<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dsmullen-ppd-taxonomy-04" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PPDTaxonomy">Privacy Preference Declaration Taxonomy</title>
    <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-taxonomy-04"/>
    <author fullname="Daniel Smullen">
      <organization>CableLabs</organization>
      <address>
        <email>d.smullen@cablelabs.com</email>
      </address>
    </author>
    <author fullname="Brian Scriber">
      <organization>CableLabs</organization>
      <address>
        <email>brian.scriber@computer.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="20"/>
    <keyword>privacy preferences</keyword>
    <keyword>home networks</keyword>
    <keyword>internet of things</keyword>
    <keyword>data taxonomy</keyword>
    <abstract>
      <?line 42?>

<t>This document defines the core vocabulary, comparison model, and extension
discipline used by Privacy Preference Declarations (PPDs) to express atomic
privacy-relevant dataflows in home networks. It complements the companion PPD
architecture and protocol work by standardizing the core fields used in
participant declarations and household policy rules. The core vocabulary is
the mandatory shared semantic floor for baseline participant-facing
interoperability. Richer ecosystem-specific vocabularies remain possible, but
comparison-relevant non-core terms need explicit relationships to the shared
core so they remain computable. Baseline participant-facing protocol messages
use compact identifiers plus taxonomy context rather than requiring full
ontology exchange on the wire.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drspangle.github.io/draft-dsmullen-ppd-taxonomy/draft-dsmullen-ppd-taxonomy.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dsmullen-ppd-taxonomy/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/drspangle/draft-dsmullen-ppd-taxonomy"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Privacy Preference Declaration (PPD) architecture depends on a shared
understanding of privacy-related semantics.
<xref target="I-D.draft-dsmullen-ppd-architecture"/> defines the roles, trust boundaries,
and lifecycle. <xref target="I-D.draft-dsmullen-ppd-protocol"/> defines the
participant-facing message flow and object structure. This document defines the
core fields and qualifier families used by those messages.</t>
      <t>The baseline PPD protocol carries atomic descriptive statements from
device-side participants and atomic effective-policy rules from the household
side. This taxonomy treats those statements and rules as atomic
privacy-relevant dataflows. It defines the meaning of the fields used in
those dataflows and the minimum semantic discipline needed to compare them
coherently across devices, vendors, and household deployments.</t>
      <t>The purpose of this taxonomy is to model those atomic privacy-relevant
dataflows as the fundamental semantic elements of PPD policy. A participant
declaration describes dataflows from the participant side: which dataflows a
device or associated service performs, requires, or may attempt. A household
policy rule describes those same dataflows from the household side: whether
they are allowed, denied, or qualified. The taxonomy exists so these two views
can be compared coherently.</t>
      <t>The taxonomy is designed to be useful in constrained operational environments.
It therefore separates the stable meaning of core terms from any richer
external semantic framework that might also describe them. Implementations <bcp14>MAY</bcp14>
use richer vocabularies, ontology representations, or local policy-analysis
artifacts where useful, but baseline participant-facing interoperability
depends on a shared computable semantic floor rather than on a full external
reasoning stack.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="core-semantic-model">
      <name>Core Semantic Model</name>
      <t>The foundational semantic unit in this taxonomy is an atomic privacy-relevant
dataflow.</t>
      <t>In the baseline PPD model, an atomic privacy-relevant dataflow is the
fundamental semantic element over which participant declarations and household
policy rules are compared.</t>
      <t>In the baseline PPD model:</t>
      <ul spacing="normal">
        <li>
          <t>a Device Declaration Statement describes one participant-side dataflow case;</t>
        </li>
        <li>
          <t>a Policy Rule describes one household-side normative dataflow case; and</t>
        </li>
        <li>
          <t>comparison between participant behavior and household policy is grounded in
comparison of those dataflows.</t>
        </li>
      </ul>
      <t>A baseline atomic dataflow contains these five core fields:</t>
      <ul spacing="normal">
        <li>
          <t><tt>data_type</tt></t>
        </li>
        <li>
          <t><tt>purpose</tt></t>
        </li>
        <li>
          <t><tt>action</tt></t>
        </li>
        <li>
          <t><tt>source</tt></t>
        </li>
        <li>
          <t><tt>destination</tt></t>
        </li>
      </ul>
      <t>It can also carry structured dataflow qualifiers.</t>
      <t>The rule effect, such as <tt>allow</tt> or <tt>deny</tt>, is not part of the dataflow tuple
itself. It belongs to the household-side policy-rule layer defined by
<xref target="I-D.draft-dsmullen-ppd-protocol"/>.</t>
      <t>Modality is likewise not part of the taxonomy terms that populate the core
fields or qualifier families. Core and non-core taxonomy terms <bcp14>MUST NOT</bcp14> encode
policy effect or policy modality such as allowed, denied, prohibited,
required, or optional. If a deployment needs to express both a dataflow
concept and a policy position about that concept, the concept <bcp14>MUST</bcp14> be carried
in the appropriate core field or qualifier family and the policy position
<bcp14>MUST</bcp14> be expressed separately through the policy-rule layer.</t>
      <t>This document does not define a household policy authoring workflow, a full
conflict-resolution procedure, or a general reasoning engine. It defines the
minimum semantic structure needed so participant declarations and household
policy can be compared in an interoperable way.</t>
    </section>
    <section anchor="design-goals">
      <name>Design Goals</name>
      <ul spacing="normal">
        <li>
          <t>Semantic Clarity: Provide stable, unambiguous meanings for privacy-related
terms used in PPD messages.</t>
        </li>
        <li>
          <t>Core Primitive Coverage: Standardize the core fields needed by the
baseline protocol rule and statement model.</t>
        </li>
        <li>
          <t>Compact Operational Use: Support compact identifiers in participant-facing
JSON messages.</t>
        </li>
        <li>
          <t>Extensibility Without Fragmentation: Allow organization-specific
vocabularies while requiring comparison-relevant extensions to remain
reducible to the shared core.</t>
        </li>
        <li>
          <t>Validation and Comparison Support: Enable comparison of participant
assertions and household policy without forcing every deployment to use a
single heavy semantic framework.</t>
        </li>
        <li>
          <t>Interoperability: Preserve a shared computable semantic floor across
vendors, device classes, and household deployments.</t>
        </li>
      </ul>
    </section>
    <section anchor="core-semantic-floor-and-extension-model">
      <name>Core Semantic Floor and Extension Model</name>
      <t>The baseline PPD core vocabulary is not intended to be the only vocabulary
used in real deployments. Device vendors, service providers, vertical
ecosystems, and user-facing policy tools are expected to introduce richer
concepts over time.</t>
      <t>The purpose of the core vocabulary is different. It provides the minimum
shared semantic substrate against which participant declarations and household
policy can still be interpreted and compared when those richer vocabularies
are present.</t>
      <t>For baseline participant-facing interoperability:</t>
      <ul spacing="normal">
        <li>
          <t>core terms define the shared semantic floor;</t>
        </li>
        <li>
          <t>richer non-core terms <bcp14>MAY</bcp14> be used through the taxonomy context mechanism
defined by <xref target="I-D.draft-dsmullen-ppd-protocol"/>; and</t>
        </li>
        <li>
          <t>when a non-core term or qualifier is used in a comparison-relevant field, it
<bcp14>MUST</bcp14>
be defined with an explicit relationship or reduction to one or more core
concepts sufficient to keep the term computable against the shared core
model.</t>
        </li>
      </ul>
      <t>Terms that do not carry such a relationship can still be locally meaningful,
but they are outside baseline interoperable computation.</t>
    </section>
    <section anchor="core-taxonomy-structure">
      <name>Core Taxonomy Structure</name>
      <t>The baseline taxonomy consists of five core fields plus selected dataflow
qualifier families. These are used together in atomic declaration
statements and atomic effective-policy rules.</t>
      <t>The baseline core is intentionally small. It is not meant to exhaust the full
space of home-IoT data categories, service roles, or policy-authoring
concepts. Its purpose is to define the minimum shared set of computable
primitives to which richer vocabularies can be related.
Later taxonomy releases can add terms, but the initial core terms defined here
are the mandatory baseline floor for interoperable computation.
The definitions in this section define the baseline meaning of those initial
core terms.</t>
      <t>Within a given field family, the baseline core terms are intended to act as
the broad floor categories used for interoperable comparison. Narrower terms
used in that family are expected to reduce to exactly one broader core term.
If a local concept appears to span multiple broad categories, that usually
means the handling needs a narrower term below the floor, a clearer field
choice, or separate atomic dataflows.</t>
      <t>For field families that participate in subsumption, this document is therefore
intentionally prescriptive about refinement discipline:</t>
      <ul spacing="normal">
        <li>
          <t>a non-core refinement <bcp14>MUST</bcp14> identify exactly one immediate broader term within
the same field family;</t>
        </li>
        <li>
          <t>repeated broader-than relationships <bcp14>MUST</bcp14> eventually terminate at a core term
in that family; and</t>
        </li>
        <li>
          <t>if a concept would require multiple immediate broader terms in the same
family, it is not a valid single refinement for baseline comparison and
should instead be modeled through a narrower term under one branch, a
clearer field choice, or separate atomic dataflows.</t>
        </li>
      </ul>
      <t>These refinement rules do not allow policy modality to be folded into field
or qualifier concepts. For example, a term that attempts to combine a
destination category with a policy position, such as a recipient marked as
prohibited or required, is not a valid baseline taxonomy refinement. Such
modality belongs in the policy-rule layer rather than in the taxonomy term
itself.</t>
      <section anchor="data-type-what">
        <name>Data Type (What)</name>
        <t>Data Type terms identify the kind of data involved in the dataflow.
Data Type participates in semantic comparison and supports
broader-than/narrower-than relationships.</t>
        <t>The core Data Type set is intentionally broad. Its purpose is to provide a
stable floor under which narrower device- or ecosystem-specific terms can be
placed. These categories are based on the immediate semantic content of the
data, not on its source, derivation history, transport path, or downstream
use. Whether data is directly observed or derived from prior data is handled
through the <tt>source</tt> field rather than by a separate <tt>data_type</tt> category.</t>
        <t>The initial core term set is:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ppd:identifierData</tt>: data used to identify a user, household, participant,
device, account, or service interaction.</t>
          </li>
          <li>
            <t><tt>ppd:profileData</tt>: data that describes a user, household, account, or
associated preferences and characteristics.</t>
          </li>
          <li>
            <t><tt>ppd:sensorData</tt>: non-content measured or observed data obtained from
sensing of the device, the local environment, or an observed space or
object.</t>
          </li>
          <li>
            <t><tt>ppd:contentData</tt>: content captured, communicated, or stored as user- or
environment-associated content, including text, audio, image, and video
content.</t>
          </li>
          <li>
            <t><tt>ppd:locationData</tt>: data about physical location, movement, or place
association.</t>
          </li>
          <li>
            <t><tt>ppd:deviceAndNetworkData</tt>: data about device configuration, capabilities,
settings, status, connectivity, or network environment.</t>
          </li>
          <li>
            <t><tt>ppd:usageData</tt>: data about interaction with the device, service, or
associated interfaces.</t>
          </li>
        </ul>
        <t>Terms such as temperature readings, humidity readings, audio samples, video
frames, event clips, device identifiers, crash logs, and occupancy estimates
are expected to appear as narrower refinements of these broader core data
types. For example, an occupancy estimate that describes the state of an
observed space is still classified by what that data means, while the fact
that it was inferred from prior data is captured separately through the
<tt>source</tt> field.</t>
      </section>
      <section anchor="purpose-why">
        <name>Purpose (Why)</name>
        <t>Purpose terms identify the reason or operational objective for the handling.
Purpose participates in semantic comparison and supports broader-than/
narrower-than relationships.</t>
        <t>The core Purpose set is intentionally broad. It is designed to reflect the
high-level purpose categories commonly seen in privacy notices and policy
documents, while leaving room for narrower operational purposes below it.
These categories are based on why the handling occurs in the rule at issue,
not on product-feature labels.</t>
        <t>The initial core term set is:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ppd:coreFunctionality</tt>: handling directly necessary to provide the primary
function of the device or service.</t>
          </li>
          <li>
            <t><tt>ppd:personalization</tt>: handling used to tailor behavior, presentation, or
operation to a user, household, or context.</t>
          </li>
          <li>
            <t><tt>ppd:communicationsAndNotifications</tt>: handling used to communicate with a
user, household member, or administrator, including notices, alerts, and
service messages.</t>
          </li>
          <li>
            <t><tt>ppd:security</tt>: handling used to maintain safety, security, fraud
prevention, abuse prevention, or protective monitoring.</t>
          </li>
          <li>
            <t><tt>ppd:diagnosticsAndMaintenance</tt>: handling used to troubleshoot, repair,
maintain, or keep the device or service operational.</t>
          </li>
          <li>
            <t><tt>ppd:analyticsAndImprovement</tt>: handling used to analyze operation or improve
the quality, reliability, or performance of the device or service.</t>
          </li>
          <li>
            <t><tt>ppd:legalCompliance</tt>: handling used to satisfy legal, regulatory, audit, or
compliance obligations.</t>
          </li>
          <li>
            <t><tt>ppd:advertisingAndMarketing</tt>: handling used to target, deliver, measure, or
optimize promotional or marketing activity.</t>
          </li>
        </ul>
        <t>Terms such as remote monitoring, remote viewing, predictive maintenance,
product improvement, anomaly detection, and more specific analytical or
security purposes are expected to appear as narrower refinements of these
broader core purposes.</t>
        <t>Feature labels that can serve more than one broad purpose are not good floor
categories by themselves. For example, a motion-detection feature may support
<tt>ppd:coreFunctionality</tt>, <tt>ppd:security</tt>, or another narrower purpose depending
on the actual rule context.</t>
        <t>When a real handling path genuinely serves multiple purposes, that ambiguity
<bcp14>SHOULD NOT</bcp14> be collapsed into one purpose label. Instead, the handling should
normally be represented as separate atomic dataflows, each with its own
purpose classification. This is not only a comparison convenience. It also
improves transparency by making it easier for a household, an implementer, or
an automated policy-analysis function to identify and reason about specific
sensitive purposes, specific data types, and the exact handling paths to which
they apply.</t>
      </section>
      <section anchor="action-how">
        <name>Action (How)</name>
        <t>Action terms identify the privacy-relevant operation being performed.
Unlike several of the other core fields, the baseline action vocabulary is
intentionally flat rather than hierarchical.</t>
        <t>The initial core term set is:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ppd:collection</tt>: acquiring, observing, or accepting data into the handling
context of the participant or service.</t>
          </li>
          <li>
            <t><tt>ppd:use</tt>: operating on data within the current handling context without
disclosing it to a different recipient.</t>
          </li>
          <li>
            <t><tt>ppd:transfer</tt>: disclosing, transmitting, or otherwise making data available
to a different recipient or handling context.</t>
          </li>
          <li>
            <t><tt>ppd:inference</tt>: deriving new data, classifications, or conclusions from
existing data.</t>
          </li>
        </ul>
      </section>
      <section anchor="source-from-where">
        <name>Source (From Where)</name>
        <t>Source terms identify the origin of the handled data in the relevant
processing path. Source participates in semantic comparison and supports
broader-than/narrower-than relationships.</t>
        <t>The initial core term set is:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ppd:userProvided</tt>: data intentionally provided by a user through direct
interaction with the participant, service, or associated control surface.</t>
          </li>
          <li>
            <t><tt>ppd:participantObserved</tt>: data directly observed by the participant from the
device, its environment, or an observed space or object.</t>
          </li>
          <li>
            <t><tt>ppd:participantGenerated</tt>: data generated by the participant as part of its
own operation, status reporting, logging, or internal state handling.</t>
          </li>
          <li>
            <t><tt>ppd:householdProvided</tt>: data supplied by another household-local device,
controller, gateway, or local service.</t>
          </li>
          <li>
            <t><tt>ppd:vendorProvided</tt>: data supplied by a service associated with the device
or service vendor.</t>
          </li>
          <li>
            <t><tt>ppd:thirdPartyProvided</tt>: data supplied by a third party outside the
participant's primary vendor or household relationship.</t>
          </li>
          <li>
            <t><tt>ppd:derivedFromPriorData</tt>: data whose immediate origin is prior data
processing rather than direct provision or direct observation.</t>
          </li>
        </ul>
        <t>Terms such as sensor, camera sensor, microphone, weather-feed data, gateway
state feeds, and more specific third-party or vendor-origin categories are
expected to appear as narrower refinements of these broader source categories.</t>
      </section>
      <section anchor="destination-to-where">
        <name>Destination (To Where)</name>
        <t>Destination terms identify the receiving endpoint or handling target to which
the dataflow applies. For <tt>transfer</tt>, Destination identifies the recipient or
recipient-side handling context. For <tt>use</tt> and <tt>inference</tt>, Destination
identifies the handling context in which that operation takes place.
Destination participates in semantic comparison and can support
broader-than/narrower-than relationships.</t>
        <t>Destination does not by itself express a placement restriction on how a <tt>use</tt>
or <tt>inference</tt> operation executes inside that handling context. More specific
execution restrictions belong in the <tt>processing_boundary</tt> qualifier family.
The two are related but not interchangeable.</t>
        <t>The initial core term set is:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ppd:localProcessing</tt>: a handling target that remains within the participant
or household-local handling context rather than introducing a remote
recipient or remote service environment.</t>
          </li>
          <li>
            <t><tt>ppd:vendorCloud</tt>: a remote service environment operated by the device or
service vendor.</t>
          </li>
          <li>
            <t><tt>ppd:thirdPartyService</tt>: a remote service environment operated by an entity
other than the device or service vendor.</t>
          </li>
          <li>
            <t><tt>ppd:dataBroker</tt>: a recipient whose role includes acquiring, exchanging, or
redisclosing data as a commercial data asset.</t>
          </li>
        </ul>
      </section>
      <section anchor="dataflow-qualifiers">
        <name>Dataflow Qualifiers</name>
        <t>The baseline protocol also allows structured qualifiers through the
<tt>constraints</tt> object. This document defines the initial qualifier families
used by that object.</t>
        <t>The protocol wire object remains named <tt>constraints</tt>, but its members are
semantically qualifiers on atomic dataflows.</t>
        <t>Qualifier families are action-sensitive. They are not a free-form bag of
attributes that apply equally to every action. A qualifier family is only
valid where this document or a later specification defines its meaning for the
relevant action context. Baseline participant-facing uses that attach a
qualifier family outside its defined applicability are invalid.</t>
        <section anchor="retention">
          <name>Retention</name>
          <t>Retention qualifies how long the relevant data or resulting artifact may
persist after the action in question.</t>
          <t>Retention is action-sensitive. In particular:</t>
          <ul spacing="normal">
            <li>
              <t>for <tt>collection</tt>, retention qualifies whether the collected result is
allowed to persist after collection;</t>
            </li>
            <li>
              <t>for <tt>use</tt>, retention qualifies how long the data or resulting artifact may
remain available for that use;</t>
            </li>
            <li>
              <t>for <tt>transfer</tt>, retention qualifies downstream persistence by the receiving
side rather than only the sender's local storage duration; and</t>
            </li>
            <li>
              <t>for <tt>inference</tt>, retention qualifies how long inferred output may persist.</t>
            </li>
          </ul>
          <t>The baseline retention model distinguishes two strong named poles:</t>
          <ul spacing="normal">
            <li>
              <t>ppd:ephemeral</t>
            </li>
            <li>
              <t>ppd:indefinite</t>
            </li>
          </ul>
          <t><tt>ppd:ephemeral</tt> means the handling is not intended to result in durable
persistence beyond the immediate handling context.</t>
          <t><tt>ppd:indefinite</tt> means no bounded upper retention limit is expressed in the
rule.</t>
          <t>Bounded retention periods are expected to require more specific quantitative
refinements, including explicit duration values and units, in later revisions
or deployment profiles. The baseline compact participant-facing form defined
here therefore standardizes only the categorical retention values above.</t>
          <t>Retention comparison does not use a generic taxonomy subsumption hierarchy in
the same way as <tt>data_type</tt>, <tt>purpose</tt>, <tt>source</tt>, or <tt>destination</tt>.</t>
        </section>
        <section anchor="processing-boundary">
          <name>Processing Boundary</name>
          <t>Processing Boundary qualifies where a processing operation may execute or
remain. This family is most natural for <tt>use</tt> and <tt>inference</tt>. It is not the
primary semantic mechanism for describing transfer recipients, because
<tt>destination</tt> already identifies the transfer target.</t>
          <t>In the baseline model, <tt>processing_boundary</tt> is therefore primarily a
qualifier on <tt>use</tt> and <tt>inference</tt> dataflows rather than a general qualifier
on <tt>transfer</tt>.</t>
          <t><tt>processing_boundary</tt> does not replace <tt>destination</tt>. <tt>Destination</tt> identifies
the handling target or recipient context to which the dataflow applies.
<tt>processing_boundary</tt> further constrains where a <tt>use</tt> or <tt>inference</tt>
operation may execute within that context. For example, a <tt>use</tt> dataflow with
<tt>destination=ppd:localProcessing</tt> can still be further narrowed by
<tt>processing_boundary=ppd:onDeviceOnly</tt> or
<tt>processing_boundary=ppd:inHomeOnly</tt>.</t>
          <t>The initial core term set is:</t>
          <ul spacing="normal">
            <li>
              <t><tt>ppd:onDeviceOnly</tt>: the relevant processing is constrained to execute on the
participant device itself.</t>
            </li>
            <li>
              <t><tt>ppd:inHomeOnly</tt>: the relevant processing is constrained to execute within
the household-local trust boundary rather than in a remote service
environment.</t>
            </li>
            <li>
              <t><tt>ppd:approvedRemoteProcessing</tt>: the relevant processing is allowed to occur
in an approved remote service environment.</t>
            </li>
          </ul>
          <t>Processing Boundary participates in semantic comparison and can support
broader-than/narrower-than relationships.</t>
        </section>
        <section anchor="jurisdiction">
          <name>Jurisdiction</name>
          <t>Jurisdiction qualifies the legal or regulatory domain relevant to the
dataflow. It is intended for cases where a policy needs to constrain the legal
domain under which handling occurs, not merely the physical placement of a
processor or store.</t>
          <t>Jurisdiction is intentionally not treated as a single flat label. Any use of a
jurisdiction qualifier <bcp14>MUST</bcp14> identify the scoped subcase it constrains, such as:</t>
          <ul spacing="normal">
            <li>
              <t>processing</t>
            </li>
            <li>
              <t>storage</t>
            </li>
            <li>
              <t>transfer</t>
            </li>
          </ul>
          <t>The scoped subcase is part of the qualifier meaning. A jurisdiction
constraint on processing is not automatically equivalent to the same
jurisdiction constraint on storage or transfer.</t>
          <t>For example:</t>
          <ul spacing="normal">
            <li>
              <t>a processing-scoped jurisdiction qualifier can constrain the legal domain
under which processing is permitted to occur;</t>
            </li>
            <li>
              <t>a storage-scoped jurisdiction qualifier can constrain the legal domain under
which retained data may be kept; and</t>
            </li>
            <li>
              <t>a transfer-scoped jurisdiction qualifier can constrain the legal domain to
which a transfer recipient may belong.</t>
            </li>
          </ul>
          <t>This keeps the qualifier machine-comparable while still allowing broader
sovereignty concerns to be expressed through more concrete baseline semantics.</t>
          <t>This document defines the qualifier family and the scoped-semantics rule, but
it does not yet define a closed baseline set of jurisdiction vocabulary
values. In this revision, <tt>jurisdiction</tt> is therefore a structured qualifier
family shell rather than a fully populated baseline value hierarchy.</t>
          <t>Baseline interoperable computation can still validate that a jurisdiction
qualifier is well-formed and scoped correctly, but semantic comparison of
jurisdiction values requires a later taxonomy revision or deployment profile
that defines shared jurisdiction vocabulary and reduction rules for the scoped
subcase in question.</t>
        </section>
      </section>
    </section>
    <section anchor="subsumption-and-comparison">
      <name>Subsumption and Comparison</name>
      <t>Baseline comparison is not limited to exact token equality.</t>
      <t>For comparison-relevant fields and qualifier families that participate in
subsumption:</t>
      <ul spacing="normal">
        <li>
          <t>a term can be broader than another term;</t>
        </li>
        <li>
          <t>a term can be narrower than another term; and</t>
        </li>
        <li>
          <t>two terms are equivalent when each subsumes the other.</t>
        </li>
      </ul>
      <t>Only the following baseline fields and qualifier families participate in
subsumption:</t>
      <ul spacing="normal">
        <li>
          <t><tt>data_type</tt></t>
        </li>
        <li>
          <t><tt>purpose</tt></t>
        </li>
        <li>
          <t><tt>source</tt></t>
        </li>
        <li>
          <t><tt>destination</tt></t>
        </li>
        <li>
          <t><tt>processing_boundary</tt></t>
        </li>
      </ul>
      <t>The following do not use baseline subsumption:</t>
      <ul spacing="normal">
        <li>
          <t><tt>action</tt>, which remains a flat enumerable family and therefore compares by
exact identity or exact reduction to a core action value; and</t>
        </li>
        <li>
          <t><tt>retention</tt>, which uses its own categorical or quantitative comparison
semantics rather than a generic taxonomy hierarchy; and</t>
        </li>
        <li>
          <t><tt>jurisdiction</tt>, which in this revision defines qualifier structure and scope
rules but not yet a closed baseline value hierarchy.</t>
        </li>
      </ul>
      <t>This document does not define a full conflict-resolution procedure. It defines
the semantic basis that allows comparison to remain computable and
interoperable.</t>
    </section>
    <section anchor="identifier-model">
      <name>Identifier Model</name>
      <section anchor="stable-term-identifiers">
        <name>Stable Term Identifiers</name>
        <t>Stable term identifiers are the primary semantic hook in this taxonomy. The
baseline core vocabulary uses the reserved prefix <tt>ppd:</tt>. A term such as
<tt>ppd:sensorData</tt> or <tt>ppd:localProcessing</tt> derives its meaning from the stable
taxonomy definition associated with that identifier.</t>
        <t>A taxonomy release identifier can identify the vocabulary snapshot used for validation, reproducibility, or documentation. For example, a deployment might use a release identifier such as <tt>ppd-core-2026-05</tt>. However, release metadata does not replace the term identifier itself as the source of meaning.</t>
      </section>
      <section anchor="stability-of-term-meanings">
        <name>Stability of Term Meanings</name>
        <t>Once published, a stable term identifier <bcp14>MUST NOT</bcp14> be silently reassigned an
incompatible meaning in a later taxonomy release.</t>
        <t>Later releases <bcp14>MAY</bcp14>:</t>
        <ul spacing="normal">
          <li>
            <t>add new terms;</t>
          </li>
          <li>
            <t>clarify the prose associated with an existing term when the clarification
does not change its comparison semantics; and</t>
          </li>
          <li>
            <t>deprecate a term for future use while preserving its published meaning for
reproducibility and comparison of existing content.</t>
          </li>
        </ul>
        <t>If a later release needs materially different semantics, it <bcp14>MUST</bcp14> define a new
term identifier rather than repurposing the old one.</t>
      </section>
      <section anchor="compact-wire-form">
        <name>Compact Wire Form</name>
        <t><xref target="I-D.draft-dsmullen-ppd-protocol"/> defines compact term identifiers as the participant-facing wire format. The protocol's Taxonomy Context Object carries:</t>
        <ul spacing="normal">
          <li>
            <t>a taxonomy release identifier; and</t>
          </li>
          <li>
            <t>any required non-core prefix declarations.</t>
          </li>
        </ul>
        <t>This keeps participant-facing messages compact while preserving stable
semantics.</t>
      </section>
      <section anchor="extension-namespaces-and-core-primitive-mapping">
        <name>Extension Namespaces and Core-Primitive Mapping</name>
        <t>Organizations <bcp14>MAY</bcp14> define additional terms outside the baseline <tt>ppd:</tt>
vocabulary. When such terms appear in participant-facing protocol messages, the
sender <bcp14>MUST</bcp14> provide the required non-core prefix declarations through the
protocol's taxonomy context.</t>
        <t>For comparison-relevant fields and qualifier families, namespace declaration
alone is not enough. When a non-core term fills <tt>data_type</tt>, <tt>purpose</tt>,
<tt>action</tt>, <tt>source</tt>, or <tt>destination</tt>, or supplies a non-core <tt>retention</tt>,
<tt>processing_boundary</tt>, or scoped <tt>jurisdiction</tt> qualifier value, that term
<bcp14>MUST</bcp14> be defined with the semantic relationship or exact reduction by which it
is reduced to one or more shared core concepts.</t>
        <t>Non-core terms also <bcp14>MUST NOT</bcp14> introduce policy modality into the taxonomy
layer. An extension term can refine a field or qualifier concept, but it
cannot turn that concept into an encoded policy effect such as "prohibited"
or "required". Those meanings belong in policy rules, not in taxonomy terms.</t>
        <t>That relationship can include equivalence or broader/narrower placement where
the field participates in subsumption, or exact reduction where it does not, so
long as it preserves computable comparison against the shared core floor. For
<tt>jurisdiction</tt>, baseline participant-facing use further depends on a later
taxonomy revision or deployment profile that defines the shared scoped
jurisdiction vocabulary being used.</t>
        <t>For field families that participate in subsumption, a non-core refinement
<bcp14>MUST</bcp14> identify exactly one immediate broader term and <bcp14>MUST</bcp14> remain reducible by
repeated application of that relationship to one core term in the same family.
For field families that do not participate in subsumption, exact reduction or
the family-specific comparison rules defined by this document apply.</t>
        <t>For example, an organization might define:</t>
        <ul spacing="normal">
          <li>
            <t><tt>vendorx:temperatureReading</tt> as a narrower <tt>data_type</tt> under
<tt>ppd:sensorData</tt>;</t>
          </li>
          <li>
            <t><tt>vendorx:userRequestedRemoteViewing</tt> as a narrower <tt>purpose</tt> under
<tt>ppd:coreFunctionality</tt>;</t>
          </li>
          <li>
            <t><tt>vendorx:cameraSensor</tt> as a narrower <tt>source</tt> under
<tt>ppd:participantObserved</tt>; or</t>
          </li>
          <li>
            <t><tt>vendorx:edgeHubOnly</tt> as a narrower <tt>processing_boundary</tt> under
<tt>ppd:inHomeOnly</tt>.</t>
          </li>
        </ul>
        <t>Such terms can be useful, but they remain baseline-interoperable only when
their relationship to the relevant core fields is explicit enough that
participants and household policy services can compare them meaningfully.</t>
      </section>
    </section>
    <section anchor="use-in-ppd-messages">
      <name>Use in PPD Messages</name>
      <t>The protocol and taxonomy have different jobs:</t>
      <ul spacing="normal">
        <li>
          <t>the protocol carries which atomic combinations a participant asserts or a household policy applies; and</t>
        </li>
        <li>
          <t>the taxonomy defines what the terms used in those combinations mean.</t>
        </li>
      </ul>
      <t>This distinction matters. A flat bag of supported data types, purposes, actions, and destinations is not enough to describe which combinations actually apply to a participant. The protocol therefore carries atomic declaration statements and atomic policy rules, while this taxonomy defines the term spaces and qualifier meanings used in those objects.</t>
      <t>The protocol wire object for qualifiers is named <tt>constraints</tt>, but the
semantics described here are qualifier semantics on those atomic dataflows.</t>
      <t>When those objects use non-core comparison-relevant terms, the objects remain
baseline-computable only if those terms are reducible to the shared core model
through the extension and mapping rules above.</t>
      <t>A declaration statement example is:</t>
      <sourcecode type="json"><![CDATA[
{
  "statement_id": "temperature-product-improvement",
  "data_type": "ppd:sensorData",
  "purpose": "ppd:analyticsAndImprovement",
  "action": "ppd:transfer",
  "source": "ppd:participantObserved",
  "destination": "ppd:vendorCloud",
  "constraints": {
    "retention": "ppd:indefinite"
  }
}
]]></sourcecode>
      <t>A corresponding effective-policy rule example is:</t>
      <sourcecode type="json"><![CDATA[
{
  "rule_id": "r1",
  "data_type": "ppd:mediaData",
  "purpose": "ppd:security",
  "action": "ppd:use",
  "source": "ppd:participantObserved",
  "destination": "ppd:localProcessing",
  "effect": "allow",
  "constraints": {
    "processing_boundary": "ppd:onDeviceOnly"
  }
}
]]></sourcecode>
      <t>The taxonomy defines the meaning of the identifiers in these objects. The protocol defines how those objects are carried, validated, acknowledged, and kept current.</t>
    </section>
    <section anchor="relationship-to-richer-semantic-frameworks">
      <name>Relationship to Richer Semantic Frameworks</name>
      <t>This taxonomy is intentionally lighter than a full ontology language or
rights-expression framework. Implementations <bcp14>MAY</bcp14> publish auxiliary
representations, mappings, or tool-specific serializations when useful. For
example, organizations might maintain internal ontology, graph, or
policy-analysis artifacts that map to the stable identifiers defined here.</t>
      <t>However, baseline participant-facing interoperability does not require OWL,
RDF, JSON-LD, or comparable machinery on the wire. The participant-facing
contract remains compact term identifiers plus the protocol-defined taxonomy
context, backed by the shared core semantic floor defined here.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Semantic drift, ambiguous extensions, and unresolved terms can undermine privacy signaling even when transport security is strong.</t>
      <t>Organizations publishing extension vocabularies for comparison-relevant fields
need stable meanings and explicit reduction back to the shared core primitives.
Participant-facing services and participants <bcp14>SHOULD NOT</bcp14> silently treat
unresolved, unmapped, or unusable taxonomy terms as equivalent to known terms.</t>
      <t>When comparison-relevant extension terms cannot be reduced to the shared core,
the correct baseline result is failure or indeterminate handling, not silent
fallback to a broader local guess.</t>
      <t>When unresolved or unsupported terms appear in participant-facing protocol messages, the handling defined by <xref target="I-D.draft-dsmullen-ppd-protocol"/> applies. In particular, unresolved terms in normative policy content are more serious than unresolved descriptive detail because they can change the meaning of an allowed or denied handling path.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-dsmullen-ppd-architecture">
          <front>
            <title>Privacy Preference Declaration for Home Networks</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="20" month="May" year="2026"/>
            <abstract>
              <t>   This document describes an architecture for signaling household
   privacy preferences to devices in home networks through Privacy
   Preference Declarations (PPDs).  The architecture enables a PPD
   participant to discover a PPD service endpoint, establish trust in
   that endpoint through the applicable protocol and security profile,
   retrieve the applicable household policy instance, and acknowledge
   receipt of that policy instance.  The acknowledgment establishes that
   a specific policy instance was made available to the participant; it
   does not, by itself, assert anything about the participant's
   subsequent behavior.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-architecture-08"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-protocol">
          <front>
            <title>Privacy Preference Declaration Protocol Specification</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="20" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies a participant-facing protocol for Privacy
   Preference Declarations (PPDs) in home networks.  The protocol is
   between a home-side PPD service endpoint and a device-side actor,
   formally the PPD participant, which is a device or a service acting
   on behalf of a device.  It defines baseline operations for endpoint
   metadata confirmation, participant registration, optional participant
   declaration, effective-policy retrieval, policy acknowledgment,
   renewal, and reassociation.  This document complements the PPD
   architecture and taxonomy documents by defining the message and
   sequencing behavior needed for interoperable policy signaling.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-protocol-02"/>
        </reference>
      </references>
    </references>
    <?line 724?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors thank the participants in the related PPD architecture, protocol, and implementation discussions for the feedback that shaped this taxonomy direction.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
