<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lukianets-open-ethics-transparency-protocol-05" category="exp" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="OETP">Open Ethics Transparency Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-lukianets-open-ethics-transparency-protocol-05"/>
    <author initials="N." surname="Lukianets" fullname="Nikita Lukainets">
      <organization>Open Ethics Initiative</organization>
      <address>
        <email>n.lukianets@openethics.ai</email>
      </address>
    </author>
    <date year="2024" month="May" day="12"/>
    <area>General</area>
    <workgroup>dispatch</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 46?>

<t>The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT Products and their Components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Format is an extensible JSON-based format.</t>
    </abstract>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Open Ethics Transparency Protocol (OETP or Protocol) describes the creation and exchange of voluntary ethics Disclosures for IT products. It is brought as a solution to increase the transparency of how IT products are built and deployed. This document provides details on how disclosures for data collection and data processing practice are formed, stored, validated, and exchanged in a standardized and open format.</t>
      <t>OETP provides facilities for:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Informed consumer choices</strong> : End-users able to make informed choices based on their own ethical preferences and product disclosure.</t>
        </li>
        <li>
          <t><strong>Industrial-scale monitoring</strong> : Discovery of best and worst practices within market verticals, technology stacks, and product value offerings.</t>
        </li>
        <li>
          <t><strong>Legally-agnostic guidelines</strong> : Suggestions for developers and product-owners, formulated in factual language, which are legally-agnostic and could be easily transformed into product requirements and safeguards.</t>
        </li>
        <li>
          <t><strong>Iterative improvement</strong> : Digital products, specifically, the ones powered by artificial intelligence could receive nearly real-time feedback on how their performance and ethical posture could be improved to cover security, privacy, diversity, fairness, power balance, non-discrimination, and other requirements.</t>
        </li>
        <li>
          <t><strong>Labeling and certification</strong> : Mapping to existing and future regulatory initiatives and standards.</t>
        </li>
      </ul>
      <t>The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT products and their components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Format is an extensible JSON-based format.</t>
    </section>
    <section anchor="requirement-levels">
      <name>Requirement Levels</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Disclosure:</dt>
        <dd>
          <t>Disclosure (Ethics Disclosure, or self-disclosure) is application-specific information about the data collection, data processing, and decision-making practices of a Product, provided by the Product Vendor (an individual developer or an organization).</t>
        </dd>
        <dt>Disclosure Feed:</dt>
        <dd>
          <t>A historical sequence of Disclosures, made for a specific Product.</t>
        </dd>
        <dt>Disclosure Identity Provider:</dt>
        <dd>
          <t>The automated Disclosure processing is enabled by requests to both the Open Ethics Disclosure database powered by Disclosure Identity Providers (DIP) and the Product's OETP Disclosure file, stored in the product's website root following OETP specification. DIP serves as a service point to generate and retrieve generated disclosures.</t>
        </dd>
        <dt>Vendor:</dt>
        <dd>
          <t>A legal person (an individual developer or an organization) that owns one or several end-user Products, or acts as a Supplier and provides Components for other Vendors.</t>
        </dd>
        <dt>Integrator:</dt>
        <dd>
          <t>A legal person (an individual developer or an organization) that deploys technology-powered services to the end-users based on Product(s) from third-party Vendors.</t>
        </dd>
        <dt>Product:</dt>
        <dd>
          <t>An IT system in the form of software, software as a service system, application, software component, application programming interface, or a physically embodied automated decision-making agent.</t>
        </dd>
        <dt>Component:</dt>
        <dd>
          <t>An IT system supplied by Vendor and integrated/embedded into end-user Products. Components themselves do not necessarily interface with end-users.</t>
        </dd>
        <dt>Upstream Component:</dt>
        <dd>
          <t>A Component that sends its outputs to the Product Downstream in the data processing chain. Disclosure for the Upstream Component is represented as a Child relative to the Disclosure node of the Downstream Product.</t>
        </dd>
        <dt>Downstream Component:</dt>
        <dd>
          <t>A Component that receives inputs from the Components Upstream in the data processing chain. Disclosure for the Downstream Component is represented as a Parent relative to the Disclosure node of the Upstream Component.</t>
        </dd>
        <dt>Automated Decision-Making (ADM):</dt>
        <dd>
          <t>Automated decision-making is the process of making a decision by automated means without any human involvement. These decisions can be based on factual data, as well as on digitally created profiles or inferred data.</t>
        </dd>
        <dt>OETP Disclosure Format:</dt>
        <dd>
          <t>A machine-readable Disclosure with predefined structure, supplied in the JSON format.</t>
        </dd>
        <dt>Validation:</dt>
        <dd>
          <t>A sequence of automated software-based checks to control validity and security elements in the OETP Disclosure.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>A third-party legal person trusted to perform Verification checks and to issue Verification Proofs.</t>
        </dd>
        <dt>Auditing software:</dt>
        <dd>
          <t>An automated software-based tool authorized to perform Verification checks and to issue Verification Proofs.</t>
        </dd>
        <dt>Verification:</dt>
        <dd>
          <t>A procedure to control the correspondence of the elements in the OETP Disclosure and the actual data processing and data collection practices of the Vendors.</t>
        </dd>
        <dt>Verification Proof:</dt>
        <dd>
          <t>A result of the formal Disclosure Verification procedure presented to a requestor.</t>
        </dd>
        <dt>Chaining:</dt>
        <dd>
          <t>A process of combining Disclosures of individual Components into a composite high-level Disclosure for a Product.</t>
        </dd>
        <dt>Label:</dt>
        <dd>
          <t>User-facing graphical illustrations and textual descriptions of the Product that facilitate understanding of the values and risks the Product carries.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocol-model">
      <name>Protocol Model</name>
      <t>The Disclosure creation and delivery consist of the two parts, starting from (I) the submission of the Disclosure form, chaining of the Suppliers' Disclosures, Signature of the disclosed information, and the delivery part (II) that first checks that the Disclosure is Valid, and then that the information specified in it is Verified by the third-parties. <xref target="_figure-disclosure-creation"/> shows disclosure creation steps.</t>
      <!-- <img src="../diagrams/images/disclosure-creation/disclosure-creation.svg" alt="Creation of the Disclosure"> -->

<section anchor="creation-of-disclosure">
        <name>Creation of Disclosure</name>
        <t>The initial Disclosure is created by filling out a standardized disclosure form (for example, see 1. <eref target="https://openethics.ai/label/">https://openethics.ai/label/</eref>). A Vendor representative, a Product Owner, or a Developer, <bcp14>MUST</bcp14> submit data-processing and data-collection information about the Product. The information about the end-point URL, as well as a contact email address, <bcp14>MUST</bcp14> be specified. Disclosure <bcp14>MAY</bcp14> also be created in a fully automated way as a part of the CI/CD DevOps pipeline. <xref target="_figure-disclosure-submission-basic"/> shows basic disclosure submission process.</t>
        <!-- <img src="../diagrams/images/disclosure-submission-basic/disclosure-submission-basic.svg" alt="Basic Disclosure Submission"> -->

<section anchor="cryptographic-signature">
          <name>Cryptographic Signature</name>
          <t>The Disclosure is organized into a predefined data schema and <bcp14>MUST</bcp14> be cryptographically signed by the Signature Generator (Open Ethics or federated providers) using standard SHA3-512 hash implementation. The integrity hash <bcp14>MUST</bcp14> be appended to a disclosure as the <tt>OETP.schema.integrity</tt> element.</t>
        </section>
        <section anchor="immutable-storage">
          <name>Immutable Storage</name>
          <t>Both the signature integrity hash and the Disclosure <bcp14>SHOULD</bcp14> be stored in the log-centric root database and <bcp14>MAY</bcp14> be mirrored by other distributed databases for redundancy and safety.</t>
        </section>
        <section anchor="visual-labeling">
          <name>Visual Labeling</name>
          <t>Open Ethics Label <bcp14>SHOULD</bcp14> be automatically generated by mirroring the submitted Disclosure into a set of graphical icons and simple human-readable descriptions. Additional Labels <bcp14>MAY</bcp14> be generated following successful third-party Verification and by mapping the regulatory requirements to Verified Disclosures.</t>
        </section>
      </section>
      <section anchor="access-to-disclosure">
        <name>Access to Disclosure</name>
        <section anchor="initial-request-to-a-disclosure-file">
          <name>Initial Request to a Disclosure file</name>
          <t>The most recent OETP file <bcp14>SHOULD</bcp14> be stored in the root of the Product's specified end-point URL, allowing requests to the OETP file from third-party domains. When establishing a Vendor relationship, the Integrator or a downstream Vendor <bcp14>MAY</bcp14> examine the Disclosure for their Components using the following HTTP request: <tt>GET https://testexample.com/oetp.json</tt>, where <em>testexample.com</em> is the URL of the Supplier's end-point.</t>
        </section>
        <section anchor="access-to-visual-trust-labels">
          <name>Access to Visual Trust Labels</name>
          <t>A Vendor <bcp14>SHOULD</bcp14> place a visual Label generated as a result of the Disclosure process in the Product informational materials (for example Marketing Materials, User Guides, Safety Instructions, Privacy Policy, Terms of Service, etc). The Label reflects the content of the Disclosure and <bcp14>SHOULD</bcp14> be displayed in any digital media by embedding a software widget. Visual labels in the print media <bcp14>SHOULD</bcp14> carry a visually distinguishable Integrity signature to enable manual Validation by the User.</t>
        </section>
        <section anchor="requirements-for-placement-of-integrity-signature-in-visual-label">
          <name>Requirements for placement of Integrity Signature in Visual Label</name>
          <ul spacing="normal">
            <li>
              <t><strong>Labels in the online digital media</strong> <bcp14>MUST</bcp14> be generated automatically based on the content of the Disclosure and <bcp14>MUST</bcp14> contain a URL allowing to check the complete Integrity hash and explore more detailed information about the Disclosure.</t>
            </li>
            <li>
              <t><strong>Labels in the offline media</strong> <bcp14>MUST</bcp14> be generated automatically based on the content of the Disclosure and should carry the first 10 digits of the corresponding Integrity hash.</t>
            </li>
          </ul>
        </section>
        <section anchor="conformity-assessment-marks">
          <name>Conformity assessment marks</name>
          <t>Based on the Verification performed for the OETP Disclosure file, the labels <bcp14>MAY</bcp14> include Conformity assessment marks, Certification marks, as well as marks showing adherence to certain standards. These marks <bcp14>MAY</bcp14> be generated and displayed automatically based on the Verification Proofs.</t>
        </section>
        <section anchor="accessibility-considerations">
          <name>Accessibility considerations</name>
          <t>Accessibility of the Labels for the visually impaired Users <bcp14>SHOULD</bcp14> be considered. The OETP Processing system <bcp14>MUST</bcp14> provide alternative forms of the Label so that text-to-speech tools could be used to narrate the Label without the lost of meaning.</t>
          <t>1) A Label <bcp14>MUST</bcp14> contain a title. Title could be either marked by the <tt>aria-label</tt> attribute for the narration software or be labeled by another content tag(s) present via <tt>aria-labelledby</tt> attribute, pointing to the ID(s) describing the label content.</t>
          <figure anchor="_figure-example-oel-snippet">
            <name>Example Label Snippet Content</name>
            <sourcecode type="HTML"><![CDATA[
<!-- Open Ethics Label snippet: visible content -->
<a href="https://openethics.ai/label" target="_blank">
    <div id="label" aria-label="Open Ethics Label">
        <img src="/src/images/Open Ethics logo.svg" class="oesign svg" height="30" alt="Open Ethics Logo" role="img" aria-hidden="true">
        <!-- Dynamic Content of the Open Ethics Label goes here -->
    </div>
</a>
]]></sourcecode>
          </figure>
          <t>2) Every icon that is present in the visual Label <bcp14>MUST</bcp14> contain a title, describing the property illustrated by the icon. A more extended description <bcp14>MAY</bcp14> be provided when necessary. The following patterns are suggested:</t>
          <ul spacing="normal">
            <li>
              <t>Pattern for images embedded using SVG tags: <tt>&lt;img&gt; + role="img" + alt="[title text here]"</tt> OR <tt>&lt;img&gt; + role="img" + aria-label="[title text here]"</tt></t>
            </li>
            <li>
              <t>Pattern for images embedded using IMG tags: <tt>&lt;svg&gt; + role="img" + &lt;title&gt; + &lt;desc&gt; + aria-labelledby="[ID]"</tt></t>
            </li>
          </ul>
          <figure anchor="_figure-example-oel-icon-label-source-open">
            <name>Example of the SVG icon with ARIA attributes for Accessibility</name>
            <sourcecode type="XML"><![CDATA[
<svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-labelledby="iconOpenSourceCodeTitle iconOpenSourceCodeDescription">
<title id="iconOpenSourceCodeTitle">Algorithms and code libraries: Open Source Code</title>
<desc id="iconOpenSourceCodeDescription">This product/component has disclosed that it mainly uses the Open Source Code as a part of its codebase.</desc>
<circle cx="8" cy="8" r="7" fill="#FFFFFF" class="branding-accent" />
<path d="M10.56 4.83221C9.70667 4.08053 8.64 3.75839 7.46667 3.97315C5.44 4.18792 3.84 6.01342 3.84 8.16107V8.26845C3.84 8.37584 3.84 8.48322 3.84 8.5906C3.94666 9.98658 4.8 11.1678 6.08 11.9195C6.4 11.1678 6.61333 10.5235 6.82667 9.87919C6.18667 9.44966 5.86667 8.80537 5.86667 8.05369C5.86667 7.51678 6.08 7.08725 6.4 6.7651C7.14667 6.01342 8.21333 5.79866 9.06667 6.33557C9.81333 6.7651 10.1333 7.51678 10.1333 8.37584C10.0267 9.02013 9.70667 9.55704 9.17333 9.87919C9.38667 10.5235 9.70667 11.1678 9.92 11.9195C10.4533 11.5973 10.9867 11.1678 11.4133 10.6309C12.0533 9.77181 12.2667 8.69798 12.16 7.62416C12.0533 6.55033 11.52 5.47651 10.56 4.83221Z" fill="#333333" class="branding-main" />
<path d="M8 0C3.62667 0 0 3.54362 0 7.94631C0 12.349 3.62667 16 8 16C12.3733 16 16 12.4564 16 7.94631C16 3.43624 12.3733 0 8 0ZM9.92 12.8859C9.81333 12.8859 9.70667 12.9933 9.49333 12.8859C9.38667 12.8859 9.28 12.7785 9.17333 12.5638L8.10667 9.77181C8.10667 9.55705 8.21333 9.34228 8.42667 9.2349C8.85333 9.02013 9.06667 8.80537 9.17333 8.37584C9.17333 8.05369 9.17333 7.73154 8.96 7.51678C8.74667 7.19463 8.42667 6.97987 8.10667 6.97987C7.46667 6.97987 6.93333 7.30201 6.93333 7.94631C6.82667 8.48322 7.04 8.91275 7.57333 9.2349C7.89333 9.34228 8 9.55705 7.89333 9.87919L6.82667 12.6711C6.72 12.8859 6.61333 12.8859 6.61333 12.9933C6.61333 12.9933 6.50667 12.9933 6.4 12.9933C6.29333 12.9933 6.29333 12.9933 6.18667 12.9933C5.01333 12.5638 4.05333 11.7047 3.52 10.5235C2.98667 9.55705 2.88 8.80537 2.88 8.37584V8.26846C2.88 5.58389 4.8 3.43624 7.36 3.11409C10.1333 2.68456 12.5867 4.61745 13.12 7.30201C13.5467 9.66443 12.2667 12.0268 9.92 12.8859Z" fill="#333333" class="branding-main" />
</svg>
]]></sourcecode>
          </figure>
        </section>
      </section>
      <section anchor="verification-and-validation-of-disclosure">
        <name>Verification and Validation of Disclosure</name>
        <section anchor="automated-disclosure-processing">
          <name>Automated Disclosure processing</name>
          <t>The automated Disclosure processing is enabled by requests to both the Open Ethics Disclosure database powered by Disclosure Identity Providers and the Product's OETP Disclosure file.</t>
          <t>To allow efficient decentralization and access to the disclosures of autonomous systems, such as AI systems powered by trained machine learning models, the vendor (or a developer) <bcp14>MUST</bcp14> send requests to a Disclosure Identity Provider. Disclosures <bcp14>MAY</bcp14> be resolved using URIs. To satisfy the mentioned requirements for disclosure RI, it is proposed in <xref target="OETP-RI"/> to use the following formats:</t>
          <ul spacing="normal">
            <li>
              <t><tt>oetp://&lt;hash&gt;</tt> - Here integrity <tt>&lt;hash&gt;</tt> is the SHA3-512 generated during the disclosure process.</t>
            </li>
            <li>
              <t><tt>oetp://&lt;component&gt;@&lt;alias&gt;[:&lt;disclosure&gt;]</tt> - Here <tt>&lt;component&gt;</tt> is the ID assigned via Disclosure Identity Provider under its <tt>&lt;alias&gt;</tt> during the first disclosure.</t>
            </li>
            <li>
              <t><tt>oetp://&lt;domain&gt;[:&lt;disclosure&gt;]</tt> - For verified domains (Domain Validation), disclosure could be accessed using product's <tt>&lt;domain&gt;</tt> instead of <tt>&lt;component&gt;@&lt;alias&gt;</tt>.)</t>
            </li>
          </ul>
        </section>
        <section anchor="validation-of-vendor39s-disclosures">
          <name>Validation of Vendor's Disclosures</name>
          <t>The OETP Processing system <bcp14>MUST</bcp14> compare integrity hashes in the Open Ethics Disclosure database and entries that arrive as a result of the Disclosure Request response.</t>
        </section>
        <section anchor="verification-of-vendor39s-disclosures">
          <name>Verification of Vendor's Disclosures</name>
          <t>Every disclosure <bcp14>SHOULD</bcp14> be checked for the existence of the external Verification from Auditors for the entire Disclosures or one of the Disclosure elements.</t>
        </section>
        <section anchor="progressive-verification">
          <name>Progressive Verification</name>
          <t>To raise a level of trust in a Disclosure, a Vendor <bcp14>MAY</bcp14> decide to opt-in for a third-party Disclosure Verification. OETP suggests a Progressive Verification scheme where multiple independent external Verification Proofs COULD be issued by third parties to confirm the information specified in the Disclosure.</t>
          <t>The Progressive Verification applies to a whole Disclosure, or to specific elements of the Disclosure.</t>
          <t><xref target="_figure-disclosure-progressive-verification"/> displays a general scheme for Disclosure requests and responses.</t>
          <!-- <img src="../diagrams/images/disclosure-progressive-verification/disclosure-progressive-verification.svg" style="float: left; margin-right: 10px;" alt="Progressive Verification Scheme for Disclosures" /> -->

<t>The following elements <bcp14>MAY</bcp14> serve as sources for various kinds of Verification proofs:
* Qualified Auditor reports
* Qualified Vendor of Auditing software tests
* Certification Authority assessments
* Conformity assessments
* User Feedback
* Market Brokers
* Real-time Loggers</t>
        </section>
      </section>
      <section anchor="end-to-end-transparency-and-formation-of-the-composite-disclosure">
        <name>End-to-end transparency and formation of the composite Disclosure</name>
        <t>The IT industry is getting more mature with Vendors becoming more specialized. Surface-level transparency is not sufficient as supply chains are becoming more complex and distributed across various Components. The following steps <bcp14>MUST</bcp14> be satisfied for the end-to-end transparency:</t>
        <section anchor="open-supplier-policy">
          <name>Open Supplier Policy</name>
          <t>Every Integrator or a Vendor <bcp14>SHOULD</bcp14> disclose the information about their Suppliers (sub-processing Vendors), indicating the scope of the data processing in the Components they provide.</t>
          <t>If the Supplier information is not provided, Disclosure <bcp14>SHOULD</bcp14> contain information that a Vendor (Integrator) has not provided Supplier information.</t>
          <section anchor="first-party-components">
            <name>First-party Components</name>
            <t>For greater transparency, Vendors may decide to reveal Components even if they originate from themselves (first-party Components). For the first-party Component, the Supplier identity information <bcp14>SHOULD NOT</bcp14> be provided because it was already disclosed earlier.</t>
            <t>Required: (<xref target="component-information"/>) only</t>
          </section>
          <section anchor="third-party-components">
            <name>Third-party Components</name>
            <t>When disclosing Components originating from the third-party Vendors <bcp14>SHOULD</bcp14> provide both the Supplier identity information and Component information</t>
            <t>Required: (<xref target="supplier-identity"/>, <xref target="component-information"/>)</t>
          </section>
          <section anchor="elements-of-supplier-disclosure">
            <name>Elements of Supplier disclosure</name>
            <section anchor="supplier-identity">
              <name>Supplier identity</name>
              <ul spacing="normal">
                <li>
                  <t>Vendor Name</t>
                </li>
                <li>
                  <t>Vendor URL</t>
                </li>
                <li>
                  <t>Vendor ID</t>
                </li>
                <li>
                  <t>Vendor DPO Contact Email</t>
                </li>
              </ul>
            </section>
            <section anchor="component-information">
              <name>Component information</name>
              <ul spacing="normal">
                <li>
                  <t>Component Scope of use</t>
                </li>
                <li>
                  <t>Personal Data Being Processed by Component</t>
                </li>
                <li>
                  <t>Is a Safety Component (YES)/(NO)</t>
                </li>
                <li>
                  <t>Component URL (if different from the Vendor URL)</t>
                </li>
                <li>
                  <t>Component Disclosure URL (if different from the default <tt>Component URL/oetp.json</tt>)</t>
                </li>
                <li>
                  <t>Component DPO Contact (if different from Vendor DPO Contact Email)</t>
                </li>
              </ul>
            </section>
          </section>
        </section>
        <section anchor="request-for-supplier39s-disclosures">
          <name>Request for Supplier's Disclosures</name>
          <t>The OETP Processing system <bcp14>MUST</bcp14> send GET requests to the URLs of each Component to obtain their Disclosures. Based on the response to each Disclosure request, the OETP Processing system <bcp14>MUST</bcp14> specify which Components have Disclosures and which don't have Disclosures.</t>
          <t><xref target="_figure-disclosure-chaining-request"/> shows the process of how Disclosure Chaining requests and responses happen.</t>
          <!-- <img src="../diagrams/images/disclosure-chaining-request/disclosure-chaining-request.svg" alt="Disclosure Chaining: Request-Response"> -->

</section>
        <section anchor="disclosure-chaining">
          <name>Disclosure Chaining</name>
          <t>The same Request-response operation applies recursively for Components of the Components, for the Components of the Components of the Components, etc. It is proposed to view the supply chain as a tree-like hierarchical data structure, where the information about Components is assembled using Level Order Tree Traversal algorithm.</t>
          <t>In this tree:
* Node is a structure that contains the Component's Disclosure;
* Root is the top Node representing a Product's Disclosure information;
* Edge is the connection between one Node and another, representing the scope of the Data Processing by the Component.</t>
          <t><xref target="_figure-disclosure-chaining-tree"/> displays the order of the Disclosure Chaining with Level Order Tree Traversal algorithm.</t>
          <!-- <img src="../diagrams/images/disclosure-chaining-tree/disclosure-chaining-tree.svg" alt="Disclosure Chaining: Level Order Traversal"> -->

</section>
        <section anchor="generation-of-the-composite-disclosure">
          <name>Generation of the Composite Disclosure</name>
          <t>The current consensus from the user &amp; developer community suggests that Composite Disclosure should follow The "Weakest Link" model. According to this model, the risk that the Product is carrying should not be considered any less than the risk for each of the Components. A similar approach in dealing with software licenses has been successful by allowing to generate Software Bills of Materials (SBOMs) by providing package information in the <xref target="SPDX"/> files.</t>
          <t>Formally this approach could be illustrated with the use of a conjunction table for risk modeling (see <xref target="conjunction-table-risk-modeling"/>). The Truth Table for Logical AND operator below takes one risk factor and evaluates risk outcomes as High (H) or Low (L) for hypothetical Disclosure options of the Product(P) and its Component(C).</t>
          <table anchor="conjunction-table-risk-modeling">
            <name>Conjunction Table for Risk Modeling</name>
            <thead>
              <tr>
                <th align="center">Disclosed risk of P</th>
                <th align="center">Disclosed risk of  C</th>
                <th align="center">Composite P &amp; C</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">L</td>
                <td align="center">L</td>
                <td align="center">
                  <strong>L</strong></td>
              </tr>
              <tr>
                <td align="center">L</td>
                <td align="center">H</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
              <tr>
                <td align="center">H</td>
                <td align="center">L</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
              <tr>
                <td align="center">H</td>
                <td align="center">H</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
            </tbody>
          </table>
          <t>Further evaluation of this approach is required.</t>
        </section>
      </section>
    </section>
    <section anchor="example-oetp-disclosure-file">
      <name>Example OETP Disclosure File</name>
      <figure anchor="_figure-example-oetp-json">
        <name>Example OETP Disclosure File</name>
        <sourcecode type="JSON"><![CDATA[
{
    "schema": {
        "name": "Open Ethics Transparency Protocol",
        "version": "0.9.3 RFC",
        "integrity": "156d624b8f2dbea87128a2147f255842652475c5dc595c79f64c90c7ff486d59007c3e18c993e3163395812e26b70ea70dfc413f7ca128869d115f12e5699bf2"
    },
    "snapshot": {
        "product": {
            "url": "testexample.com",
            "description": ""
        },
        "timestamp": 1608273946,
        "generator": {
            "name": "Open Ethics",
            "alias": "oe",
            "type": "root",
            "website": "https://openethics.ai"
        },
        "label": {
            "data": {
                "type": "open",
                "practice": ""
            },
            "source": {
                "type": "open",
                "practice": ""
            },
            "decision": {
                "type": "restricted",
                "practice": ""
            }
        }
    }
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="response-content">
        <name>Response content</name>
        <t>OETP exchanges data using JSON <xref target="RFC8259"/> which is a lightweight data-interchange format. A JSON-based application can be attacked in multiple ways such as sending data in an improper format or embedding attack vectors in the data. It is important for any application using JSON format to validate the inputs before being processed. To mitigate this attack type, the JSON Key Profile is provided for OETP responses.</t>
      </section>
      <section anchor="spoofing">
        <name>Spoofing</name>
        <t>OETP Processors should be aware of the potential for spoofing attacks where the attacker publishes an OETP disclosure with the <tt>OETP.snapshot</tt> value from another product, or, perhaps with an outdated <tt>OETP.snapshot.label</tt> element. For example, an OETP Processor could suppress the display of falsified entries by comparing the snapshot integrity from the submission database and a calculated hash for the <tt>OETP.snapshot</tt> object. In that situation, the OETP Processor might also take steps to determine whether the disclosures originated from the same publisher require further investigation of the Disclosure Feed and alert the downstream OETP Processors.</t>
      </section>
      <section anchor="falsification">
        <name>Falsification</name>
        <t>Dishonest or falsified Disclosures is a problem that is hard to address generally. The approach to it is public control and systematic checks. Vendors or user-facing applications and services could further raise the level of trust in their Disclosures by implementing programmatic control scoring mechanisms, as well as the external verification by trusted Auditors.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Disclosures <bcp14>MAY</bcp14> be resolved using their URIs. To allow this requirement, the <tt>oetp://</tt> URI scheme should be registered with IANA.</t>
    </section>
    <section anchor="areas-for-future-study">
      <name>Areas for Future Study</name>
      <t>The following topics not addressed in this version of the document are possible areas for the future study:</t>
      <ul spacing="normal">
        <li>
          <t>Extensibility of the OETP Disclosure Format.</t>
        </li>
        <li>
          <t>Evaluate other methods of Generation of the Composite Disclosure based on the Disclosure Tree</t>
        </li>
        <li>
          <t>Disclosure Chaining mechanisms and various use-cases.</t>
        </li>
        <li>
          <t>Typical scenarios and templates for Disclosure submissions.</t>
        </li>
        <li>
          <t>Mapping of the regulatory requirements and future Disclosure elements.</t>
        </li>
        <li>
          <t>Standardizing Privacy Disclosure and PII data-collection practices.</t>
        </li>
        <li>
          <t>Enhancing Label accessibility with ARIA W3C Recommendation and other approaches.</t>
        </li>
        <li>
          <t>Use of the OETP Disclosure in the ADM explainability (XAI).</t>
        </li>
        <li>
          <t>Disclosure formats for families of "Generative AI" technologies such as Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), Conditional Variational Autoencoders (CVAEs), Attention Mechanisms, Transformer-based Models.</t>
        </li>
        <li>
          <t>Use of the <tt>.well-known</tt> <xref target="RFC8615"/> location to store the transparency Disclosure</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SPDX" target="https://spdx.dev/">
          <front>
            <title>SPDX Specification – Version 2.2</title>
            <author>
              <organization>The Linux Foundation</organization>
            </author>
            <date year="2020"/>
          </front>
          <format type="PDF" target="https://spdx.dev/wp-content/uploads/sites/41/2020/08/SPDX-specification-2-2.pdf"/>
          <format type="HTML" target="https://spdx.github.io/spdx-spec/"/>
        </reference>
        <reference anchor="OETP-RI" target="https://github.com/OpenEthicsAI/OETP-RI-scheme">
          <front>
            <title>Resource Identifier Scheme for OETP</title>
            <author>
              <organization>Open Ethics Initiative</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
      </references>
    </references>
    <?line 410?>

<section anchor="appendix">
      <name>Appendix</name>
      <section anchor="figures">
        <name>Figures</name>
        <t>Diagrams could be built from code using the below <tt>*.puml</tt> files automatically using <eref target="https://plantuml.com/">PlantUML</eref>.</t>
        <section anchor="creation-of-disclosure-1">
          <name>Creation of Disclosure</name>
          <figure anchor="_figure-disclosure-creation">
            <name>Creation of the Disclosure</name>
            <sourcecode type="PUML"><![CDATA[
@startuml

title Disclosure Creation Process

skinparam roundCorner 15

actor "Supplier A" as SA
actor "Supplier B" as SB
actor Vendor as V

component "Component A" as CA
component "Component B" as CB
file "Disclosure A" as DA
file "Disclosure B" as DB
file "Composite Disclosure" as D

V-right->(Creation):disclose
SA-up->CA
SB-up->CB
CA-up->DA
CB-up->DB
DA-up->(Chaining)
DB-up->(Chaining)
(Creation)->(Chaining)
(Chaining)->(Validation)
(Validation)->(Verification)
(Verification)->D
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="basic-disclosure-submission">
          <name>Basic Disclosure Submission</name>
          <figure anchor="_figure-disclosure-submission-basic">
            <name>Basic Disclosure Submission</name>
            <sourcecode type="PUML"><![CDATA[
@startuml
title Basic Disclosure Submission

skinparam roundCorner 15
autonumber

actor Vendor
database "Disclosure Identity Provider" as ID
control "Signature Generator" as SIG
database "Federated Identity Provider" as DIS

Vendor -> ID: Request with Disclosure payload
ID -> ID: Validate input
ID -> SIG: Structured Data, Initialized

ID <-- SIG: SHA3-512 integrity hash
    group Distributed Identity Storage
DIS <-- SIG: SHA3-512 integrity hash
end
ID -> ID: Log OETP file and a corresponding intgrity hash
Vendor <-- ID: OETP Disclosure File
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="progressive-verification-scheme-for-disclosures">
          <name>Progressive Verification Scheme for Disclosures</name>
          <figure anchor="_figure-disclosure-progressive-verification">
            <name>Progressive Verification Scheme for Disclosures</name>
            <sourcecode type="PUML"><![CDATA[
@startuml

title Progressive Verification with multiple Auditors

skinparam roundCorner 15
autonumber
actor User
User -> Vendor: Disclosure Request
User <-- Vendor: OETP Disclosure File

database "Disclosure Identity Provider" as ID

User -> ID: Disclosure Validation and Verification Request

group Progressive Disclosure Verification
    ID -> ID: Retrieve and Compare Disclosure Integrity
    ID -> "Auditor 1": Disclosure Verification Request
    ID <-- "Auditor 1": Verification Proof 1
    ID -> "Auditor N": Disclosure Verification Request
    ID <-- "Auditor N": Verification Proof N
end

User <-- ID: Verification response

User -> Vendor: Service Request
User <-- Vendor: Service Response
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="disclosure-chaining-request-response">
          <name>Disclosure Chaining: Request-Response</name>
          <figure anchor="_figure-disclosure-chaining-request">
            <name>Disclosure Chaining: Request-Response</name>
            <sourcecode type="PUML"><![CDATA[
@startuml
title Disclosure Chaining: Request-Response


start
repeat
  :Request Component's Disclosure;
    if (Disclosure Obtained?) then (yes)
      :Validate Disclosure;
      :Verify Disclosure;
      :Chain Disclosure;
      :Obtain list of Child Components;
      if (Supplier information exists?) then (yes)
        :Update Tree with (yet)
        Unchained Disclosures;
      else (no)
        #Gold:**Alert** "Vendor has not provided
        Supplier information";
      endif
    else (no)
      #pink:**Alert** "Vendor has not provided
      any Disclosure";
      stop
    endif
repeat while (Unchained Disclosures in the Disclosure Tree?) is (yes) not (no)
:**Generate**
Composite Disclosure;
#palegreen:**Display** Label for "Composite Disclosure";
stop

@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="disclosure-chaining-level-order-traversal">
          <name>Disclosure Chaining: Level Order Traversal</name>
          <figure anchor="_figure-disclosure-chaining-tree">
            <name>Disclosure Chaining: Level Order Traversal</name>
            <sourcecode type="PUML"><![CDATA[
@startmindmap
title Disclosure Chaining: Level Order Traversal

skinparam roundCorner 15
* Root (Product)
        * 1 (Component)
                * 3 (Component)
                        * 7 (Component)
                * 4 (Component)
        * 2 (Component)
                * 5 (Component)
                        * 8 (Component)
                        * 9 (Component)
                * 6 (Component)
@endmindmap
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Part of this work related to Verification and Validation of Disclosure and Disclosure Chaining was supported by the H2020 Programme of the European Commission under Article 15 of Grant Agreement No. 951972 StandICT.eu 2023</t>
      <t>The Open Ethics community and expert volunteers contributed with their valuable feedback, discussions, and comments. Thank you Ashley Duque Kienzle, Angela Kim, Ioannis Zempekakis, Karl Müdespacher, Ida Varošanec, Claudia Del Pozo, Joerg Buss, Mariia Kriuchok, Minhaaj Rehman, Oleksii Molchanovskyi, Roberta Barone, Phil Volkofsky and others.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
