      <section anchor="device-specific-configurations">
        <name>Device-specific Configurations</name>
        <t>Individual devices often employ unique privacy settings, thereby complicating user management of privacy across the entire network.
This complexity can inadvertently lead to unintended data sharing.</t>
      </section>
      <section anchor="ineffective-and-unusable-user-interfaces">
        <name>Ineffective and Unusable User Interfaces</name>
        <t>Navigating and configuring privacy settings on individual devices can be a time-consuming and frustrating experience for users.
These ineffective interfaces often lead users to habitually agree to relax their privacy preferences without fully understanding the implications of their decisions.
This fosters a general resignation towards privacy management, making it difficult for users to exert meaningful control over their personal data and ultimately compromising their privacy expectations.</t>
      </section>
      <section anchor="relationship-to-existing-work">
        <name>Relationship to Existing Work</name>
        <section anchor="dnt-and-p3p">
          <name>DNT and P3P</name>
          <t>Protocols like Do Not Track (DNT) and Platform for Privacy Preferences Project (P3P) have not achieved widespread adoption and have proven inadequate for addressing nuanced privacy needs.
These protocols do not provide the participant-specific policy signaling, lifecycle handling, or home-network operational posture needed here.
They also do not provide a practical basis for recording that a participating device or associated service was presented with a household policy instance.</t>
        </section>
        <section anchor="mud">
          <name>MUD</name>
          <t>Manufacturer Usage Description (MUD) <xref target="RFC8520"/> is the closest existing precedent for device-to-home-network signaling.
MUD is focused on manufacturer-defined network communication intent presented to local network infrastructure.
PPD addresses a different problem: household-defined privacy preference signaling, participant-specific effective policy presentation, and recordkeeping about whether a participant was presented with a current household policy instance.
The two approaches may complement each other in a deployment, but MUD does not provide the privacy-policy lifecycle or recordkeeping model described here.</t>
        </section>
        <section anchor="privacy-vocabularies-and-policy-models">
          <name>Privacy Vocabularies and Policy Models</name>
          <t>Vocabulary and policy-expression efforts such as the Data Privacy Vocabulary (DPV) and ODRL are closer to the content layer than to the signaling layer.
PPD does not attempt to replace such work with a new general-purpose ontology or rights language.
Instead, PPD separates concerns: this architecture defines roles and
lifecycle; <xref target="I-D.draft-dsmullen-ppd-taxonomy"/> defines the core fields and
shared computable floor that can map to richer vocabularies; and
<xref target="I-D.draft-dsmullen-ppd-protocol"/> defines the participant-facing signaling
path by which an effective household policy is presented and acknowledged.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-scenarios">
      <name>Operational Scenarios</name>
      <t>This section describes representative operational cases for the architecture in home-network environments.
The scenarios focus on discovery, association, reassociation, and mixed-participant visibility rather than on user-interface details.</t>
      <section anchor="initial-discovery-and-association">
        <name>Initial Discovery and Association</name>
        <t>A PPD participant joins the home network and obtains one or more candidate PPD service endpoints through configuration or local network discovery.
In a common home deployment model, the PPD service endpoint is hosted by a residential gateway or equivalent home-network service.
Discovery identifies reachability, not authority.
The participant establishes a secure connection to a selected endpoint, confirms that endpoint through the applicable trust mechanism, retrieves the applicable effective policy instance, and acknowledges receipt of that policy instance.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
At the end of this process, the participant has established association if the current applicable effective policy has been delivered and acknowledged.
The PPD service endpoint also determines the initial freshness state of that association.</t>
      </section>
      <section anchor="policy-update-and-reassociation">
        <name>Policy Update and Reassociation</name>
        <t>The household policy, or the participant's effective policy, changes.
The PPD service endpoint immediately invalidates current association for the participant.
The participant enters a needs-reassociation state until it retrieves and acknowledges the updated effective policy instance.
This scenario illustrates that association state is tied to a specific policy instance and not to prior acknowledgments alone.
Reassociation re-establishes current association by confirming that the participant has seen the latest applicable policy instance.</t>
      </section>
      <section anchor="association-freshness-expiry-and-renewal">
        <name>Association Freshness Expiry and Renewal</name>
        <t>The applicable effective policy instance is unchanged, but the participant does
not renew within the bounded interval accepted by the PPD service endpoint.
The association becomes stale even though no policy change occurred.
The participant no longer has current association until it completes the
required renewal procedure.
This scenario distinguishes stale association from a needs-reassociation state
caused by a changed policy instance.</t>
      </section>
      <section anchor="participant-state-change">
        <name>Participant State Change</name>
        <t>A participant changes in a way that can affect the applicable effective policy instance, such as a declaration update, capability change, or other state change relevant to effective policy derivation.
The PPD service endpoint determines that current association can no longer be confirmed using existing state alone.
The participant then retrieves and acknowledges the newly applicable effective policy instance.
This scenario keeps the architecture focused on policy signaling and recordkeeping without assuming that every state change requires the same local handling or transport behavior.</t>
      </section>
      <section anchor="mixed-participant-network-visibility">
        <name>Mixed-Participant Network Visibility</name>
        <t>A home network contains both PPD participants and devices that do not participate in PPD.
The household can still use local management functions to distinguish associated participants, participants whose current association cannot be confirmed, and network-observed or unmanaged devices.
This scenario illustrates that non-participating devices are an expected operational reality.
Their presence can inform transparency and local management decisions, but it does not create association or change the baseline signaling role of PPD.</t>
      </section>
    </section>
    <section anchor="goals">
      <name>Goals</name>
      <section anchor="enhance-user-control">
        <name>Enhance User Control</name>
        <ul spacing="normal">
          <li>
            <t>Support a household's ability to define privacy preferences that can be made available consistently across participating devices and associated services.</t>
          </li>
          <li>
            <t>Ensure the household does not have to normalize or mentally reconcile each participant's local privacy vocabulary or interpretation strategy in order to express those preferences.</t>
          </li>
          <li>
            <t>Provide an architectural basis for recording whether the current applicable policy was made available to a participant.</t>
          </li>
          <li>
            <t>Create a reciprocal acknowledgment model in which the household can retain a record that a participant or associated service was presented with, and acknowledged, a specific household policy instance.</t>
          </li>
        </ul>
      </section>
      <section anchor="promote-interoperability">
        <name>Promote Interoperability</name>
        <ul spacing="normal">
          <li>
            <t>Establish a standardized mechanism for devices from diverse manufacturers to discover PPD service endpoints, retrieve applicable privacy policies, and acknowledge policy instances.</t>
          </li>
          <li>
            <t>Support consistent association and reassociation behavior across heterogeneous participants.</t>
          </li>
        </ul>
      </section>
      <section anchor="enable-flexibility">
        <name>Enable Flexibility</name>
        <ul spacing="normal">
          <li>
            <t>Allow deployments to place policy storage and effective-policy derivation locally or remotely without changing the baseline participant-facing contract.</t>
          </li>
          <li>
            <t>Leave room for deployment-specific protocol profiles where constrained environments or different operational models require them, including trusted-intermediary participation for devices that cannot satisfy the minimum authenticated direct-participant bar.</t>
          </li>
        </ul>
      </section>
      <section anchor="facilitate-transparency">
        <name>Facilitate Transparency</name>
        <ul spacing="normal">
          <li>
            <t>Provide a basis for local management functions to distinguish currently associated participants, stale or reassociation-needed participants, and non-participating devices.</t>
          </li>
          <li>
            <t>Improve visibility into which participants have been presented with the current applicable policy instance, without implying enforcement of device behavior.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This document defines a high-level architectural framework for Privacy Preference Declaration (PPD) in home-network environments.
It focuses on roles, trust boundaries, lifecycle meaning, and operational assumptions for making household privacy preferences available to devices and associated services.</t>
      <t>This document does not delve into specific implementation details, such as message formats, data structures, security algorithms, or user interface design.
Furthermore, this document does not define mechanisms that modify device behavior, legal and regulatory considerations, or specific security protocols.
Where this document discusses recordkeeping, that recordkeeping is limited to signaling and recording that an applicable household policy was made available to and acknowledged by a PPD participant.
That recordkeeping can provide a basis for later accountability, audit, or dispute analysis, but this document does not define enforcement behavior or prove subsequent compliance.
That boundary is intentional: the architectural problem addressed here is
interoperable preference signaling and recordkeeping across heterogeneous home
deployments, while enforcement depends on deployment-specific control points,
trust models, and participant capabilities that cannot be assumed uniformly at
the architectural layer.</t>
      <t>Specific message formats, transport details, and semantic field definitions
are defined in <xref target="I-D.draft-dsmullen-ppd-protocol"/> and
<xref target="I-D.draft-dsmullen-ppd-taxonomy"/>.</t>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>This document makes the following assumptions:</t>
        <ul spacing="normal">
          <li>
            <t>Resource Constraints: Participants and home-network components may be
constrained in processing power, memory, or bandwidth. The architecture
therefore favors lightweight participant-facing interaction. Where a device
cannot satisfy the minimum authenticated direct-participant bar, this
architecture expects indirect participation through a trusted intermediary
rather than weakening the meaning of direct participation.</t>
          </li>
          <li>
            <t>Single User Policy: Each participant is assumed to be governed by one
effective household policy at a time. Multi-user reconciliation may be
relevant in some deployments, but it is outside the baseline architecture.</t>
          </li>
          <li>
            <t>Endpoint Discovery and Trust: Configuration or local-network mechanisms can
identify candidate PPD service endpoints, but discovery alone does not
establish authority. The applicable protocol profile needs a separate way to
authenticate the selected endpoint and confirm that the policy it presents
is authoritative for the participant's household context.</t>
          </li>
        </ul>
      </section>
      <section anchor="association-state-and-freshness">
        <name>Association State and Freshness</name>
        <t>This architecture treats the PPD service endpoint as the source of truth for
participant association state.
A participant establishes association when it retrieves and acknowledges a
specific applicable effective policy instance.</t>
        <t>Current association exists only when both of the following are true:</t>
        <ul spacing="normal">
          <li>
            <t>the acknowledged policy instance still corresponds to the latest applicable
effective policy for that participant; and</t>
          </li>
          <li>
            <t>the association remains fresh according to the renewal model enforced by the
PPD service endpoint.</t>
          </li>
        </ul>
        <t>If the applicable effective policy instance is unchanged but the freshness
interval expires before renewal, the participant enters stale association.
If the applicable effective policy changes, if participant state relevant to
effective policy derivation changes, or if enough state is lost that the prior
association can no longer be trusted, the participant enters a
needs-reassociation state.
In either case, the participant no longer has current association.</t>
        <t>Participant-initiated exchanges provide the renewal or recovery path, but they
are not the source of truth for whether association is current.
The PPD service endpoint determines whether a participant is current, stale, or
in needs reassociation.</t>
      </section>
      <section anchor="discovery-and-policy-authority-boundary">
        <name>Discovery and Policy-Authority Boundary</name>
        <t>This architecture separates discovery of a participant-facing service endpoint
from trust establishment.
A participant may learn one or more candidate PPD service endpoints through
configuration or local network mechanisms, but discovery alone does not make
any candidate authoritative.
Before treating a policy instance as authoritative, the participant needs the
applicable protocol profile to authenticate the selected endpoint and confirm
that it is authorized to present policy for the household context.</t>
        <t>The participant-facing contract is the PPD service endpoint, not direct access
to the policy authority.
A deployment may place storage, policy combination, and effective policy
derivation behind that service.
When the PPD service endpoint and policy authority are distinct, the deployment
needs to preserve at least:</t>
        <ul spacing="normal">
          <li>
            <t>authenticity of the effective policy instance presented to the participant;</t>
          </li>
          <li>
            <t>integrity of policy-instance identifiers and association-freshness metadata;</t>
          </li>
          <li>
            <t>an unambiguous binding between the selected PPD service endpoint and the
policy authority on whose behalf it presents policy.</t>
          </li>
        </ul>
        <t>These are architectural invariants. Participant-facing transport, metadata
confirmation, and security-profile expectations are defined in
<xref target="I-D.draft-dsmullen-ppd-protocol"/>, while deployment profiles still choose
concrete mechanism details.</t>
      </section>
      <section anchor="key-components">
        <name>Key Components</name>
        <t>User Interface: A user-friendly interface (e.g., mobile app, web portal) for creating and managing privacy preferences.</t>
        <t>PPD Service Endpoint: A participant-facing service through which PPD participants discover, retrieve, and acknowledge applicable policy instances.
In a common home deployment model, this service is hosted by a residential gateway or equivalent home-network service.
A participant may learn candidate PPD service endpoints through configuration or local network discovery, but it treats a selected endpoint as authoritative only after the applicable trust mechanism succeeds.</t>
        <t>Policy Authority: The authoritative source of household policy state and any inputs used for effective policy derivation.
The policy authority may be local or remote.
A PPD service endpoint can obtain policy from a policy authority without exposing internal storage or computation topology to participants.
Participants are not required to discover or communicate with the policy authority directly in the baseline architecture.</t>
        <t>Effective Policy Derivation: The logical function, performed by or on behalf of the policy authority, that determines the applicable policy instance for a participant.</t>
        <t>Participant Declarations and Consent Requests: Optional participant inputs that can disclose data-handling declarations or request consent for uses not covered by baseline policy.
These inputs are distinct from the minimal path of policy retrieval and policy acknowledgment.
Where a deployment exposes a coarse comparison result for participant declarations at the protocol boundary, that result belongs on the declaration path rather than in the effective policy or policy acknowledgment objects. That comparison surface is diagnostic only; it is not a baseline negotiation channel, policy-relaxation mechanism, or homeowner-prompt path.</t>
        <t>Recordkeeping and Management Mechanisms: Deployment-specific mechanisms for presenting association state, participant status, effective policy views, and network-observed devices to the household.
Such mechanisms are not device-behavior requirements in the baseline PPD architecture.</t>
      </section>
      <section anchor="data-flows">
        <name>Data Flows</name>
        <t>This section outlines the high-level interactions between users, PPD
participants, the PPD service endpoint, and the policy authority.</t>
        <t>The process begins when a household defines privacy preferences. Those
preferences may express which types of data may be collected, under what
conditions data may be processed or shared, and which retention practices are
acceptable. User-interface design for authoring those preferences is out of
scope, as are the detailed semantic fields and qualifier families used in the
policy representation; those are defined in
<xref target="I-D.draft-dsmullen-ppd-taxonomy"/>.</t>
        <t>Once created, the preferences are maintained by a policy authority, which may
be local or remote and may include storage, effective-policy derivation, or
both. When a new participant joins the home network, it obtains one or more
candidate PPD service endpoints through configuration or local-network
mechanisms. Discovery identifies reachable candidates, but does not by itself
establish authority. The participant authenticates a selected endpoint
according to the applicable protocol profile, retrieves the applicable policy
instance, and acknowledges receipt of that instance. In some deployments, the
participant is a backend service associated with the device rather than the
local device itself.</t>
        <t>The participant-facing contract ends at the PPD service endpoint; any split
between that service and the policy authority is internal to the deployment.
Where those components are distinct, the deployment preserves the authenticity
and integrity of the effective policy instance, policy-instance identifier,
and freshness metadata presented through the service endpoint. Participants
may optionally report declarations at this stage. The service endpoint also
determines the freshness interval or renewal deadline for the resulting
association state.</t>
        <t>If a participant seeks to perform actions not permitted under the baseline
policy, it may initiate a consent request workflow. The design and behavior of
that workflow are out of scope here. Future specifications should ensure that
consent interactions are clear, proportionate, and resistant to manipulative
or fatiguing prompting.</t>
        <t>Current association is not indefinite.
If the participant does not renew before the freshness interval expires, the PPD service endpoint treats the association as stale even if the applicable effective policy instance is unchanged.
Reassociation is required when current association can no longer be confirmed.
This can occur because the applicable effective policy changed, participant
state relevant to effective policy derivation changed, the association became
stale, or enough state was lost that the prior association can no longer be
trusted. Reassociation re-establishes current association by retrieving and
acknowledging the latest applicable effective policy instance, or by
completing the applicable renewal procedure when the policy instance is
unchanged.</t>
        <t><xref target="I-D.draft-dsmullen-ppd-protocol"/> defines the participant-facing message
formats, baseline machine-readable encoding, and the way association freshness
is conveyed. This architecture remains limited to the signaling and
recordkeeping meaning of those interactions. It does not define how device
behavior is changed by policy, nor how deployments respond when a participant
cannot satisfy a given policy.</t>
      </section>
      <section anchor="non-ppd-and-network-observed-devices">
        <name>Non-PPD and Network-Observed Devices</name>
        <t>Home networks commonly include devices that do not implement PPD, cannot be updated to implement PPD, or are visible only through local network observation.
The architecture treats these devices as expected operational cases rather than exceptional failures.</t>
        <t>A local management function can classify such devices as network-observed or unmanaged based on information available within the home network.
That classification can improve household transparency by showing that a device is present even though it has not established association through PPD.
Network observation does not create association, does not imply that the device has received a household policy, and does not imply anything about the device's behavior.</t>
        <t>Any local response to unmanaged devices, such as notification, inventory display, or other network management action, is a deployment decision outside the baseline PPD signaling architecture.</t>
      </section>
    </section>
    <section anchor="policy-language">
      <name>Policy Language</name>
      <t>The specific details of the privacy policy language are out of scope for this
document. The policy vocabulary and taxonomy of privacy concepts and
attributes are defined in <xref target="I-D.draft-dsmullen-ppd-taxonomy"/>, including the
compact identifier model, the shared computable semantic floor, extension
namespaces, and the mapping expectations used by
<xref target="I-D.draft-dsmullen-ppd-protocol"/>.</t>
      <section anchor="language-requirements">
        <name>Language Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Human-readable: Policies should be easily understandable by users.</t>
          </li>
          <li>
            <t>Machine-readable: Policies should be machine-processable for automated interpretation and signaling.</t>
          </li>
          <li>
            <t>Extensible: The language should be flexible enough to accommodate evolving privacy needs and technologies.</t>
          </li>
          <li>
            <t>Internationalization-compatible: Policies and identifiers used within them may need to support multilingual environments and non-ASCII characters.</t>
          </li>
        </ul>
        <t>To ensure consistent interpretation and comparison of string-based policy elements, such as device names, labels, or category identifier string handling practices should align with the guidelines defined in <xref target="RFC7564"/>.
This is particularly important when identifiers or user-facing labels are created, stored, or matched across vendors or systems that operate in different locales or character encodings.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>This document defines the architectural layer for PPD.
<xref target="I-D.draft-dsmullen-ppd-protocol"/> and
<xref target="I-D.draft-dsmullen-ppd-taxonomy"/> define the participant-facing protocol
and shared semantic model. The remaining future work is therefore in adjacent
areas that this architecture intentionally leaves out of scope.</t>
      <section anchor="consent-request-workflows">
        <name>Consent Request Workflows</name>
        <t>The mechanism by which devices request additional user consent for data uses
not covered by the baseline policy is out of scope. Future specifications
should:</t>
        <ul spacing="normal">
          <li>
            <t>Define clear constraints to prevent manipulative or fatiguing consent flows (e.g., dark patterns).</t>
          </li>
          <li>
            <t>Describe consent interactions that are transparent, infrequent, proportionate, and user-respecting.</t>
          </li>
          <li>
            <t>Explore user interface standards or API affordances to preserve meaningful choice.</t>
          </li>
        </ul>
        <t>This is a sensitive area and needs to balance user experience, privacy
expectations, and implementation feasibility.</t>
      </section>
      <section anchor="recordkeeping-and-local-management">
        <name>Recordkeeping and Local Management</name>
        <t>This architecture does not define how devices act on privacy policies or how
departures from policy are detected or remediated.
Future work may include:</t>
        <ul spacing="normal">
          <li>
            <t>Optional participant status reporting models and device-side implementation expectations.</t>
          </li>
          <li>
            <t>Recordkeeping mechanisms for correlating policy delivery and acknowledgment records.</t>
          </li>
          <li>
            <t>State models that distinguish current, stale, and needs-reassociation participant status.</t>
          </li>
          <li>
            <t>Deconfliction strategies for devices unable to meet all user-defined constraints.</t>
          </li>
          <li>
            <t>Deployment-local management options, such as notifications or inventory display.</t>
          </li>
        </ul>
      </section>
      <section anchor="user-interface-design">
        <name>User Interface Design</name>
        <t>The user-facing interface used to author, modify, and review privacy preferences is out of scope.
Future design guidance may address:</t>
        <ul spacing="normal">
          <li>
            <t>User experience design principles for presenting privacy concepts clearly and accessibly.</t>
          </li>
          <li>
            <t>Models for progressive disclosure of policy impact.</t>
          </li>
          <li>
            <t>Multi-user and household-role-specific control models (e.g., parental vs. administrative roles).</t>
          </li>
        </ul>
      </section>
      <section anchor="interoperability-testing-and-reference-implementations">
        <name>Interoperability Testing and Reference Implementations</name>
        <t>Future work may also include:</t>
        <ul spacing="normal">
          <li>
            <t>Development of reference implementations of the PPD protocol, PPD service endpoint, and policy-authority components.</t>
          </li>
          <li>
            <t>Interoperability testing across devices and vendors.</t>
          </li>
          <li>
            <t>Conformance guidelines and self-certification procedures.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="internationalization-considerations">
      <name>Internationalization Considerations</name>
      <t>In contexts where privacy preferences or taxonomy elements involve user-facing or vendor-defined string identifiers, additional work may be required to:</t>
      <ul spacing="normal">
        <li>
          <t>Define string normalization and comparison rules, particularly for internationalized text.</t>
        </li>
        <li>
          <t>Support identifier consistency across diverse vendors and locales.</t>
        </li>
        <li>
          <t>Consider alignment with <xref target="RFC7564"/> for handling Unicode-aware identifiers in a secure and interoperable way.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For a privacy framework to be effective, it needs to support the expression of user preferences and protect those preferences during transmission, retrieval, and acknowledgment.
This section outlines safeguards for confidentiality, authenticity, integrity, and metadata minimization during PPD operations.</t>
      <section anchor="secure-policy-dissemination">
        <name>Secure Policy Dissemination</name>
        <t>Communication between PPD participants and the PPD service endpoint needs protection against unauthorized access and tampering.
When the PPD service endpoint and policy authority are distinct, deployments also need to preserve policy authenticity and integrity across that boundary.
Discovery mechanisms can identify candidate PPD service endpoints, but discovery alone is not sufficient to establish that an endpoint is authorized to present household policy.
<xref target="I-D.draft-dsmullen-ppd-protocol"/> defines explicit participant-facing
security profiles and the accountability properties they need to provide.
Future deployment profiles still need to identify concrete cryptographic
mechanisms, such as encryption and mutual authentication, so that legitimate
participants can retrieve privacy policies and detect modification.
Those deployment profiles also need to protect the binding between the authenticated participant-facing service endpoint and the policy state it presents.</t>
      </section>
      <section anchor="anonymity-and-metadata-protection">
        <name>Anonymity and Metadata Protection</name>
        <t>Even when privacy policies themselves do not contain sensitive personal information, the act of retrieving or acknowledging a policy can reveal characteristics about the household, such as the types of devices in use, specific user preferences, or behavioral patterns over time.
<xref target="RFC7258"/> cautions against protocol designs that expose unnecessary metadata, treating the accumulation of such information as a legitimate technical threat.
This framework takes that warning seriously: metadata exposure during policy retrieval and device onboarding needs to be minimized to avoid turning privacy infrastructure into a new source of privacy leakage.
Concepts from <xref target="RFC9577"/> may help inform this effort. <xref target="RFC9577"/> introduces techniques for authorization without identification, enabling a client to prove it is authorized without revealing who it is.
While <xref target="RFC9577"/> is optimized for pseudonymous web authentication over the public internet and assumes a centralized token issuer model, its core ideas, particularly around unlinkable token presentation, could be adapted to the PPD protocol to reduce metadata correlation and minimize household identifiability during policy exchanges.
However, this needs careful analysis, as the assumptions of <xref target="RFC9577"/> do not fully align with the goals or context of a local, user-governed home network.</t>
      </section>
      <section anchor="policy-integrity">
        <name>Policy Integrity</name>
        <t>Devices need assurance that the policy retrieved is authentic and unaltered.
Integrity protections, such as digital signatures, are necessary to ensure that users' preferences cannot be tampered with in transit or at rest by other devices, malicious actors, or misconfigurations.
If policy is obtained through a participant-facing service from a distinct policy authority, integrity protections also need to cover the policy-instance identifier and any freshness metadata presented through that service.</t>
      </section>
      <section anchor="device-authentication">
        <name>Device Authentication</name>
        <t>Devices participating in the privacy framework need an authentication model before accessing the PPD service endpoint.
This limits policy dissemination to known, authorized participants and helps users maintain trust in the integrity of their home network's privacy relationships.
If the PPD service endpoint and policy authority are distinct, the deployment also needs a way to preserve the authenticity of policy state presented through the participant-facing service.
By aligning with the concerns raised in <xref target="RFC7258"/> and incorporating ideas from <xref target="RFC9577"/> where appropriate, this framework seeks to protect users not only from overt data collection, but also from silent inference and passive metadata surveillance.
At the same time, it avoids treating anonymity as an end in itself.
The goal is to support privacy with recordkeeping, where user-defined preferences are signaled consistently, devices are identifiable only as much as necessary for the exchange, and the user retains visibility into what occurs within their domain.</t>
      </section>
      <section anchor="policy-acknowledgment-and-recordkeeping">
        <name>Policy Acknowledgment and Recordkeeping</name>
        <t>PPD participants need a way to acknowledge receipt of the applicable privacy policy instance.
This acknowledgment should be recorded and verifiable so that the household can determine which participants have seen the current policy.
The record needs to bind the participant identity, the acknowledged policy instance, and the time or sequence context in which the acknowledgment was made.
For devices that rely on a backend service, the record also needs to distinguish between acknowledgment by the local device and acknowledgment by the backend service acting on behalf of that device.
This record is important because it creates a reciprocal acknowledgment path.
In many current deployments, the household user is asked to acknowledge device or vendor policy terms, but there is no comparably strong household-controlled record that the participant was presented with the household's own privacy policy.
An authenticated and integrity-protected acknowledgment record allows the household to show that presentation and acknowledgment occurred, which can support later accountability or review even when the architecture does not define automated enforcement.
<xref target="I-D.draft-dsmullen-ppd-protocol"/> defines baseline acknowledgment
semantics and the protection properties acknowledgment mechanisms need to
provide. Future deployment profiles still need concrete mechanisms that remain
practical for constrained home-network devices.
At minimum, the selected mechanism needs to provide:</t>
        <ul spacing="normal">
          <li>
            <t>participant authentication sufficient to bind the acknowledgment to the device or backend service that made it;</t>
          </li>
          <li>
            <t>policy-instance integrity so that the acknowledged policy can be identified unambiguously;</t>
          </li>
          <li>
            <t>freshness or sequencing so that an old acknowledgment cannot be replayed as evidence of current association;</t>
          </li>
          <li>
            <t>verifiability sufficient for the acknowledgment record to function as a protected receipt of policy presentation and acknowledgment; and</t>
          </li>
          <li>
            <t>a way to retain or export the acknowledgment record without exposing more household metadata than necessary.</t>
          </li>
        </ul>
        <t>A policy acknowledgment is not, by itself, an assertion about subsequent device behavior.
Any local response to non-participation or other local observations is outside the baseline signaling mechanism defined by this architecture.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <?line 615?>

<reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC8280">
          <front>
            <title>Research into Human Rights Protocol Considerations</title>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
            <author fullname="C. Cath" initials="C." surname="Cath"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973). The other parts of this document explain the background of the guidelines and how they were developed.</t>
              <t>This document is the first milestone in a longer-term research effort. It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8280"/>
          <seriesInfo name="DOI" value="10.17487/RFC8280"/>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-taxonomy">
          <front>
            <title>Privacy Preference Declaration Taxonomy</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="22" month="May" year="2026"/>
            <abstract>
              <t>   This document defines the core vocabulary, comparison model, and
   extension discipline used by Privacy Preference Declarations (PPDs)
   to express atomic privacy-relevant dataflows in home networks.  It
   complements the companion PPD architecture and protocol work by
   standardizing the core fields used in participant declarations and
   household policy rules.  The core vocabulary is the mandatory shared
   semantic floor for baseline participant-facing interoperability.
   Richer ecosystem-specific vocabularies remain possible, but
   comparison-relevant non-core terms need explicit relationships to the
   shared core so they remain computable.  Baseline participant-facing
   protocol messages use compact identifiers plus taxonomy context
   rather than requiring full ontology exchange on the wire.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-taxonomy-05"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-protocol">
          <front>
            <title>Privacy Preference Declaration Protocol Specification</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="22" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies a participant-facing protocol for Privacy
   Preference Declarations (PPDs) in home networks.  The protocol is
   between a home-side PPD service endpoint and a device-side actor,
   formally the PPD participant, which is a device or a service acting
   on behalf of a device.  It defines baseline operations for endpoint
   metadata confirmation, participant registration, optional participant
   declaration, effective-policy retrieval, policy acknowledgment,
   renewal, and reassociation.  This document complements the PPD
   architecture and taxonomy documents by defining the message and
   sequencing behavior needed for interoperable policy signaling.  The
   household policy instances carried by this protocol express privacy
   preferences for signaling and comparison; they do not by themselves
   define an enforcement mechanism that guarantees participant behavior.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-protocol-03"/>
        </reference>
        <reference anchor="RFC7564">
          <front>
            <title>PRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application Protocols</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Application protocols using Unicode characters in protocol strings need to properly handle such strings in order to enforce internationalization rules for strings placed in various protocol slots (such as addresses and identifiers) and to perform valid comparison operations (e.g., for purposes of authentication or authorization). This document defines a framework enabling application protocols to perform the preparation, enforcement, and comparison of internationalized strings ("PRECIS") in a way that depends on the properties of Unicode characters and thus is agile with respect to versions of Unicode. As a result, this framework provides a more sustainable approach to the handling of internationalized strings than the previous framework, known as Stringprep (RFC 3454). This document obsoletes RFC 3454.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7564"/>
          <seriesInfo name="DOI" value="10.17487/RFC7564"/>
        </reference>
        <reference anchor="RFC9577">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document defines an HTTP authentication scheme for Privacy Pass, a privacy-preserving authentication mechanism used for authorization. The authentication scheme specified in this document can be used by Clients to redeem Privacy Pass tokens with an Origin. It can also be used by Origins to challenge Clients to present Privacy Pass tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9577"/>
          <seriesInfo name="DOI" value="10.17487/RFC9577"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
