<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-howe-vcon-lifecycle-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="vCon Lifecycle">vCon Lifecycle Management using SCITT</title>
    <seriesInfo name="Internet-Draft" value="draft-howe-vcon-lifecycle-01"/>
    <author fullname="Thomas McCarthy-Howe">
      <organization>Strolid, Inc.</organization>
      <address>
        <email>thomas.howe@strolid.com</email>
      </address>
    </author>
    <author fullname="S. Lasker">
      <organization>Independent</organization>
      <address>
        <email>stevenlasker@hotmail.com</email>
      </address>
    </author>
    <author fullname="Diana James">
      <organization>Marashlian &amp; Donahue, PLLC</organization>
      <address>
        <email>daj@commlawgroup.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="04"/>
    <area>art</area>
    <workgroup>vcon</workgroup>
    <keyword>data privacy</keyword>
    <keyword>data subject rights</keyword>
    <keyword>conversation</keyword>
    <keyword>vcon</keyword>
    <keyword>CDR</keyword>
    <keyword>call detail record</keyword>
    <keyword>call meta data</keyword>
    <keyword>call recording</keyword>
    <keyword>email thread</keyword>
    <keyword>text conversation</keyword>
    <keyword>video recording</keyword>
    <keyword>video conference</keyword>
    <keyword>conference recording</keyword>
    <keyword>SCITT</keyword>
    <keyword>transparency</keyword>
    <abstract>
      <?line 150?>

<t>This document proposes using the SCITT (Supply Chain, Integrity, Transparency, and Trust) protocol to record, communicate and coordinate the lifecycle of Virtual Conversations (vCons), which are standardized containers for conversational data like call recordings, transcripts, and chat logs.
While vCons enable capturing and sharing conversation details for AI analysis and business purposes, they lack mechanisms for proving compliance with privacy regulations and consent management.
SCITT addresses this by providing an immutable, append-only transparency ledger that records key lifecycle events—from vCon creation and consent management to call recording, as well as data processing and deletion—enabling entities to demonstrate regulatory compliance and maintain trust across distributed systems.
The framework specifically addresses consent management challenges under regulations like GDPR and CCPA, where consent can be revoked at any time, requiring coordinated deletion across all parties that have received the vCon.
By combining vCons with SCITT, organizations can build scalable, transparent governance systems that protect personal data rights while enabling responsible use of conversational data for AI and business applications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://howethomas.github.io/vcon-dev/draft-howe-vcon-lifecycle.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-howe-vcon-lifecycle/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Virtualized Conversations Working Group mailing list (<eref target="mailto:vcon@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/vcon/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/vcon/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/vcon-dev/draft-howe-vcon-lifecycle"/>.</t>
    </note>
  </front>
  <middle>
    <?line 158?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Virtual Conversations (vCons) <eref target="https://datatracker.ietf.org/wg/vcon/about">draft-vcon</eref> are powerful means of
   capturing and collaborating on the details of human conversations,
   built to travel.  They feed AI systems, enable entities to respond
   more accurately to customer needs, and manage the health of their
   business more effectively.  The vCon working group focuses on
   passing conversational data, such as data commonly generated and
   collected in business and security environments, from chat logs to
   transcripts to recordings.</t>
      <t>Most systems provide a way to store such information, but there are
   few standards or interoperability within the storage or transmission
   mechanisms.  vCon is a framework for capturing and collaborating on
   the details of a Virtual Conversation, feeding AI systems, and
   enabling entities to respond to customer needs more accurately and
   manage their business's health more effectively.</t>
      <t>The two opposing forces influencing such information passing are
   trying to enforce personal data and communications privacy and providing the ability and
   interest to use conversations in various ways, e.g., AI analysis.</t>
      <t>Although vCons are tools that enable actors to do the right thing,
   they are not tools that enable actors in a distributed system to
   prove it.  However, when combined with the SCITT protocol
   <eref target="https://datatracker.ietf.org/wg/scitt/about">draft-scitt</eref>, proof becomes practical.  SCITT allows Relying Parties
   to obtain information pertinent to the lifecycle of a vCon in a
   "transparent" way.  SCITT achieves this by having producers publish
   information in a Transparency Service, where Relying Parties can
   check the information.</t>
      <t>These relying parties can then use this information to make decisions
based on the current state and context of the vCon to account for changes
in consent, updates in the accuracy of the content, or amendments of the
information it might contain.
SCITT, the Supply Chain, Integrity, Transparency, and Trust protocol,
enables clients to register statements about events, physical or virtual,
such as when things are created or used.
These statements are immutable and are useful to support auditing,
governance, and coordination between various distributed systems.</t>
      <t>When using vCons to define a conversation, and SCITT to record the
events that occur to them, more scalable and transparent systems of
governance and provenance can be constructed to support privacy
efforts.  It is expected that there are many situations where this
governance across security boundaries is common and desired by all
parties.  One real-world example of this is management of consent as
it applies to the use of conversations for different purposes,
such as machine learning.  Using conversations as inputs to machine
learning has great benefit to both customers and businesses, yet only
responsibly within the defense of
personal data rights and compliance with personal data and
communications privacy laws, united together
by consent. Although consent to a call recording or personal data
collection and processing is not always required under the applicable
laws, seeking consent is often the best practice, given the Privacy by Design
principles, multijurisdictional business operations, and the ever-changing
privacy laws. Please see the <eref target="https://datatracker.ietf.org/doc/draft-james-privacy-primer-vcon/">privacy-primer-vcon</eref> for more information on
consent and other data subject protection concepts.</t>
      <t>In all of these cases, the ability to define and express the processing of
conversations depends on the ability to authoritatively define the lifecycle of a vCon:</t>
      <ul spacing="normal">
        <li>
          <t>who originated the vCon in the first place to establish provenance</t>
        </li>
        <li>
          <t>how it was analyzed and amended, to accurately respond to right-to-know requests</t>
        </li>
        <li>
          <t>the authenticity both of the original document for downstream workflow</t>
        </li>
        <li>
          <t>and authenticity of the redactions that come from the original, in service of data minimization efforts</t>
        </li>
        <li>
          <t>the various expressions of digital rights</t>
        </li>
        <li>
          <t>the sharing or deletion in response to the same digital rights</t>
        </li>
      </ul>
      <t>For this document and for purposes of illustration, consent will be used as an example use case.
Proper consent management is fundamental to the responsible protection of data and the ability
to leverage that data. Consent granted by the data subject of a vCon also needs to be stored
and passed, exactly like the other information contained in a vCon. Unlike the rest of the
information contained, the gathered consent is expressly not immutable. Consent, when gathered
for a purpose, can also be revoked by the data subject at any time and surely after a vCon has
been shared for analysis.</t>
      <t>Multiple regulations, including the US-born California Consumer Protection Act (CCPA) <eref target="https://oag.ca.gov/privacy/ccpa">CCPA</eref>
and the EU-born General Data Protection Regulation (GDPR) <eref target="https://gdpr.eu/">GDPR</eref>, outline requirements for
entities to use and dispose of PII information responsibly upon request. Consent, although
illustrative, is not the only example of mutability in the lifecycle of a vCon.
Verification of parties, improvements in the analysis, and additions of contextual attachments
result in updates to a vCon after data is shared, begging for a mechanism to
track and govern such changes.</t>
      <t>To honor the working group's charter to pass conversational data safely between consenting
parties, this draft provides an overview of the requirements, a workflow and an example
consent structure for using SCITT to manage the vCon lifecycle at scale, providing end-to-end,
interoperable services and tooling. The workflow enables entities in the workflow to
collaborate on a vCon while assuring all entities in the workflow adhere to relevant
PII regulations using a SCITT Ledger. Actual implementations of these workflows are left
to implementers and applications; this draft provides an authoritative list of the entries
that should appear on the SCITT transparency ledger to enable them.</t>
      <section anchor="acts-of-trust-and-transparency">
        <name>Acts of Trust and Transparency</name>
        <t>Throughout this workflow, no single entity can prove that other entities performed the
required actions. However, by auditing the SCITT Ledgers of all involved parties, entities
can prove they acted on the acknowledged consent and intent of the Data Subject, holding
other entities accountable for performing required operations.  In short, this audit can
help to prove that "the good guys did the right thing", to measure the compliance of those
outside this architecture who may have chosen different methods of compliance assurance.</t>
      </section>
      <section anchor="standards-based-interoperability">
        <name>Standards-Based Interoperability</name>
        <t>A wide range of industries and business scenarios benefit from virtual conversations,
making them valuable across countless organizations.The breadth of industries and
scenarios that benefit from virtual conversations spans numerous companies.
The power of this technology lies in enabling cross-conversation collaboration.
By implementing a standards-based approach, both collaborative and competitive
companies can easily integrate with solutions for transcription, consent management,
and CRM integration.</t>
        <t>Packaging conversations and associated metadata in the vCon format provides a
standardized means to communicate what has been sent. Due to the personally
identifiable information and digital fingerprinting in vCons, it's critical
to understand and adhere to regulatory requirements for PII management. Defining
and implementing a standard provides stability in information management throughout the lifecycle.</t>
        <t>Recording which vCon elements were sent to various parties holds each accountable
for what was sent, what was received, and when these exchanges occurred.</t>
      </section>
      <section anchor="what-differentiates-scitt-from-a-database">
        <name>What Differentiates SCITT from a Database</name>
        <t>The information written to SCITT could be compared to information in a standard database. What makes SCITT different:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Immutable and Append-Only nature</strong>: Once written, data cannot be modified or deleted</t>
          </li>
          <li>
            <t><strong>Cryptographic security</strong>: Through pre-signed statements, making SCITT a notary that cannot alter contents</t>
          </li>
          <li>
            <t><strong>Independent verifiability</strong>: Parties can verify data without trusting the service provider</t>
          </li>
          <li>
            <t><strong>Separation</strong>: Between the immutable, append-only ledger and the evidentiary metadata store (which can be deleted/redacted for PII governance)</t>
          </li>
          <li>
            <t><strong>Standardized communication</strong>: And enforcement of regulations and compliance</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 <eref target="https://www.rfc-editor.org/info/rfc8174">RFC2119</eref> when, and only when, they appear in all
   capitals, as shown here.</t>
      <t>The following terms, derived from <eref target="https://oag.ca.gov/privacy/ccpa">CCPA</eref>, <eref target="https://gdpr.eu/">GDPR</eref> and <eref target="https://datatracker.ietf.org/doc/draft-james-privacy-primer-vcon/">privacy-primer-vcon</eref>, are used throughout the document:</t>
      <t><strong>Conserver</strong>: A vCon workflow engine that ingests vCons, routing them for
processing and enhancements. A conserver doesn't store a vCon, rather it processes
the vCon for transcription, sentiment, integrity protection on egress, verification
on ingress, retrieving it from, and saving it to a vCon Registry.</t>
      <t><strong>Data Subject</strong>: The individual(s) whose personal information is processed
(also referred to as the "consumer" in many personal data privacy laws).</t>
      <t><strong>Data Originator</strong>: The Entity that records and initiates the vCon,
identifying the parties, including the media of the conversation.
For a phone call, this may include the phone numbers and the audio
recording.  For internet-based calls, such as Microsoft Teams, Zoom,
Google meet, this may include emails and audio/video recording.  The
Data Originator is a facilitator with access to the content of the
call. This document addresses the instance where the Data Originator
is a data processor under the applicable data privacy laws, collecting
and processing data on behalf of a Data Controller. However, Data Originators
may also act as Data Controllers when collecting and processing data for
their own purposes. This document does not address such an instance, and
implementers will need to adjust the technical process accordingly. In general,
Data Originators may be required to collect consent by applicable law when acting
as Data Controllers and by the relevant data processing agreements with Data
Controllers when acting as Data Processors. .  One or all of the
Data Subjects must initiate consent, giving the Data Originator the
right to record the conversation, which may be the Data Controller's
responsibility to identify.</t>
      <t><strong>Data Controller</strong>: An Entity or individual with decision-making
authority over data processing who determines the purposes and
methods of data processing, bears primary responsibility under
privacy laws and is the main target of most privacy and data
protection regulations. Under most data privacy laws, Data Controllers
are required to enter into data processing agreements with their Data Processors, detailing the rules for data collection and processing in accordance with applicable laws.</t>
      <t><strong>Data Processor</strong>: An individual or an Entity, which processes personal
data on behalf of the Data Controller. It is often a third-party service
provider who processes data on behalf of the data controller.  Under HIPAA
data processors are referred to as "business associates." Data processors
may be hired for specialized tasks or to improve efficiency; can subcontract
to other processors, creating a chain of responsibility; must operate within the
scope defined by the data controller; and are expected to maintain trust and adhere
to the controller's guidelines. A Conserver often calls out to Data Processors for
Transcription, Sentiment Analysis, Fraud Detection, email/text messaging.</t>
      <t><em>Processing</em>: Any operation or set of operations which is performed on personal data
or on sets of personal data. Among other things, this includes collection, storage,
use, disclosure, and deletion.</t>
      <t><em>Personal Data</em>: any information relating to an identified or identifiable Data Subject,
including a name, an identification number, location data, an online identifier or to
one or more factors specific to the physical, physiological, genetic, mental, economic,
cultural or social identity of the Data Subject.</t>
      <t><strong>Entity</strong>: A generic reference to companies, groups or individuals
that may share, alter, or use a vCon.  An Entity may be a Data
Originator, Data Controller, Data Processor or some other role that
has not yet been defined that participates in the possession and/or
processing of a vCon.</t>
      <t><strong>Party</strong>: A party, or participant of a vCon, as identified in the vCon draft.</t>
      <t><strong>SCITT Transparency Service</strong>: An append-only ledger for integrity protecting vCons, ensuring the state of a vCon is known at a point in time for conformance to governance and regulatory requirements.</t>
      <t><strong>vCon Registry</strong>: A storage service, capable of storing vCons, including rich metadata and larger attachments including audio and video recordings.</t>
    </section>
    <section anchor="vcon-lifecycle">
      <name>vCon Lifecycle</name>
      <section anchor="example-use-case-consent-management">
        <name>Example Use Case: Consent Management</name>
        <t>The example use case, consent management, has the following requirements, all considered necessary to fulfill the proper sharing of personal information responsibly:</t>
        <ul spacing="normal">
          <li>
            <t>As an individual, I wish to express my data subject rights to express my consent for various purposes, and to withdraw the same.</t>
          </li>
          <li>
            <t>As a member of an organization, I want to operationally assure that the processing of personal data is within the consent I gained from the data subject, and to safely record those activities to provide to both data subjects and governance bodies.</t>
          </li>
          <li>
            <t>As a regulator, I wish to have a measurement system to support compliance, bias and regulatory enforcement of policy.</t>
          </li>
          <li>
            <t>As a technologist, I wish to maintain the integrity of conversational pipelines, maintaining the trust both stakeholders and data subjects have in the trust and transparency of the process.</t>
          </li>
        </ul>
      </section>
      <section anchor="vcon-lifecycle-scope">
        <name>vCon Lifecycle Scope</name>
        <section anchor="creation-distribution-and-deletion">
          <name>Creation, Distribution and Deletion</name>
          <t>The vCon lifecycle comprises a series of phases from creation through distribution to deletion.
Tracking these phases enables fundamental privacy rights, such as the right to know how your
data was processed, and secures AI supply chains by establishing provenance and guaranteeing integrity.</t>
          <t>The phases of a vCon's life include:</t>
          <artwork><![CDATA[
+----------------+     +----------------+     +----------------+
| 1. vConCreated |---->| 2. Recording   |---->| 3. vConSent    |
|                |     |    Added       |     |                |
+----------------+     +----------------+     +----------------+
                                                      |
                                                      v
+----------------+     +----------------+     +----------------+
| 6. vConSentTo  |<----| 5. vConEnhanced|<----| 4. vConReceived|
|    Processors  |     |                |     |                |
+----------------+     +----------------+     +----------------+
        |
        v
+----------------+     +----------------+
| 7. Data        |---->| 8. vConDeletion|
|    Processing  |     |                |
+----------------+     +----------------+
]]></artwork>
          <ol spacing="normal" type="1"><li>
              <t><strong>vConCreated</strong>: The call completes, and a vCon is created with call metadata stored in the vCon Registry.</t>
            </li>
            <li>
              <t><strong>RecordingAdded</strong>: The actual recording is saved and added to the attachments section of the vCon.</t>
            </li>
            <li>
              <t><strong>vConSent</strong>: The Data Originator sends the vCon to the Data Controller with integrity protection using SCITT.</t>
            </li>
            <li>
              <t><strong>vConReceived</strong>: The Data Controller receives the vCon and records this in the SCITT Transparency Service.</t>
            </li>
            <li>
              <t><strong>vConEnhanced</strong>: The Data Controller adds transcription and license information and identifies themselves.</t>
            </li>
            <li>
              <t><strong>vConSentToProcessors</strong>: The Data Controller sends the vCon to relevant Data Processors.</t>
            </li>
            <li>
              <t><strong>Data Processing</strong>: Value-added services are performed on the vCon data.</t>
            </li>
            <li>
              <t><strong>vConDeletion</strong>: The vCon is deleted when no longer needed, when consent is revoked, or when it expires.</t>
            </li>
          </ol>
        </section>
        <section anchor="digital-rights-management">
          <name>Digital Rights Management</name>
          <t>Interwoven with the vCon lifecycle is consent management.  A modern
consent model is envisioned: consent is gathered by the Data
Controller (or the Data Originator acting as a data processor on behalf
of the Data Controller) for particular purposes (such as training or sharing) and
can be withdrawn by the Data Subject on demand.  This withdrawal may
result in revoking the vCon or modifying it to remove non-consenting
portions.</t>
          <artwork><![CDATA[
+------------------+     +------------------+     +------------------+
| 1. ConsentTo     |---->| 2. ConsentFor    |---->| 3. Consent       |
|    Record        |     |    Purpose       |     |    Recorded      |
+------------------+     +------------------+     +------------------+
                                                           |
                                                           v
+------------------+     +------------------+     +------------------+
| 6. RevokeRequest |<----| 5. ConsentReview |<----| 4. ConsentReceipt|
|    Processing    |     |    Revocation    |     |    Sent          |
+------------------+     +------------------+     +------------------+
]]></artwork>
          <t>Lifecycle events in Digital Rights Management include:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>ConsentToRecord</strong>: Consent is requested from the Data Subject to record the conversation.</t>
            </li>
            <li>
              <t><strong>ConsentForPurpose</strong>: Confirmation of consent for specific purposes (e.g., "sales followup") is obtained.</t>
            </li>
            <li>
              <t><strong>ConsentRecorded</strong>: The Data Controller records where consent was confirmed in the transcript or recording.</t>
            </li>
            <li>
              <t><strong>ConsentReceipt Sent</strong>: Notification is sent to Data Subject(s) with a link to review consent details.</t>
            </li>
            <li>
              <t><strong>ConsentReview/Revocation</strong>: Data Subject can review or choose to revoke consent at any time.</t>
            </li>
            <li>
              <t><strong>RevokeRequestProcessing</strong>: If consent is revoked, the request is processed and communicated to all parties.</t>
            </li>
          </ol>
        </section>
        <section anchor="amendment-of-existing-vcons">
          <name>Amendment of Existing vCons</name>
          <t>Under normal circumstances, vCons may be amended. For example, at creation time,
parties to a vCon may be verified through methods such as OAuth. However, if account
credentials are later found to be compromised, the verification status may need revision.
Party verification issues often trigger "Rights to Correct" requests and are fundamental
to responsible data rights management. Other enhancements and modifications may occur
for security reasons, future processing needs, or in response to regulatory changes.</t>
          <artwork><![CDATA[
+----------------+     +----------------+     +----------------+
| 1. DialogAdded |---->| 2. vConProcessed|---->| 3. Data       |
|                |     |                |     |    Redaction   |
+----------------+     +----------------+     +----------------+
]]></artwork>
          <t>Events that may be recorded on the distributed ledger include:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>DialogAdded</strong>: A dialog is saved and added to the vCon.</t>
            </li>
            <li>
              <t><strong>vConProcessed</strong>: The Data Controller processes the vCon.</t>
            </li>
            <li>
              <t><strong>Data Redaction</strong>: Data Processors delete the data or redact the Data Subject.</t>
            </li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="detailed-use-case">
      <name>Detailed Use Case</name>
      <section anchor="vcon-create-consent-and-share">
        <name>vCon Create, Consent and Share</name>
        <artwork><![CDATA[
    +-------------------+                      +-------------------+
    |  Data Originator  |                      |  Data Controller  |
    +---------+---------+                      +---------+---------+
              |                                          |
              | 1. Call Initiation                       |
              |-------->                                 |
              |                                          |
              | 2. Consent to Record                     |
              |-------->                                 |
              |                                          |
              | 3. Consent to Share                      |
              |-------->                                 |
              |                                          |
              | 4. vCon Created                          |
              |                                          |
              | 5. Recording Added                       |
              |                                          |
              | 6. vCon Sent                             |
              |----------------------------------------->|
              |                                          |
              |                                          | 7. vCon Received
              |                                          |
              |                                          | 8. vCon Enhanced
              |                                          |
              |                                          | 9. vCon Sent
              |                                          |-------->
              |                                          |
              |                                          |
    +---------v---------+                      +---------v---------+
    |  Data Originator  |                      |  Data Controller  |
    +-------------------+                      +-------------------+
                                                        |
                                                        v
                                               +-------------------+
                                               |  Data Processor   |
                                               +---------+---------+
                                                         |
                                                         | 10. vCon Received
                                                         |
                                                         | 11. Consent Recorded
                                                         |
                                                         | 12. vCon Enhanced
                                                         |
                                                         | 13. Consent Receipt
                                                         |    Sent
                                                         |
                                                         | 14. Consent Review
                                                         |
                                                         | 15. Value-Add
                                                         |    Services
                                                         |
                                               +---------v---------+
                                               |  Data Processor   |
                                               +-------------------+
]]></artwork>
        <section anchor="data-originator">
          <name>Data Originator</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Initiating Call</strong>: An initiating caller contacts a Data Subject to provide a service.</t>
            </li>
            <li>
              <t><strong>Consent to Record</strong>: The initiating caller requests consent to record the call for training purposes.</t>
            </li>
            <li>
              <t><strong>Consent to Share</strong>: The call completes, confirming consent for
the recording to be used for "sales followup", noting that the
Data Subject can review and revoke consent later. Depending on the types of personal
data communicated on the call and the purpose of its processing, the consent request
language may need to include additional information.</t>
            </li>
            <li>
              <t><strong>vCon Created</strong>: The call completes, the vCon is created, and call metadata is recordedin the vCon Registry.</t>
            </li>
            <li>
              <t><strong>Recording Added</strong>: The recording is saved to the vCon Registry, adding it to the vCon's attachments section.</t>
            </li>
            <li>
              <t><strong>vCon Sent</strong>: The Data Originator completes their responsibilities and sends the vCon to the Data Controller.</t>
            </li>
          </ol>
        </section>
        <section anchor="data-controller">
          <name>Data Controller</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>vCon Received</strong>: The vCon is received from the Data Originator, and a vcon_received operation is recorded in the SCITT Transparency Service.</t>
            </li>
            <li>
              <t><strong>vCon Enhanced with License and Data Controller</strong>: The Data Controller adds transcription, specifies the intended license, and identifies themselves as the Data Controller on the vCon.</t>
            </li>
            <li>
              <t><strong>vCon Sent</strong>: The Data Controller sends the vCon to the Data Processor(s).</t>
            </li>
          </ol>
        </section>
        <section anchor="data-processors">
          <name>Data Processor(s)</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>vCon Received</strong>: The Data Processor validates the vCon's SCITT receipt from the Data Controller.</t>
            </li>
            <li>
              <t><strong>Consent Recorded</strong>: The Data Processor records consent confirmation in the SCITT Transparency Service.</t>
            </li>
            <li>
              <t><strong>vCon Enhanced</strong>: Sentiment analysis and other enhancements are processed through the Data Processor's Conserver workflows.</t>
            </li>
            <li>
              <t><strong>Consent Receipt Sent</strong>: The Data Processor sends notification to the Data Subject(s) with a link to review consent details.</t>
            </li>
            <li>
              <t><strong>Consent Review</strong>: The Data Subject(s) can review vCon information at any time and revoke consent if desired.</t>
            </li>
            <li>
              <t><strong>Data Processor Value-Add</strong>: The Data Processor performs value-added services for the Data Subject(s).</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="revocation-and-the-right-to-be-forgotten">
        <name>Revocation and the Right to Be Forgotten</name>
        <t>At any point, a Data Subject can request revocation or the right to be forgotten, requiring all vCon possessors to act accordingly. vCons must be tracked for where they were sent and who to contact when a Data Subject makes such requests. The SCITT Transparency Service maintains metadata about ingested vCons, ensuring integrity and inclusion protection.</t>
        <artwork><![CDATA[
    +-------------------+                      +-------------------+
    |   Data Subject    |                      |  Data Controller  |
    +---------+---------+                      +---------+---------+
              |                                          |
              | 1. Revoke Consent                        |
              |-------->                                 |
              |                                          |
              | 2. Revoke Request Sent                   |
              |----------------------------------------->|
              |                                          |
              |                                          | 3. Act on Revocation
              |                                          |
              |                                          | 4. Send Request to
              |                                          |    All Processors
              |                                          |-------->
              |                                          |
    +---------v---------+                      +---------v---------+
    |   Data Subject    |                      |  Data Controller  |
    +-------------------+                      +-------------------+
                                                        |
                                                        v
                                               +-------------------+
                                               |  Data Processor   |
                                               +---------+---------+
                                                         |
                                                         | 5. Deletion of Data
                                                         |
                                               +---------v---------+
                                               |  Data Processor   |
                                               +-------------------+
]]></artwork>
        <section anchor="data-subject">
          <name>Data Subject</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Revoke Consent</strong>: The Data Subject revokes consent by some manner: i.e. clicks a link
included in all communications between the Data Processor and the Data Subject(s), through an external system or in
conversation with the data controller.</t>
            </li>
            <li>
              <t><strong>Revoke Request Sent</strong>: If the vcon_consent_revoked operation was handled by the Data Processor,
they MUST contact the Data Controller to communicate the Data Subject's intent.</t>
            </li>
          </ol>
        </section>
        <section anchor="data-controller-revocation">
          <name>Data Controller Revocation</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Act on Consent Revocation Request</strong>: The Data Controller receives the vCon Consent Revocation Request and records it on their SCITT Transparency Service.</t>
            </li>
            <li>
              <t><strong>Send Revocation Request to Data Controllers</strong>: If the vCon was sent to other Data
Processors, they must communicate the revocation request to any Data Processor that hasn't yet acknowledged it.</t>
            </li>
          </ol>
        </section>
        <section anchor="data-processor-revocation">
          <name>Data Processor Revocation</name>
          <ol spacing="normal" type="1"><li>
              <t><strong>Deletion of Data</strong>: Any Data Processor that hasn't yet acted on the request must acknowledge it.</t>
            </li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="vcon-lifecycle-events">
      <name>vCon Lifecycle Events</name>
      <t>The following events outline important "moments that matter" in a vCon's lifecycle.
These events are not intended to be stored within the vCon itself, but rather as operations
stored on SCITT to provide context for the vCon's intent at specific points in time:</t>
      <ul spacing="normal">
        <li>
          <t><strong>vcon_created</strong>: The initial vCon document as first recorded. The vCon may start with a basic structure defining minimal metadata, as recordings or attachments may be added asynchronously upon encoding completion.</t>
        </li>
        <li>
          <t><strong>vcon_enhanced</strong>: The vCon has been amended or appended. While vCons are considered immutable, information may be amended or appended—previous values exist in the vCon Registry but may be superseded. Amendments may include transcription corrections or consent changes.</t>
        </li>
        <li>
          <t><strong>vcon_sent</strong>: The vCon was sent to an external party. This operation seals the vCon's integrity, recording what was sent, to whom, and when in the SCITT Transparency Service. A SCITT receipt from the receiving service confirms possession.</t>
        </li>
        <li>
          <t><strong>vcon_received</strong>: The vCon was received from an external entity. This documents possession at a specific time, sealing content integrity and returning a SCITT receipt to the sender.</t>
        </li>
        <li>
          <t><strong>vcon_consent_accepted</strong>: One or more parties have consented to the vCon being recorded and shared for its intended purpose. Consent may not be established during initial vCon creation, as the Data Controller, not the Data Originator (infrastructure provider), is responsible for managing Data Subject consent.</t>
        </li>
        <li>
          <t><strong>vcon_consent_revoked</strong>: One or more parties have revoked consent for one or more purposes. Depending on region, license, and regulatory requirements, one revocation may or may not require all Data Processors to act.</t>
        </li>
        <li>
          <t><strong>vcon_party_redacted</strong>: A party to the vCon has been redacted. This differs from consent revocation, as the vCon may remain viable if a party's information can be redacted while maintaining integrity and usefulness.</t>
        </li>
        <li>
          <t><strong>vcon_deleted</strong>: The vCon has been deleted due to an implicit act such as revocation or no longer being needed. When a Data Controller deletes a vCon, they must inform all recipients to either delete it or assume Data Controller responsibilities.</t>
        </li>
        <li>
          <t><strong>vcon_expired</strong>: The vCon has expired due to license terms or compliance requirements. This triggers deletion and notification to all shared entities.</t>
        </li>
        <li>
          <t><strong>vcon_rcvr_purged</strong>: When a vCon is sent from a Data Controller, the receiving Entity may maintain it indefinitely, for a set period, or delete it upon operation completion. If the Entity no longer needs to maintain the vCon, they can delete it and notify the sender.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of the vCon lifecycle depends heavily on the integrity and availability of the SCITT
Transparency Service. Entities MUST ensure that their SCITT implementations are properly
secured and that access controls are in place to prevent unauthorized modifications.</t>
      <t>The handling of personally identifiable information (PII) throughout the vCon lifecycle
requires careful consideration of privacy regulations and data protection requirements.
Entities MUST implement appropriate technical and organizational measures to protect PII
and ensure compliance with applicable regulations.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This document describes a framework for managing vCons that contain personally identifiable
information. Implementers MUST ensure compliance with applicable privacy regulations,
including but not limited to GDPR <eref target="https://gdpr.eu/">GDPR</eref> and CCPA <eref target="https://oag.ca.gov/privacy/ccpa">CCPA</eref>.</t>
      <t>The framework provides mechanisms for consent management and data subject rights,
but implementers are responsible for ensuring that their implementations properly
respect and enforce these rights.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="references">
      <name>References</name>
      <section anchor="normative-references">
        <name>Normative References</name>
      </section>
      <section anchor="informative-references">
        <name>Informative References</name>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="GEOPRIV">
        <front>
          <title>A Presence-based GEOPRIV Location Object Format</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="December" year="2005"/>
          <abstract>
            <t>This document describes an object format for carrying geographical information on the Internet. This location object extends the Presence Information Data Format (PIDF), which was designed for communicating privacy-sensitive presence information and which has similar properties. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4119"/>
        <seriesInfo name="DOI" value="10.17487/RFC4119"/>
      </reference>
      <reference anchor="GZIP">
        <front>
          <title>GZIP file format specification version 4.3</title>
          <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
          <date month="May" year="1996"/>
          <abstract>
            <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1952"/>
        <seriesInfo name="DOI" value="10.17487/RFC1952"/>
      </reference>
      <reference anchor="HTTPS">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="IANA-COSE-ALG" target="&lt;https://www.iana.org/assignments/cose/cose.xhtml&gt;">
        <front>
          <title>COSE Algorithms</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="JSON">
        <front>
          <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
          <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
          <date month="December" year="2017"/>
          <abstract>
            <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
            <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="90"/>
        <seriesInfo name="RFC" value="8259"/>
        <seriesInfo name="DOI" value="10.17487/RFC8259"/>
      </reference>
      <reference anchor="JWS">
        <front>
          <title>JSON Web Signature (JWS)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7515"/>
        <seriesInfo name="DOI" value="10.17487/RFC7515"/>
      </reference>
      <reference anchor="JWE">
        <front>
          <title>JSON Web Encryption (JWE)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7516"/>
        <seriesInfo name="DOI" value="10.17487/RFC7516"/>
      </reference>
      <reference anchor="JWK">
        <front>
          <title>JSON Web Key (JWK)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7517"/>
        <seriesInfo name="DOI" value="10.17487/RFC7517"/>
      </reference>
      <reference anchor="MAILTO">
        <front>
          <title>The 'mailto' URI Scheme</title>
          <author fullname="M. Duerst" initials="M." surname="Duerst"/>
          <author fullname="L. Masinter" initials="L." surname="Masinter"/>
          <author fullname="J. Zawinski" initials="J." surname="Zawinski"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>This document defines the format of Uniform Resource Identifiers (URIs) to identify resources that are reached using Internet mail. It adds better internationalization and compatibility with Internationalized Resource Identifiers (IRIs; RFC 3987) to the previous syntax of 'mailto' URIs (RFC 2368). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6068"/>
        <seriesInfo name="DOI" value="10.17487/RFC6068"/>
      </reference>
      <reference anchor="MEDIATYPE">
        <front>
          <title>Media Type Specifications and Registration Procedures</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <author fullname="T. Hansen" initials="T." surname="Hansen"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="13"/>
        <seriesInfo name="RFC" value="6838"/>
        <seriesInfo name="DOI" value="10.17487/RFC6838"/>
      </reference>
      <reference anchor="MIME">
        <front>
          <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
          <date month="November" year="1996"/>
          <abstract>
            <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2045"/>
        <seriesInfo name="DOI" value="10.17487/RFC2045"/>
      </reference>
      <reference anchor="PASSporT">
        <front>
          <title>PASSporT: Personal Assertion Token</title>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8225"/>
        <seriesInfo name="DOI" value="10.17487/RFC8225"/>
      </reference>
      <reference anchor="PIDF-LO">
        <front>
          <title>GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations</title>
          <author fullname="J. Winterbottom" initials="J." surname="Winterbottom"/>
          <author fullname="M. Thomson" initials="M." surname="Thomson"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>The Presence Information Data Format Location Object (PIDF-LO) specification provides a flexible and versatile means to represent location information. There are, however, circumstances that arise when information needs to be constrained in how it is represented. In these circumstances, the range of options that need to be implemented are reduced. There is growing interest in being able to use location information contained in a PIDF-LO for routing applications. To allow successful interoperability between applications, location information needs to be normative and more tightly constrained than is currently specified in RFC 4119 (PIDF-LO). This document makes recommendations on how to constrain, represent, and interpret locations in a PIDF-LO. It further recommends a subset of Geography Markup Language (GML) 3.1.1 that is mandatory to implement by applications involved in location-based routing. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5491"/>
        <seriesInfo name="DOI" value="10.17487/RFC5491"/>
      </reference>
      <reference anchor="SMTP">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="TEL">
        <front>
          <title>The tel URI for Telephone Numbers</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <date month="December" year="2004"/>
          <abstract>
            <t>This document specifies the URI (Uniform Resource Identifier) scheme "tel". The "tel" URI describes resources identified by telephone numbers. This document obsoletes RFC 2806. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3966"/>
        <seriesInfo name="DOI" value="10.17487/RFC3966"/>
      </reference>
      <reference anchor="UUID">
        <front>
          <title>New UUID Formats</title>
          <author fullname="Brad Peabody" initials="B." surname="Peabody">
         </author>
          <author fullname="Kyzer R. Davis" initials="K. R." surname="Davis">
         </author>
          <date day="23" month="June" year="2022"/>
          <abstract>
            <t>   This document presents new Universally Unique Identifier (UUID)
   formats for use in modern applications and databases.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-peabody-dispatch-new-uuid-format-04"/>
      </reference>
      <reference anchor="CBOR">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="CDDL">
        <front>
          <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="C. Vigano" initials="C." surname="Vigano"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8610"/>
        <seriesInfo name="DOI" value="10.17487/RFC8610"/>
      </reference>
      <reference anchor="ISOBMFF" target="https://www.iso.org/standard/83102.html">
        <front>
          <title>Information technology -- Coding of audio-visual objects -- Part 12: ISO base media file format</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="January"/>
        </front>
        <refcontent>ISO/IEC 14496-12:2022</refcontent>
      </reference>
      <reference anchor="JMAP">
        <front>
          <title>The JSON Meta Application Protocol (JMAP)</title>
          <author fullname="N. Jenkins" initials="N." surname="Jenkins"/>
          <author fullname="C. Newman" initials="C." surname="Newman"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of- band binary data upload/download.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8620"/>
        <seriesInfo name="DOI" value="10.17487/RFC8620"/>
      </reference>
      <reference anchor="JWT">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="SHA-512">
        <front>
          <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
          <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
          <author fullname="T. Hansen" initials="T." surname="Hansen"/>
          <date month="May" year="2011"/>
          <abstract>
            <t>Federal Information Processing Standard, FIPS</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6234"/>
        <seriesInfo name="DOI" value="10.17487/RFC6234"/>
      </reference>
      <reference anchor="SIP-XFER">
        <front>
          <title>Session Initiation Protocol (SIP) Call Control - Transfer</title>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="A. Johnston" initials="A." role="editor" surname="Johnston"/>
          <author fullname="D. Petrie" initials="D." surname="Petrie"/>
          <date month="June" year="2009"/>
          <abstract>
            <t>This document describes providing Call Transfer capabilities in the Session Initiation Protocol (SIP). SIP extensions such as REFER and Replaces are used to provide a number of transfer services including blind transfer, consultative transfer, and attended transfer. This work is part of the SIP multiparty call control framework. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="149"/>
        <seriesInfo name="RFC" value="5589"/>
        <seriesInfo name="DOI" value="10.17487/RFC5589"/>
      </reference>
      <reference anchor="STIR-PASS">
        <front>
          <title>PASSporT Extension for Rich Call Data</title>
          <author fullname="Chris Wendt" initials="C." surname="Wendt">
            <organization>Somos Inc.</organization>
          </author>
          <author fullname="Jon Peterson" initials="J." surname="Peterson">
            <organization>Neustar Inc.</organization>
          </author>
          <date day="5" month="June" year="2023"/>
          <abstract>
            <t>   This document extends PASSporT, a token for conveying
   cryptographically-signed call information about personal
   communications, to include rich meta-data about a call and caller
   that can be signed and integrity protected, transmitted, and
   subsequently rendered to the called party.  This framework is
   intended to include and extend caller and call specific information
   beyond human-readable display name comparable to the "Caller ID"
   function common on the telephone network and is also enhanced with a
   integrity mechanism that is designed to protect the authoring and
   transport of this information for different authoritative use-cases.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-stir-passport-rcd-26"/>
      </reference>
      <reference anchor="vCard">
        <front>
          <title>jCard: The JSON Format for vCard</title>
          <author fullname="P. Kewisch" initials="P." surname="Kewisch"/>
          <date month="January" year="2014"/>
          <abstract>
            <t>This specification defines "jCard", a JSON format for vCard data. The vCard data format is a text format for representing and exchanging information about individuals and other entities, for example, telephone numbers, email addresses, structured names, and delivery addresses. JSON is a lightweight, text-based, language- independent data interchange format commonly used in Internet applications.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7095"/>
        <seriesInfo name="DOI" value="10.17487/RFC7095"/>
      </reference>
      <reference anchor="vCon-white-paper" target="https://github.com/vcon-dev/vcon/blob/main/docs/vCons_%20an%20Open%20Standard%20for%20Conversation%20Data.pdf">
        <front>
          <title>vCon: an Open Standard for Conversation Data</title>
          <author initials="T." surname="Howe" fullname="Thomas Howe">
            <organization>STROLID Inc.</organization>
          </author>
          <author initials="D." surname="Petrie" fullname="Daniel Petrie">
            <organization>SIPez LLC</organization>
          </author>
          <author initials="M." surname="Lieberman" fullname="Mitch Lieberman">
            <organization>Conversational X</organization>
          </author>
          <author initials="A." surname="Quayle" fullname="Alan Quayle">
            <organization>TADHack and TADSummit</organization>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CDR" target="https://www.itu.int/rec/T-REC-Q.825">
        <front>
          <title>Recommendation Q.825: Specification of TMN applications at the Q3 interface: Call detail recording</title>
          <author>
            <organization>ITU</organization>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 685?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Thank you to Allistair Woodman for connecting the first dots between VCon and SCITT</t>
        </li>
        <li>
          <t>Thank you to Jeff Pulver and Cody Launius for their collaboration and support</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
