The IETF Administration LLC (IETF LLC) has received legal advice that there are 
specific circumstances where it may need to restrict an individual’s access to 
IETF IT systems or face potentially serious legal consequences.  The 
circumstances identified so far are:

1.  When an individual is using IETF systems to seriously harass another and 
all attempts to get them to voluntarily desist have failed.
2.  When an individual is using IETF systems to repeatedly infringe the 
intellectual property rights of one or more third parties and all attempts to 
get them to voluntarily desist have failed.
3.  When ordered to do so by a court order from a court with jurisdiction over 
the IETF LLC.

Please note that ‘IETF systems’ means mailing lists, Datatracker, remote 
participation services (Meetecho, Webex and Zulip), and more.

Clearly each of the three circumstances described above are very different.  
For circumstance 1 (harassment), there are existing processes that would be 
followed initially, such as involving the Omdbudsteam and the RFC 3683 process 
for revoking posting rights.  However, this consultation is about what should 
happen if and when any applicable processes have been followed and we still 
reach the point where legal counsel advises us to restrict access.

For circumstance 2 (IPR infringement), the RFC 3683 process could also 
potentially be used, but again this consultation is about what happens when 
that doesn’t work or the infringement is not sufficiently addressed by that.  
We also need a policy here because legal counsel has counseled us to define a 
US Digital Millennium Copyright Act (DMCA) policy to benefit from the 
associated ‘safe harbor’ regime and avoid potential significant risks the IETF 
LLC could face in the absence of such a policy. 

For circumstance 3 (court order), while our discretion to act would be very 
limited, there are still important questions of how we do it and what we tell 
the community. 

With this context, the IETF LLC would like community feedback on what a draft 
policy for restricting access should look like, working on the assumption that 
such restriction will ultimately be necessary under certain circumstances and 
it is therefore important to define such a policy in advance.  The IETF LLC 
will then draft a policy using this feedback and consult on that text.

The reason that this consultation is being issued by the IETF LLC rather than 
say the IESG, is because the IETF LLC has the ultimate legal responsibility 
here, as defined in RFC 8711 “​​The IETF LLC is responsible for establishing 
and enforcing policies to ensure compliance with applicable laws, regulations, 
and rules”. However, if anyone feels that an IETF LLC consultation is not the 
appropriate mechanism to consider such a policy and it should instead be 
handled through a community-led process, then please let us know.  
Alternatively, some may feel that a consultation is not needed because this 
should be left to the lawyers to advise and the LLC to follow their advice, in 
which case please let us know.

While comments are welcome on any aspect of this, the key questions that the 
IETF LLC seeks feedback on are:

*  Who should be the decision maker(s) for any restriction of access under this 
policy and what process should they be required to follow?  For example, could 
it be the IETF LLC board acting on a recommendation of the IETF Executive 
Director and advice of legal counsel, and having consulted as appropriate, the 
IESG, IAB, IRTF Chair, Ombudsman, etc?
        
*  Should we restrict the person or the infringing logins, email addresses, 
etc?  It is recognised that people can get around restrictions by using 
different email addresses, IP addresses, etc but the alternative of expecting 
the IETF LLC to try to identify the person behind those may have unintended 
consequences for those that choose to participate pseudonymously for reasons 
unrelated to these circumstances.
        
*  How should any restriction of access be structured, considering both the 
severity of the limitation and the period of the restriction?  For example, 
should it begin with system access (such as sending an email or submitting an 
I-D) being moderated and if that doesn’t work escalate to complete 
disconnection? And for how long would any restriction apply?

* What right of appeal should anyone subject to access restriction have and to 
whom?
        
*  What information should be made public regarding any action to restrict 
access?

Please provide your feedback either to the [email protected] public 
mailing list, or to me directly at [email protected] by 7 August 2022.   

-- 
Jay Daley
IETF Executive Director
[email protected]

_______________________________________________
IETF-Announce mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-announce

Reply via email to