<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.16 -->
<?rfc toc="yes"?>
<?rfc tocdepth="3"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lukianets-open-ethics-transparency-protocol-00" category="exp" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="3" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.11.1 -->
  <front>
    <title abbrev="OETP">Open Ethics Transparency Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-lukianets-open-ethics-transparency-protocol-00"/>
    <author initials="N." surname="Lukianets" fullname="Nikita Lukainets">
      <organization>Open Ethics</organization>
      <address>
        <email>n.lukianets@openethics.ai</email>
      </address>
    </author>
    <date year="2021" month="November" day="24"/>
    <area>General</area>
    <workgroup>dispatch</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT Products and their Components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Format is an extensible JSON-based format.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The Open Ethics Transparency Protocol (OETP or Protocol) describes the creation and exchange of voluntary ethics Disclosures for IT products. It is brought as a solution to increase the transparency of how IT products are built and deployed. This document provides details on how disclosures for data collection and data processing practice are formed, stored, validated, and exchanged in a standardized and open format.</t>
      <t>OETP provides facilities for:</t>
      <ul spacing="normal">
        <li>
          <strong>Informed consumer choices</strong> : End-users able to make informed choices based on their own ethical preferences and product disclosure.</li>
        <li>
          <strong>Industrial-scale monitoring</strong> : Discovery of best and worst practices within market verticals, technology stacks, and product value offerings.</li>
        <li>
          <strong>Legally-agnostic guidelines</strong> : Suggestions for developers and product-owners, formulated in factual language, which are legally-agnostic and could be easily transformed into product requirements and safeguards.</li>
        <li>
          <strong>Iterative improvement</strong> : Digital products, specifically, the ones powered by artificial intelligence could receive nearly real-time feedback on how their performance and ethical posture could be improved to cover security, privacy, diversity, fairness, power balance, non-discrimination, and other requirements.</li>
        <li>
          <strong>Labeling and certification</strong> : Mapping to existing and future regulatory initiatives and standards.</li>
      </ul>
      <t>The Open Ethics Transparency Protocol (OETP) is an application-level protocol for publishing and accessing ethical Disclosures of IT products and their components. The Protocol is based on HTTP exchange of information about the ethical "postures", provided in an open and standardized format. The scope of the Protocol covers Disclosures for systems such as Software as a Service (SaaS) Applications, Software Applications, Software Components, Application Programming Interfaces (API), Automated Decision-Making (ADM) systems, and systems using Artificial Intelligence (AI). OETP aims to bring more transparent, predictable, and safe environments for the end-users. The OETP Disclosure Format is an extensible JSON-based format.</t>
    </section>
    <section anchor="requirement-levels" numbered="true" toc="default">
      <name>Requirement Levels</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <dl>
        <dt>
Disclosure:  </dt>
        <dd>
          <t>Disclosure (Ethics Disclosure, or self-disclosure) is application-specific information about the data collection, data-processing, and decision-making practices of a Product, provided by the Product Vendor (an individual developer or an organization).</t>
        </dd>
        <dt>
Disclosure Feed:  </dt>
        <dd>
          <t>A historical sequence of Disclosures, made for a specific Product.</t>
        </dd>
        <dt>
Vendor:  </dt>
        <dd>
          <t>A legal person (an individual developer or an organization) that owns one or several end-user Products, or acts as a Supplier and provides Components for other Vendors.</t>
        </dd>
        <dt>
Integrator:  </dt>
        <dd>
          <t>A legal person (an individual developer or an organization) that deploys technology-powered services to the end-users based on Product(s) from third-party Vendors.</t>
        </dd>
        <dt>
Product:  </dt>
        <dd>
          <t>An IT system in the form of software, software as a service system, application, software component, application programming interface, or a physically embodied automated decision-making agent.</t>
        </dd>
        <dt>
Component:  </dt>
        <dd>
          <t>An IT system supplied by Vendor and integrated/embedded into end-user Products. Components themselves do not necessarily interface with end-users.</t>
        </dd>
        <dt>
Upstream Component:  </dt>
        <dd>
          <t>A Component that sends its outputs to the Product Downstream in the data processing chain. Disclosure for the Upstream Component is represented as a Child relative to the Disclosure node of the Downstream Product.</t>
        </dd>
        <dt>
Downstream Component:  </dt>
        <dd>
          <t>A Component that receives inputs from the Components Upstream in the data processing chain. Disclosure for the Downstream Component is represented as a Parent relative to the Disclosure node of the Upstream Component.</t>
        </dd>
        <dt>
Automated Decision-Making (ADM):  </dt>
        <dd>
          <t>Automated decision-making is the process of making a decision by automated means without any human involvement. These decisions can be based on factual data, as well as on digitally created profiles or inferred data.</t>
        </dd>
        <dt>
OETP Disclosure Format:  </dt>
        <dd>
          <t>A machine-readable Disclosure with predefined structure, supplied in the JSON format.</t>
        </dd>
        <dt>
Validation:  </dt>
        <dd>
          <t>A sequence of automated software-based checks to control validity and security elements in the OETP Disclosure.</t>
        </dd>
        <dt>
Auditor:  </dt>
        <dd>
          <t>A third-party legal person trusted to perform Verification checks and to issue Verification Proofs.</t>
        </dd>
        <dt>
Auditing software:  </dt>
        <dd>
          <t>An automated software-based tool authorized to perform Verification checks and to issue Verification Proofs.</t>
        </dd>
        <dt>
Verification:  </dt>
        <dd>
          <t>A procedure to control the correspondence of the elements in the OETP Disclosure and the actual data processing and data collection practices of the Vendors.</t>
        </dd>
        <dt>
Verification Proof:  </dt>
        <dd>
          <t>A result of the formal Disclosure Verification procedure presented to a requestor.</t>
        </dd>
        <dt>
Chaining:  </dt>
        <dd>
          <t>A process of combining Disclosures of individual Components into a composite high-level Disclosure for a Product.</t>
        </dd>
        <dt>
Label:  </dt>
        <dd>
          <t>User-facing graphical illustrations and textual descriptions of the Product that facilitate understanding of the values and risks the Product carries.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocol-model" numbered="true" toc="default">
      <name>Protocol Model</name>
      <t>The Disclosure creation and delivery consist of the two parts, starting from (I) the submission of the Disclosure form, chaining of the Suppliers' Disclosures, Signature of the disclosed information, and to the delivery part (II) that first checks that the Disclosure is Valid, and then that the information specified in it is Verified by the third-parties. <xref target="_figure-disclosure-creation" format="default"/> shows disclosure creation steps.</t>
      <!-- <img src="../diagrams/images/disclosure-creation/disclosure-creation.svg" alt="Creation of the Disclosure"> -->

<section anchor="creation-of-disclosure" numbered="true" toc="default">
        <name>Creation of Disclosure</name>
        <t>The initial Disclosure is created by filling a standardized disclosure form (for example, see 1. <eref target="https://openethics.ai/label/">https://openethics.ai/label/</eref>). A Vendor representative, a Product Owner, or a Developer, <bcp14>MUST</bcp14> submit data-processing and data-collection information about the Product. The information about the end-point URL, as well as a contact email address, <bcp14>MUST</bcp14> be specified. Disclosure <bcp14>MAY</bcp14> also be created in a fully automated way as a part of the CI/CD DevOps pipeline. <xref target="_figure-disclosure-submission-basic" format="default"/> shows basic disclosure submission process.</t>
        <!-- <img src="../diagrams/images/disclosure-submission-basic/disclosure-submission-basic.svg" alt="Basic Disclosure Submission"> -->

<section anchor="cryptographic-signature" numbered="true" toc="default">
          <name>Cryptographic Signature</name>
          <t>The Disclosure is organized into a predefined data schema and <bcp14>MUST</bcp14> be cryptographically signed by the Signature Generator (Open Ethics or federated providers) using standard SHA3-512 hash implementation. The integrity hash <bcp14>MUST</bcp14> be appended to a disclosure as the <tt>OETP.schema.integrity</tt> element.</t>
        </section>
        <section anchor="immutable-storage" numbered="true" toc="default">
          <name>Immutable Storage</name>
          <t>Both the signature integrity hash and the Disclosure <bcp14>SHOULD</bcp14> be stored in the log-centric root database and <bcp14>MAY</bcp14> be mirrored by other distributed databases for redundancy and safety.</t>
        </section>
        <section anchor="visual-labeling" numbered="true" toc="default">
          <name>Visual Labeling</name>
          <t>Open Ethics Label <bcp14>SHOULD</bcp14> be automatically generated by mirroring the submitted Disclosure into a set of graphical icons and simple human-readable descriptions. Additional Labels <bcp14>MAY</bcp14> be generated following successful third-party Verification and by mapping the regulatory requirements to Verified Disclosures.</t>
        </section>
      </section>
      <section anchor="access-to-disclosure" numbered="true" toc="default">
        <name>Access to Disclosure</name>
        <section anchor="initial-request-to-a-disclosure-file" numbered="true" toc="default">
          <name>Initial Request to a Disclosure file</name>
          <t>The most recent OETP file <bcp14>SHOULD</bcp14> be stored in the root of the Product's specified end-point URL, allowing requests to the OETP file from third-party domains. When establishing a Vendor relationship, the Integrator or a downstream Vendor <bcp14>MAY</bcp14> examine the Disclosure for their Components using the following HTTP request: <tt>GET https://testexample.com/oetp.json</tt>, where <em>testexample.com</em> is the URL of the Supplier's end-point.</t>
        </section>
        <section anchor="access-to-visual-trust-labels" numbered="true" toc="default">
          <name>Access to Visual Trust Labels</name>
          <t>A Vendor <bcp14>SHOULD</bcp14> place a visual Label generated as a result of the Disclosure process in the Product informational materials (for example Marketing Materials, User Guides, Safety Instructions, Privacy Policy, Terms of Service, etc). The Label reflects the content of the Disclosure and <bcp14>SHOULD</bcp14> be displayed in any digital media by embedding a software widget. Visual labels in the print media <bcp14>SHOULD</bcp14> carry a visually distinguishable Integrity signature to enable manual Validation by the User.</t>
        </section>
        <section anchor="requirements-for-placement-of-integrity-signature-in-visual-label" numbered="true" toc="default">
          <name>Requirements for placement of Integrity Signature in Visual Label</name>
          <ul spacing="normal">
            <li>
              <strong>Labels in the online digital media</strong> <bcp14>MUST</bcp14> be generated automatically based on the content of the Disclosure and <bcp14>MUST</bcp14> contain a URL allowing to check the complete Integrity hash and explore more detailed information about the Disclosure.</li>
            <li>
              <strong>Labels in the offline media</strong> <bcp14>MUST</bcp14> be generated automatically based on the content of the Disclosure and should carry the first 10 digits of the corresponding Integrity hash.</li>
          </ul>
        </section>
        <section anchor="conformity-assessment-marks" numbered="true" toc="default">
          <name>Conformity assessment marks</name>
          <t>Based on the Verification performed for the OETP Disclosure file, the labels <bcp14>MAY</bcp14> include Conformity assessment marks, Certification marks, as well as marks showing adherence to certain standards. These marks <bcp14>MAY</bcp14> be generated and displayed automatically based on the Verification Proofs.</t>
        </section>
        <section anchor="accessibility-considerations" numbered="true" toc="default">
          <name>Accessibility considerations</name>
          <t>Accessibility of the Labels for the visually impaired Users <bcp14>SHOULD</bcp14> be considered. The OETP Processing system <bcp14>MUST</bcp14> provide alternative forms of the Label so that text-to-speech tools could be used to narrate the Label.</t>
        </section>
      </section>
      <section anchor="verification-and-validation-of-disclosure" numbered="true" toc="default">
        <name>Verification and Validation of Disclosure</name>
        <section anchor="automated-disclosure-processing" numbered="true" toc="default">
          <name>Automated Disclosure processing</name>
          <t>The automated Disclosure processing is enabled by requests to both the Open Ethics Disclosure database powered by Disclosure Identity Providers and the Product's OETP Disclosure file.</t>
        </section>
        <section anchor="validation-of-vendor39s-disclosures" numbered="true" toc="default">
          <name>Validation of Vendor's Disclosures</name>
          <t>The OETP Processing system <bcp14>MUST</bcp14> compare integrity hashes in the Open Ethics Disclosure database and entries that arrive as a result of the Disclosure Request response.</t>
        </section>
        <section anchor="verification-of-vendor39s-disclosures" numbered="true" toc="default">
          <name>Verification of Vendor's Disclosures</name>
          <t>Every disclosure <bcp14>SHOULD</bcp14> be checked for the existence of the external Verification from Auditors for the entire Disclosures or one of Disclosure elements.</t>
        </section>
        <section anchor="progressive-verification" numbered="true" toc="default">
          <name>Progressive Verification</name>
          <t>To raise a level of trust to a Disclosure, a Vendor <bcp14>MAY</bcp14> decide to opt-in for a third-party Disclosure Verification. OETP suggests a Progressive Verification scheme where multiple independent external Verification Proofs COULD be issued by third parties to confirm the information specified in the Disclosure.</t>
          <t>The Progressive Verification applies to a whole Disclosure, or to specific elements of the Disclosure.</t>
          <t><xref target="_figure-disclosure-progressive-verification" format="default"/> displays a general scheme for Disclosure requests and responses.</t>
          <!-- <img src="../diagrams/images/disclosure-progressive-verification/disclosure-progressive-verification.svg" style="float: left; margin-right: 10px;" alt="Progressive Verification Scheme for Disclosures" /> -->

<t>The following elements <bcp14>MAY</bcp14> serve as sources for various kinds of Verification proofs:
* Qualified Auditor reports
* Qualified Vendor of Auditing software tests
* Certification Authority assessments
* Conformity assessments
* User Feedback
* Market Brokers
* Real-time Loggers</t>
        </section>
      </section>
      <section anchor="end-to-end-transparency-and-formation-of-the-composite-disclosure" numbered="true" toc="default">
        <name>End-to-end transparency and formation of the composite Disclosure</name>
        <t>IT industry is getting more mature with Vendors becoming more specialized. Surface-level transparency is not sufficient as supply chains are becoming more complex and distributed across various Components. The following steps <bcp14>MUST</bcp14> be satisfied for the end-to-end transparency:</t>
        <section anchor="open-supplier-policy" numbered="true" toc="default">
          <name>Open Supplier Policy</name>
          <t>Every Integrator or a Vendor <bcp14>SHOULD</bcp14> disclose the information about their Suppliers (sub-processing Vendors), indicating the scope of the data processing in the Components they provide.</t>
          <t>If the Supplier information is not provided, Disclosure <bcp14>SHOULD</bcp14> contain information that a Vendor (Integrator) has not provided Supplier information.</t>
          <section anchor="first-party-components" numbered="true" toc="default">
            <name>First-party Components</name>
            <t>For greater transparency, Vendors may decide to reveal Components even if they originate from themselves (first-party Components). For the first-party Component, the Supplier identity information <bcp14>SHOULD NOT</bcp14> be provided because it was already disclosed earlier.</t>
            <t>Required: (<xref target="component-information" format="default"/>) only</t>
          </section>
          <section anchor="third-party-components" numbered="true" toc="default">
            <name>Third-party Components</name>
            <t>When disclosing Components originating from the third-party Vendors <bcp14>SHOULD</bcp14> provide both the Supplier identity information and Component information</t>
            <t>Required: (<xref target="supplier-identity" format="default"/>, <xref target="component-information" format="default"/>)</t>
          </section>
          <section anchor="elements-of-supplier-disclosure" numbered="true" toc="default">
            <name>Elements of Supplier disclosure</name>
            <section anchor="supplier-identity" numbered="true" toc="default">
              <name>Supplier identity</name>
              <ul spacing="normal">
                <li>Vendor Name</li>
                <li>Vendor URL</li>
                <li>Vendor ID</li>
                <li>Vendor DPO Contact Email</li>
              </ul>
            </section>
            <section anchor="component-information" numbered="true" toc="default">
              <name>Component information</name>
              <ul spacing="normal">
                <li>Component Scope of use</li>
                <li>Personal Data Being Processed by Component</li>
                <li>Is a Safety Component (YES)/(NO)</li>
                <li>Component URL (if different from the Vendor URL)</li>
                <li>Component Disclosure URL (if different from the default <tt>Component URL/oetp.json</tt>)</li>
                <li>Component DPO Contact (if different from Vendor DPO Contact Email)</li>
              </ul>
            </section>
          </section>
        </section>
        <section anchor="request-for-supplier39s-disclosures" numbered="true" toc="default">
          <name>Request for Supplier's Disclosures</name>
          <t>The OETP Processing system <bcp14>MUST</bcp14> send GET requests to the URLs of each Component to obtain their Disclosures. Based on the response to each Disclosure request, the OETP Processing system <bcp14>MUST</bcp14> specify which Components have Disclosures and which don't have Disclosures.</t>
          <t><xref target="_figure-disclosure-chaining-request" format="default"/> shows the process of how Disclosure Chaining requests and responses happen.</t>
          <!-- <img src="../diagrams/images/disclosure-chaining-request/disclosure-chaining-request.svg" alt="Disclosure Chaining: Request-Response"> -->

</section>
        <section anchor="disclosure-chaining" numbered="true" toc="default">
          <name>Disclosure Chaining</name>
          <t>The same Request-response operation applies recursively for Components of the Components, and for the Components of the Components of the Components, etc. It is proposed to view the supply chain as a tree-like hierarchical data structure, where the information about Components is assembled using Level Order Tree Traversal algorithm.</t>
          <t>In this tree:
* Node is a structure that contains Component's Disclosure;
* Root is the top Node representing a Product's Disclosure information;
* Edge is the connection between one Node and another, representing the scope of the Data Processing by the Component.</t>
          <t><xref target="_figure-disclosure-chaining-tree" format="default"/> displays the order of the Disclosure Chaining with Level Order Tree Traversal algorithm.</t>
          <!-- <img src="../diagrams/images/disclosure-chaining-tree/disclosure-chaining-tree.svg" alt="Disclosure Chaining: Level Order Traversal"> -->

</section>
        <section anchor="generation-of-the-composite-disclosure" numbered="true" toc="default">
          <name>Generation of the Composite Disclosure</name>
          <t>The current consensus from the user &amp; developer community suggests that Composite Disclosure should follow The "Weakest Link" model. According to this model, the risk that the Product is carrying should not be considered any less than the risk for each of the Components.</t>
          <t>Formally this approach could be illustrated with the use of a conjunction table for risk modeling (see <xref target="conjunction-table-risk-modeling" format="default"/>). The Truth Table for Logical AND operator below takes one risk factor and evaluates risk outcomes as High (H) or Low (L) for hypothetical Disclosure options of the Product(P) and its Component(C).</t>
          <table anchor="conjunction-table-risk-modeling" align="center">
            <name>Conjunction Table for Risk Modeling</name>
            <thead>
              <tr>
                <th align="center">Disclosed risk of P</th>
                <th align="center">Disclosed risk of  C</th>
                <th align="center">Composite P &amp; C</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">L</td>
                <td align="center">L</td>
                <td align="center">
                  <strong>L</strong></td>
              </tr>
              <tr>
                <td align="center">L</td>
                <td align="center">H</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
              <tr>
                <td align="center">H</td>
                <td align="center">L</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
              <tr>
                <td align="center">H</td>
                <td align="center">H</td>
                <td align="center">
                  <strong>H</strong></td>
              </tr>
            </tbody>
          </table>
          <t>Further evaluation of this approach is required.</t>
        </section>
      </section>
    </section>
    <section anchor="example-oetp-disclosure-file" numbered="true" toc="default">
      <name>Example OETP Disclosure File</name>
      <figure anchor="_figure-example-oetp-json">
        <name>Example OETP Disclosure File</name>
        <sourcecode type="JSON"><![CDATA[
{
    "schema": {
        "name": "Open Ethics Transparency Protocol",
        "version": "0.9.3 RFC",
        "integrity": "156d624b8f2dbea87128a2147f255842652475c5dc595c79f64c90c7ff486d59007c3e18c993e3163395812e26b70ea70dfc413f7ca128869d115f12e5699bf2"
    },
    "snapshot": {
        "product": {
            "url": "testexample.com",
            "description": ""
        },
        "timestamp": 1608273946,
        "generator": {
            "name": "Open Ethics",
            "alias": "oe",
            "type": "root",
            "website": "https://openethics.ai"
        },
        "label": {
            "data": {
                "type": "open",
                "practice": ""
            },
            "source": {
                "type": "open",
                "practice": ""
            },
            "decision": {
                "type": "restricted",
                "practice": ""
            }
        }
    }
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="response-content" numbered="true" toc="default">
        <name>Response content</name>
        <t>OETP exchanges data using JSON <xref target="RFC7159" format="default"/> which is a lightweight data-interchange format. A JSON-based application can be attacked in multiple ways such as sending data in an improper format or embedding attack vectors in the data. It is important for any application using JSON format to validate the inputs before being processed. To mitigate this attack type, the JSON Key Profile is provided for OETP responses.</t>
      </section>
      <section anchor="spoofing" numbered="true" toc="default">
        <name>Spoofing</name>
        <t>OETP Processors should be aware of the potential for spoofing attacks where the attacker publishes an OETP disclosure with the <tt>OETP.snapshot</tt> value from another product, or, perhaps with an outdated <tt>OETP.snapshot.label</tt> element. For example, an OETP Processor could suppress the display of falsified entries by comparing the snapshot integrity from the submission database and a calculated hash for the <tt>OETP.snapshot</tt> object. In that situation, the OETP Processor might also take steps to determine whether the disclosures originated from the same publisher require further investigation of the Disclosure Feed and alert the downstream OETP Processors.</t>
      </section>
      <section anchor="falsification" numbered="true" toc="default">
        <name>Falsification</name>
        <t>Dishonest or falsified Disclosures is a problem that is hard to address generally. The approach to it is public control and systematic checks. Vendors or user-facing applications and services could further raise the level of trust in their Disclosures by implementing programmatic control scoring mechanisms, as well as the external verification by trusted Auditors.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="areas-for-future-study" numbered="true" toc="default">
      <name>Areas for Future Study</name>
      <t>The following topics not addressed in this version of document are possible areas for the future study:</t>
      <ul spacing="normal">
        <li>IANA requests for the Data Processor identity management.</li>
        <li>Extensibility of the OETP Disclosure Format.</li>
        <li>Evaluate other methods of Generation of the Composite Disclosure based on the Disclosure Tree</li>
        <li>Disclosure Chaining mechanisms and various use-cases.</li>
        <li>Typical scenarios and templates for Disclosure submissions.</li>
        <li>Mapping of the regulatory requirements and future Disclosure elements.</li>
        <li>Standardizing Privacy Disclosure and PII data-collection practices.</li>
        <li>Enhancing Label accessibility with ARIA W3C Recommendation and other approaches</li>
        <li>Use of the OETP Disclosure in the ADM explainability (XAI).</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
      </references>
    </references>
    <section anchor="appendix" numbered="true" toc="default">
      <name>Appendix</name>
      <section anchor="figures" numbered="true" toc="default">
        <name>Figures</name>
        <t>Diagrams could be built from code using below <tt>*.puml</tt> files automatically using <eref target="https://plantuml.com/">PlantUML</eref>.</t>
        <section anchor="creation-of-disclosure-1" numbered="true" toc="default">
          <name>Creation of Disclosure</name>
          <figure anchor="_figure-disclosure-creation">
            <name>Creation of the Disclosure</name>
            <sourcecode type="PUML"><![CDATA[
@startuml

title Disclosure Creation Process

skinparam roundCorner 15

actor "Supplier A" as SA
actor "Supplier B" as SB
actor Vendor as V

component "Component A" as CA
component "Component B" as CB
file "Disclosure A" as DA
file "Disclosure B" as DB
file "Composite Disclosure" as D

V-right->(Creation):disclose
SA-up->CA
SB-up->CB
CA-up->DA
CB-up->DB
DA-up->(Chaining)
DB-up->(Chaining)
(Creation)->(Chaining)
(Chaining)->(Validation)
(Validation)->(Verification)
(Verification)->D
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="basic-disclosure-submission" numbered="true" toc="default">
          <name>Basic Disclosure Submission</name>
          <figure anchor="_figure-disclosure-submission-basic">
            <name>Basic Disclosure Submission</name>
            <sourcecode type="PUML"><![CDATA[
@startuml
title Basic Disclosure Submission

skinparam roundCorner 15
autonumber

actor Vendor
database "Disclosure Identity Provider" as ID
control "Signature Generator" as SIG
database "Federated Identity Provider" as DIS

Vendor -> ID: Request with Disclosure payload
ID -> ID: Validate input
ID -> SIG: Structured Data, Initialized

ID <-- SIG: SHA3-512 integrity hash
    group Distributed Identity Storage
DIS <-- SIG: SHA3-512 integrity hash
end
ID -> ID: Log OETP file and a corresponding intgrity hash
Vendor <-- ID: OETP Disclosure File
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="progressive-verification-scheme-for-disclosures" numbered="true" toc="default">
          <name>Progressive Verification Scheme for Disclosures</name>
          <figure anchor="_figure-disclosure-progressive-verification">
            <name>Progressive Verification Scheme for Disclosures</name>
            <sourcecode type="PUML"><![CDATA[
@startuml

title Progressive Verification with multiple Auditors

skinparam roundCorner 15
autonumber
actor User
User -> Vendor: Disclosure Request
User <-- Vendor: OETP Disclosure File

database "Disclosure Identity Provider" as ID

User -> ID: Disclosure Validation and Verification Request

group Progressive Disclosure Verification
    ID -> ID: Retrieve and Compare Disclosure Integrity
    ID -> "Auditor 1": Disclosure Verification Request
    ID <-- "Auditor 1": Verification Proof 1
    ID -> "Auditor N": Disclosure Verification Request
    ID <-- "Auditor N": Verification Proof N
end

User <-- ID: Verification response

User -> Vendor: Service Request
User <-- Vendor: Service Response
@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="disclosure-chaining-request-response" numbered="true" toc="default">
          <name>Disclosure Chaining: Request-Response</name>
          <figure anchor="_figure-disclosure-chaining-request">
            <name>Disclosure Chaining: Request-Response</name>
            <sourcecode type="PUML"><![CDATA[
@startuml
title Disclosure Chaining: Request-Response


start
repeat
  :Request Component's Disclosure;
    if (Disclosure Obtained?) then (yes)
      :Validate Disclosure;
      :Verify Disclosure;
      :Chain Disclosure;
      :Obtain list of Child Components;
      if (Supplier information exists?) then (yes)
        :Update Tree with (yet)
        Unchained Disclosures;
      else (no)
        #Gold:**Alert** "Vendor has not provided
        Supplier information";
      endif
    else (no)
      #pink:**Alert** "Vendor has not provided
      any Disclosure";
      stop
    endif
repeat while (Unchained Disclosures in the Disclosure Tree?) is (yes) not (no)
:**Generate**
Composite Disclosure;
#palegreen:**Display** Label for "Composite Disclosure";
stop

@enduml
]]></sourcecode>
          </figure>
        </section>
        <section anchor="disclosure-chaining-level-order-traversal" numbered="true" toc="default">
          <name>Disclosure Chaining: Level Order Traversal</name>
          <figure anchor="_figure-disclosure-chaining-tree">
            <name>Disclosure Chaining: Level Order Traversal</name>
            <sourcecode type="PUML"><![CDATA[
@startmindmap
title Disclosure Chaining: Level Order Traversal

skinparam roundCorner 15
* Root (Product)
        * 1 (Component)
                * 3 (Component)
                        * 7 (Component)
                * 4 (Component)
        * 2 (Component)
                * 5 (Component)
                        * 8 (Component)
                        * 9 (Component)
                * 6 (Component)
@endmindmap
]]></sourcecode>
          </figure>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>Part of this work related to Verification and Validation of Disclosure and Disclosure Chaining was supported by the H2020 Programme of the European Commission under Article 15 of Grant Agreement No. 951972 StandICT.eu 2023</t>
      <t>The Open Ethics community and expert volunteers contributed with their valuable feedback, discussions, and comments. Thank you Ashley Duque Kienzle, Angela Kim, Ioannis Zempekakis, Karl Muedespacher, Ida Varosanec, Claudia Del Pozo, Joerg Buss, Mariia Kriuchok, Minhaaj Rehman, Oleksii Molchanovskyi, Roberta Barone, Phil Volkofsky and others.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAO//nWEAA+1dW3PbyJV+V5X+Q4euylAqktbFsi3OJaEleayMJCuWPNls
KhU3gSbZIxBg0IBkjuP8lt3/sU+7tf9rz6W70QBBSZ7Kbu1D5iEWgb6cPn36
nO9cGun3+5sbhS4SNRSdtwuVipNipiMjrnOZmoXMVRotxWWeFVmUJZ3NDTke
5+oWG59cX8LvOItSOYfecS4nRT8pb7RMVWH6GQzWVzRYvwgG6y/sYP2dnc2N
SBZqmuXLoVAfF5sbmxt6kQ9FkZem2NvZOdzZgxlzJYfie5WqXCabG3dZfjPN
s3IBU2oYtIhmmxs3agnP46E4TQuVw/z9YyQHBzSFTOO/yCRLgcilMvBkLvPi
L38ts0KZoUizzY2FHm5uCPgPCLON7K9YLYrZUOzzA5PlRa4mJmhjlvPgCVBb
FrMsx+H63ECn8PJiIM4cZ/gxM+1C3+hC4jupq3dZPpWp/lkWOkuHItgVfq3m
UidA+MAz+7fIbOb1QGokI83yOfS/VUNiajqp/e73+0KODWxLRDy6ninx4OaL
Lm75ltBGyFTIxSLREZHYT9StSoTbVwFziUU5TrSZ6XQKjWMho0gZg7+ISpmI
Y22iJDNlrozIJuL0GueJy6gw1KGYKZ2Lo2y+gH1LCzMQSKMnBWgYS6NikaXi
zfX1JUhPNJPpVOFYfrXwUo6zssDR/MS/xo3/epGZAufmXz0k/lbHMKBOcXXI
T6KDpEfmsf4Z3vGwTIqJoA3OVoR0Rdmtyk1tccgNszSFmhthymgmpBFX2aS4
A/bi31JcqfxWR0p0r6S82hKjirOmVzVd87hiUS9sgiRNczmfI8/pUEwkbIHo
ji5Pt6BlWWSwFFjTsYq0wU08lzfYtjs6Pt9yBPeYB5b6kjZwlBd6oiMNrMRx
k0RPQUyA+tHp1kCgiAipoXWRiXGOHeYZkFlpgAKZrWIdFXKcKDuDnMAGpbc6
z9I5roW4RruWxv3SAE+Z6zR8xV3xmnbEiqT6WKjUaBhV/O7q7UWfJcRumhP7
uY7jROGvJ0g/yxys/wuPAZxR/2RLxMpEuR4Df5HmCBQWCx8sLRTM2ywp00Lm
SxbGVTmBU7Cwp2AgTmldY1B101nBkmJgABoZmKtTnMcomjJUsDjTLLsLBxMo
KeNSJwXRBEotyZYqRp7CFKDCS+S6OwTwRBWgYgyeLhwpbpAZS9BZsPBERX6d
9AwGcOd8gboFpRqnxj1QcQ9OE8gC/HsrEx2j+PVqPOLTVz9z+J5OY7CPtAGe
WBBsnehCM3Gk37bF9vZpyrMCoamB9eUimmVAkNneFkNx4uRKoBQiP+fyRlnV
gZ24baVlWCFld6lXJCDFE4UcV6yyLLMDbg0cJTGYsxxOTN9ARwUnItXACWAT
0YJSgHqDdg6EiDcJ7JkpPBuNuNMwbwpk5jeqENC8QCrgiBYqmqVZkk2XyLno
xp5aRw7wukTpA1phQmNpOlNTmSTLvpymoAl1JKYlMDMBI8T8uSqnU6AElQ1v
Oap42Ie8ttY+8AMe9WhzyoQUCtAIO1KUwKEENrWUUzjkd8CyGYlC0pwYh4uy
Molh6QIEWidLFme7EzqFzXGLydVfS50r1hFOc8AceewWdgqqjgyd0HMUEWpr
2TwFW5v4QwHiuADlN0E2JssenSPQpEYssjvYV6BnCRR7ZadDZccE5ypSOFOq
ZA5Uw3FM+oWeg7wrFY9hK9wBYuEB7pEQ4wAk9k6Q2BZVXLCUxyiWJBnCqKjM
dbFE3alvZQR/xBpNDT2bSA2Yx8CKiHQQ2gQn6QG2SfsojrkGO0A6iWUjA4Ly
GjOdWMgxCgEb7Ujx6qkjsfAcrD6+BbrURw3bZ1tOSlpADlsBQgBwDrgFJ5L2
wdTsqBn8v8Ebi1W8Ef0Tb/wTb/zj8MYT8a46YuIMpdY48QePBVV8bETn/P3V
dafH/4qLt/T3u5Pfvz99d3KMf1+9GZ2d+T82bIurN2/fnx1Xf1U9j96en59c
HHNneCpqjzY656M/dpgPnbeX16dvL0ZnHZTDogYGcLORp4o0Xw48xO2TZsOB
HZLdV0eX//lvu8/Ep0+/evf6aG939/DzZ/vj5e6LZ/Djbqac1klBSfJPYPVy
A440KE46AQmIslygekYZAMGdoaUFJaUGGxvbf0LO/HkovhlHi91n39kHuODa
Q8ez2kPi2eqTlc7MxJZHLdN4btaeNzhdp3f0x9pvx/fgIQvMtcrhCJE1xweV
6AGuGYaS2D1pQsgeYlKjkkm/QiCsPQPV6UzeGqXVQHY9etCvYF3P4kd7hud8
hiuQAvpJOkcuUHJgSa3aIiv+I5wyoLULZ0inYMd0jGjBQwxcB+rEwAveGtS5
IV6DhSWWjARILYIp1LUGjhspB6Aj0Ik9QE0xoVBEl44DlhoamSmyAxJEQWtt
gDdfQiQsEpQDSC4iZ8XbcYtRC69WvJNLmyXJ+pBKLnGPVO7AFSPbStcS7Wy1
mVS2o6gQQesW/yjS2TEwAaTsOzBk2GiQnq0pysow2rV1zZaY5Nkc9Uke90EJ
F8sa1bYdk5yiKWaNzzqIvQXcQWNtTs//Zb0ga7+4Vy+U76Cpt+W1Bshcb6e0
s1O8G2IxWxpGg0LNx1msUeF5y9WUegC2KUuP36fVJRneWDoCVuxxi7XdOBU/
hZlUHDuguyIog1AKgDtzOOEIquIM0F0B0BNPpswRNfvlkK8QmDKk8f0CXBAl
56JBbPWbRcBANyM0TAY6YVEWfsPd4T1G+eah7H41XT9ARjodhMrKWddVIlA/
5QqMC8zL9gX24WimCV0nDOQtAcF4aRZ7LBTQE57o4PEDK7YoHhad0nqt7IZQ
pyL8i5fcRkfroi8JrDx21aucpFU/gLOYAWslWnP8wq4Lp3Ki7puSU+QHmCtA
WSRtaEBkuhSzck5a5zZL2PUiHGWUH8CAoU8RVXi14bxF5CkZ/zsAefgvvIvZ
ZwPhpqCKIuU40QmaGkQO4NSicsKuVWRgBa/ZfZ/LCBwE1YeRYvL6g4Z0YhAn
qgk0QRyegySRVfVH2O49Yr0Q5f3IwQyM1fI8oRWqeOUUk4WJ0UyBq84eHoah
Eg6KgD/HCNU6fEIl1tu1szdWaHc91pUNCNVuzR5QVJ29SuuKgkrKvYfnSCJ3
KANhMKWqN4DzlU1MNSWKhluWU31rF1xksEaOjpNz84+gInxuV0/CG5cMXh1r
KSqXgagYOCux2xsyY/ez1/mGIpDR8Nz7yFcQDauhIewb2r7VlVi6gbYyKVwX
Eq/Qaa2zoFpkpURguZJceoVwiO0SaiUgM2QNn2swjmN61fSLA7wQqD8yTZJN
qtGFAsw1nVk3vKHzZE0LUzyBpn8PlqiPoTqYEyzfgp1jnSQYGmMvk5kNXhWj
FfQyFvyicnvJBJHatmE/EDVRwp7m5Dnj6LYxxb14zFybG1MbIZJ5rpWxXpp3
p89BwybOQwsWVovoYpiMonUYWATs6SYs7kCi4dRhYKnAwBHQQrake7pFDUw5
noM84zjOdtV4B1AmsjvmGjhcaL6q49krPU0lxVxsQwv5SUt5YN9zp4haOLKR
RqDp1GK+icY4o1NH+KRBGVgFUnE9dxjSqlnoRVhgzYpSk5Fjoa0cgEo1IfPB
T5zoKUwROCx9x2rwHNEJNEE4tdoGUGML3rxvftXvi2/0HBRRHn3bGQyexloi
wDNP9RwQmnnaMnbbs4G5nXbAES2+7Ry5aVZ2qfOd6Pe/I6F5IsJmVRMnPRwA
SxqMdFYM+AFWjCNt9ZhPXBcJ0cVDpT7K+QKDF0YpsTsQf5oVxcIMnz6t5f2e
Jnjanv65e9/bra0BqAILRT0IIcjRqw6veIuBXQuLj53j0BPkd5McF03X0OvC
fqAL271MpyHEdUOEgugZgNdFBnpHvH93VkMFkrQ6qFjOgwoZxznFPok2ABZe
Dmt4DDxw2F1DAQ23C5RtmJQILyqzdSeXPA2dEysCR6dPj46REW8XRiz0giLl
7QJcnXI0fDrygky/wv0N9IFlI4n0Fwp1c7773gVC/oqoCRh05duGUo5ivlwU
mVXZleJp0ZLaOJ/SeTMyhFRkJw0omrkkWXH7FYUTENYzMEmlNCpdxzUABYYO
wugx/J7ALLnDh+g85+CEcvzQnS5x9Wa03z/Y3RMzaWYYY2fTz6ffiiJ6ZYi6
qIkjEONUaexMbLCBko3KBwQNA17ZwI/xwWGLgePk6XxeUhBSXMEaYB/xxSvw
6tk6+GU2yHAQJNwrjkyhsFNGzaEX8Nj7EUyZw04BtuAzivCLGQ5HALrMdZ5n
Nr/BIQVYEnQZl4XdJezBIQdoBsZVYljexU2LpV/Qj9qgqXZJAwLgwb7Q84BW
e8bsJk95M5kOpolSC85QFuTFBNLFAmUUHcoAQkQOOhjaU3ZBKpAfAglQfTHi
1ix1ZBvHlYqcCaiv7I5Ep6Q0AmiIRiwjgGI4MS7AZUZmtTRILV8F9HuDGFhz
y04xosmwVd2akOhYa/KO8R1LYogedOJP5Dwz7NSC8iQ4iy/XigyJSR1ffWUC
W95UxI43Fmn68EA100rsJ4Zd18j8PyB2gE6yytVUlihhEDjTC07FVbEttkJx
5UjbPrhzaBlBu7SgqZUSEqsPGF67ZVAyx65lKD58f3ItnPUs4JE1vANAvk8z
VSwGP4Ej9QHzmQpm2W402XYeNLCqieB+/WT/8GtTsdMfomrb7XG6RjfNSie5
Wm69dgsXCYZ4pLgNTl8gvmS76t5EwBjnA9jdd+Y+MMIwJBpCTFebGvoQ55R6
Rq6duwY9wvXie0weIywl/QBbx+4zp44uOWMpLrNEY+ISQ9wE6W0eqidUEW2x
BubF5GqCAMJWU4C1R1FeXQsevUqssRgskUuXUlu62IGYK7CeeEY50mYxlwsT
3ul4qgCKWOYnrBQsexY5Cj4PYGdCz2HpuZ8sSXnCmCVINOmbU6+9K41OgT16
C6oJp6liBs7KIR+9TLwL1QalN3HP55YN1QxXgc2oaWNXBHFWW06WImypM2Z7
29u5QIZqmjqsgXhgO2gowmeErfAceI2B/jh6GXYYFKkiZJc3durjIsEcHiXy
uBSl7tcEOLEWCWlZ8WRCS/5fWCqAOkzXszyQUiFHaneH+eud1iru4FKj1XL9
hh9ltDqK/hgwvob2Gms9SAW8CsmqRwI4hMJ5x9YIBupk1qhJZfB0GiVlrO6b
tyeOwvy/exggcXpC4JbOVDzjahjaaOiKIlCl/W0YkPus2FzyHfwBvmdP1kWC
Kk2qxxgWsN45oUJUQ6BGa2/t5lhpcbzzhxqQhNRoJd9TiqPSMm5ULp6y3L6s
nCAb9ic5s1AU8bbKU47qIrdNbXZQRdafVh+LfpFhik5FM4qXmaompOQYmkhB
3jDm4ftbnwHhWBOXBFpmxUclhlXR4hULYfEcrlHe3wyNHms3QkIhMBg7cBvC
wmAQD0+Dkpvg9WkM0oi7delAvQfDFVRpk/cKodY4wHbUWuIAgfmSlHs2ExWW
XAHnqgocPrBCUmyIzJWNsmAE6lY9YK4d3mMNYoKFhXv9wNJOKOwTt7kPpJAD
5UFVPbX46EeS3aQ+IUE8G3UOaycKODP1iGLOmdBQ+nzM1S+GakeQ57f1A077
kolcamSg4HgjEkYIqYGBexWYRPWC+YaYdFG2KPo6tcHJEJeuia7aohLDFXCG
gyKt9LE3qywanMMWasRJGpxF8hhBlbbzjxWXOHLbQFFu6/ACfcJGyGwIGwzL
/P5o24olZHleSzclRHl8CdRntVwIRX3gjU+U+xj5inzSTG1BkEU1c/82mPnz
Z6fmka+s/xPHRtyhYE+8IqEQrj0AvyDqt46Wx7ThgIkplon6tjNJMglOQqIm
xddoyKYa3Ew9ncGz3Z3Fx69tZGUt16/almk64qmPt1zXfBPPd5RnTHqTtjBZ
mUfWPb+Vuc5KI240Jm1JDdSzBCBlQ8RFvwezxtJiTy2G/rIcLxyEL+35gYFW
8jsCfR1qXocFI87o1AAEN2uDFvSGXIbXtkQSH7BjIV7l2Q3oeHzyzpdSnmVw
DHNjTRyW7YKJVGgFwppBKkL0Z8MjL5euqJu+02s8oph3WKLtAvhf+LqxOcNp
SgfavA0cUBjJt6BjAQz7GSHAVUkJd5sKqZEEI2OC3pQTrF6jiirDucQlh/lt
VXZtcIbFHx0e8lEZGeUZeG1uv5v3IoKQBUbGq1Ao8MPQzob1bS0MHDpVTGbM
V6Owy1bZkKZPXndMXQ5iRVd5uA7+uM9oiK4px2H82LJ7q0dJKBQvFw4KSx+b
GTir/epFEkuHvQaCNrzuitdos9vkSpV6LWE258+E3diE+0qmijFbiAtqQ7bO
62wfsPw1+g3WJFXL2Nx4DQNPKVKd1/aq5wVzLpeBnctBButpO3gAVE+YI3BI
p1gE7AM0vpSkO2mlAFzy11ZqWhv0Gkx1YC1kU1VCh+JY1YOpSAKgxSzRHQKg
BKN1yyCJhQXV2jrE1hmOh6L76ZOv6ukH03z+vEXFhY6neK3BW/mQpZsbFIKy
86D4BNxyDPJ5u3rGytcw+TiMhfce5N7PCjzSQQVI9WZljbbgIO+7cT5/7on1
S/erPgnstKclbqJ+aLhCKKpcK8oXcq6Cn+DBB79Oj4Mfx5dvUclTKuYEUzHV
BGvWuR28uHKHGuQA31xSjQImzPCAv1K4CxaKMzLyXbH1KRXNcbSpGrP7x5Or
rafdi7db9bkwDNGFcxDrCd3YKKr9rZbZ6BOogXu6x2oiEbl/qE0WhAqbowY8
axlyHWe3wsAQ+gOozhuRxS/0Z7DOS2C4sxnIBfpJgpQEJzQolQIgPSY1yHo8
DGCLWnzCQTWKeuEgq5iuV0Uq1pFH4HNpL44Ep3Qmb+suBt2VoVZxln5VrDRY
i1Fdrr1vifKJukYNFF7gCJbgiirW4FOYH9NFvyA53SDnvndBHq+FsqETk/47
S1WV0WMxaunkZMbA+ff9/VZi9rfuOuRYoIQYF+AMSmOoSCcNk9xz+Kxpqlda
tvVVReQuw8GuLDIbCLnV6s5miypMxe50kSuAZPoG61SA7jziTBEnIKvCLnbb
2sFKWPxiCMDOKcDBOQQq5Rdv8xh06DVMhhdY8CIGTCKTKcLh2dwW6AqqqkeK
CIhfYA2fpipWRwhjCQsyAmz3VXimvyZUjLkam2IosgUP5nP4HNiuAiO13Jlf
Hw10Ek+VGwgmTm22fqyKOwX2EV12Gpuu0qSUJOzVJ1rBZaS2g8Nsw9r18sR7
jyHyKPQPKX5LLF6Ni/hDSED90dvxyw4kErb2xUNHsU6bJaueYbdp7cBzOVrj
ueABhWNHBgMjkSo1ZVCwSoXDvw4KvQEyzMuUchEumkHC1ja+C2izL0FuRecP
St6guTnT6U0HPJRYJQMMs8K22Ig+STe9YJ2OpVZVeZBPLxmOk5OW52kQIdfi
qZSzSSgVNpNpNRhloNCMrKgG2lKq8MSQLVEC2inPsHF1l85VmGFph7ZIDbEn
XVWA6X8qU5Z+Ts1T1hvnpUVR5SwW3SD88k371LSPzfquGQAx9sWuc/CIxbUf
DBxY0j6ji2OrRuHhWCGPC+QunTZeKdh7Wx+usHoNaDb8BjQSbKWiywJv9HQm
um+2BI19J7pnWzTPbLnAg1o0brth+Kulhq57ucWF6EWgcbpHfM/ib8ceiPP0
E3EpWh6KI/G3QJYuQfbgCfQf9vG/YePfxn9DbCnO8IsGovp3e/tse1s0/qu1
fONbvlnT0rU4e3TLh8b8NBRPHhAAQV/R+LZzFIhUJQXvkGXntmnnM0lumVP1
hd1rf/xDMaZCcXYNbK3iiU3GrlQ62wqAv8N/VKIMRPPnIjpcmdIZCvuAHuL3
JzqP+uZHL+hFV06zFDvuDA4H++Ld66NaAx8exya7B8/j53vPxi8ne/FYyZcv
dvdeyr3dZy8mewcHL5/tPT/Ye/biIDqIo4PDg+jF4eT5s+hwJ3oxmTx7+Tw+
ONzZeRHtq92X0eHhvtrffb6/f3jwcndP7T0fv9hR8sVOPIme7e5PXkQSRn75
/DDe3T2YQIOD54eH48lehwn73HOMSOUC1E/RYIW9CFp/Sm/KPMF1NNL84YKp
WVBigs071evPIW8wnmUKGAYa7T7febn3Yv/w2fOwxdQVOLXQ0rJhK4TIREuD
jTK18q5YLqg/FnysvLxTYzzC+L61eHDdkiil2EIsQq3VxzU6cPwmHXY7uH66
wcrm3NSWg6H/FzO5+wsPzAUICauvwNp88YwBi63cbm585gPNCshiJyuJfXQy
+z9RYT9rnvtUA6sccP3dvYKjRnqUwqvOX3Cpb3+lwl13NgyiGQXTRYhPn34D
OuDF7sEh3fXUrLSkSDAwfqfwf7kqlG4n2UvT7mLzKLw4G97SsndEZIEfNOAc
h0+v3CE4dDeb0Y1FWogsvktNt+cR/fAsaCeDyg8aUdyqiFJXwXUe52NA9ywv
ZMpONoKSkLBg5XZ4dEXs5yysL0G3iMZqklF4ly9I2kAGQIRMzHWhp9wcWcUU
oQAxhKLBf1Ckgamgih0fjpwhTbQj9YQIBnUWGTS3VXiBZ43LtJgLOUqxfIsF
ADAgnJd8hd7YASxFJvCP7D74a/bkdjMdQVrRwytbEGm17Qf7CQqCqdabcJfv
MdfUwyIG8Jr5IhHdTCwL+jpIY6ABaZuqrpLCk7402hHkl20xILqHOcNKXySE
DJjIxLgSN07Ljpc2y+sdHDtxkPT1WDso3q3leAFTyiSy38Kgkhbn9za5ko1/
UlgEfWqjyaCAS1u234yOwAhzOklUwYyw0Qb6QfhiVdCdYUpDEm+L6j6ATcLa
yG8ckI9uvttN/ykIMbGYRKe3+PWP6Zo6eMre8HITldurw1V9XkP8nIS+Zo5X
uV0YcIZf3KAzWu1HGN0hXQLCAjhqzmzSGGLJuRiXS79dHjFZMgL36AnvD3Hc
ABca+etA1UcGsMjE3n0Y+PguEFMGt1WC42/rTN1VWBYwxzNOU1OhTT1R3RYz
Q2HzJchWRdC9VKbIEgoeNn/SQKHi1GZeL8CpJejDtCV53/a2l0vTuzoRcTq6
GLWo//qngDiJwW0lV/JZADrCrw6RUL/mr35cFWW8XM1eFtkCMSX6eXafXK4a
5rE4EnlU++AAeBL8QQXpZ6H8A89kcCb7gR+izIfg/G3LIAqRBYH4uUzBvbfV
2NsAovnLDbVaoPa7g9zeumO2XnoO5yzjhOvjfPd6DVPwHKMVOEFbaKPadJI6
l/sD0exHkhX/trheLvjme6RSbOAuUYFokfvYyKlXWou7uw+6WNrXVS4H33hp
r+PYBilwl1g4cs81n42aucvT05UrIv66HHM6hTXTsePiKFmr2iIDMXp3OhJ/
2D8CtILxDTi0VYKF98cpAOXSzeu22Jr/0fE5FR0C46Wdqfsv+HkRPjL84TBO
VrtDNKI7AfqjU20EzQwrNY4oVSEI/vAWqd4Io2qMITgE8GF7sCjnYNT4Umu9
8o0b/ukyATTy/vysutizwCfQjeqSHZlP7rmTRF7hJYyxufFbupwGnbEPIcea
9LkB7CGiLyjeAKaRsCaRZ2UaH2U5yLzYPaDPHVLIouMzSqMOfW9mtPrmFb95
5d642/BG/IgD+eyW6FRJBx7taLTmNQ95BEMSTgoDcNzzeNTyinsd+15tB5ab
0IVNLvHof9d1rNkaujzl5sbVqF8u+t8hhVev+E8Y94if4uxH/BRnO+anXXfA
t+DRq5VH1TTN5+5veF6VteGb4Be+C+wAvQ1/AyUgAcB52v8V16LlXpwPa6y/
FPfZSd89d4rWiSAL4L0d7xNAPC9pCeg+r4SRBWtzw8OycPNXSgpppzGv6Wxu
p+W+EYvu6ffhoK/9laP2MY9Pr6ovi4j+dzCJT8ywIgurKeUyyWS8uXF67Jr+
6JwKcijcGyBiCLrWpg5iMng9dz0Ea1Io63AsvgGNxW3drad64SJ7mPQdVaTD
F5r4tfgrSrCOR4wGqwyJP8umwY0Qi4trhdAwQNjfsgknwv7t0a1HCW7zzpsT
4PsuvHkJ/sLarYcU69rhaP+9R+sg2uNlnSUdC6k2N6icCvhuv2HTUj5q2yBz
XaN14cMvPDTV7LhrYUFlVXhLlcjh4j1VmxssgCGb1hRlsrxWAvZOoc92q3xZ
haxjE19nH3bsuOK33c5w3UQVdbYfcq3WcbWSU+y2znLxS2e5aJ/lwh6zYDtJ
UYQtXVgg3Bq35+67b+ulomrhRnnUkVtXPemO3pdWRPrj+Kjk9v2m5ZFD0NHD
rpsbuVqAqcOdGTp1vTYni7unJ6IbzPKWqiRU/Bu69J+K7lKZLRfbG3qtvjIM
vkTeLFtfEe2tb3g+kdgvEfC3c6okmW+IZLZWwFHNt2klF4Z/vyByKa1KWgsa
FEGD9ymlQ+tuu59UJaBKumkWdHjyfZbEw+3tEUYOtrdFx6r+Ztlc1aON6k41
BdiTif0wdnO2J+Dc3HzBXBjtC4CNn8OAM2un4NlYRjDeCSLWbeXBal02MfE3
9Ek24jKRwOQCjRZsqO1t+0GpBiQFYp4sZAJaTakU2h9zKAtWxZ4SHqJ2LPs1
inZGX1d/HPRrVJu4Y/y4UpP7D29rOrzlBM91Gs/l4t5TvGas+2yoraHo2ixo
IJbbYld0/bHZWo3db4v9+xtUDV88NNKz9gbbYu+hngePpeHlYxsePjTl83oD
FCG/O48SIyyTuFeG2mskbMZiFN2k2V2i4qktIP80ZBSk4m87GDS0InfpP9cA
5wv/TwL4TjEXCz36ahS9bC00sdXbWV5UnyZ4s7ezt+M/ferDDCclJiBkimrY
BYnpGzX0MdMI5Hn3gIJHOaYZRniiKQJ2kQ3E4cHu4Ys9DqecHl0PVClgkn1f
0heka6vqDntrEkOx/I1xhQXW5NFYXO9i8zqnaDznpW0Jfo+ixSWHhXr2g8zz
uSsvl+mNWGalGJlZokA/lnDgxQ9apT9j2H2UToHN8HsObkgm0xS4/69qvlA3
8kbDaD/IPBHn//UfMegHDMnk0CyWwP88++9/l6mKeuIokSXesD0GIbjMfs56
4neZyqfiVUmf9ZC5hpc/5LqMZhkQe67TmZQ/geaZzWXaE28TdWO0FudZggGz
7NbcLHUPDvoYLyGCb5mD6PbEJehq8WOW3GQTaFBFi8xg438AJxkK5gVjAAA=

-->

</rfc>
