<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-guerra-feminism-01" category="info">

  <front>
    <title abbrev="Feminism">Feminism and protocols</title>

    <author initials="J." surname="Guerra" fullname="Juliana Guerra">
      <organization>Derechos Digitales</organization>
      <address>
        <email>juliana@derechosdigitales.org</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>ARTICLE 19</organization>
      <address>
        <email>mallory@article19.org</email>
      </address>
    </author>

    <date year="2019" month="July" day="08"/>

    <area>IRTF</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document aims to describe how internet standards, protocols and its implementations may impact diverse groups and communities. The research on how some protocol can be enabler for specific human rights while possibly restricting others has been documented in <xref target="RFC8280"/>. Similar to how RFC 8280 has taken a human rights lens through which to view engineering and design choices by internet standardisation, this document addresgses the opportunities and vulnerabilities embedded within internet protocols for specific, traditionally maginalised groups.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document aims to use a feminist framework to analyse the impacts of internet protocols on society. It is based on a document called The The Feminist Principles of the Internet <xref target="FPI"/>, a series of 17 statements with a “gender and sexual rights lens on critical internet-related rights” for the purpose of enabling women’s rights movements to explore issues related to internet technology.</t>

<t>These Principles, as well as most of the experiences and learnings of the feminist movement in the digital age, have focused on invisioning a more just internet as a necessary action in building a more just society, namely one that recognizes differences across a variety of lived experience and identity.</t>

<t>This document must not be understood as a set of rules or recommendations, but as an articulation of key issues with feminist policies and approaches, in order to begin to investigate. That is why this document has two main goals: to identify terminology, both in technical and feminist communities, that can be shared in order to start a dialogue; and to analyze the Feminist Principles based on some of the technical discussions that have been taken into account in the development of protocols.</t>

<t>In what follows, this document first describes the feminist theoretical framework from which it proposes to analyze the impacts of the protocols on marginalized and discriminated communities. In the second part, describes the methodology used to connect the framework mentioned above with the Feminist Principles of the internet. In the third part, characteristics of each principle, as well as the harms on which they are based, the possible points where they connect with IETF work and related rights, are described.</t>

<t>This is still a work in progress so many sections are yet to be done. Coming soon will be added use cases as examples of how protocols and standards can restrict the use of the internet by certain communities and individuals.</t>

<section anchor="an-intersectional-perspective" title="An intersectional perspective">

<t>Imagine a highway that connects two big cities, one capable of withstanding heavy traffic at high speeds. Driving there takes experience and expertise, and just a few streets intersect it so as not to hinder traffic. Imagine this highway as a robust body of rights and those who travel along it as people who have traditionally enjoyed these rights.</t>

<t>If someone without enough experience is driving down a road that intersects the highway and wants to get there, that person will be at greater risk of crashing or having an accident. In addition, without a valid license the person will also run the risk of being fined by the traffic authorities. In terms of rights, those intersecting roads are not robust and the risks of accident are forms of discrimination experienced by those who drive on them. What if many small streets intersect at the same point on the highway?</t>

<t>Arised in black feminist theory, the concept of intersectionality serves to understand how multiple forms of discrimination overlap <xref target="Collins"/>. As first pointed by <xref target="Crenshaw"/> in the United States, “Black women can experience discrimination in ways that are both similar to and different from those experienced by white women and Black men”, so an intersectional approach should be able to recognize this type of discrimination by transcending the one-way perspective with which the justice system, as well as feminist and anti-racist movements, had traditionally operated.</t>

<t>From this proposal, the concept has meant a paradigm shift both in feminist thinking <xref target="Collins"/> and movements <xref target="Lorde"/><xref target="Davis"/>, and more recently in the design and implementation of public policies <xref target="Mason"/><xref target="Hankivsky"/>. The intersectional approach is not focused on the problem of equality but on difference; discrimination is not analyzed in terms of effective access to rights, but the conditions and capacities that people have to access those rights.</t>

<t>Therefore, an intersectional feminist perspective focuses on social location, the multiple layered identities people live, derived from social relations, history and structures of power through which people can experience both oppression and privilege. These oppressions can be structural and dynamic, determined by gender, race or skin color, class, sexuality, ethnicity, age, language, geographic location, abilities or health conditions, among other factors <xref target="Symington"/>.</t>

<t>The concept <spanx style="emph">matrix of domination</spanx>, introduced by <xref target="Collins"/> as complementary to <spanx style="emph">intersectionality</spanx>, refers to the way in which the powers that produce and reproduce intersecting oppression are organized. In summary, the concept <spanx style="emph">intersectionality</spanx> has served to recognize people’s different experiences and social locations and with this, the need of a bottom up understanding of discrimination and oppression; in addition, the concept <spanx style="emph">matrix of domination</spanx> turns the gaze on the context of power -institutional, political, economic and symbolic- in which intersecting oppressions operate.</t>

<section anchor="internet-as-a-matrix-of-domination" title="Internet as a matrix of domination">

<t>The gender and sexual rights lens on critical internet-related rights contained in the Feminist Principles of the Internet has been built bottom up by the feminist movement <xref target="FPI"/>, which treats most prominently people who are negatively discriminated against on the basis of their gender and sexuality, but not exclusively. Because the threats to women and queer people, whose bodies and manifestations are already under strong, albeit sometimes invisible, social, cultural and political surveillance, an intersectional feminist analysis makes it possible to recognize how multiple oppressions affect the ways people access, use and participate on the internet.</t>

<t>From now on, some of these experiences will be used to identify how the Internet can enable or restrict the possibility of justice and equity among its users. For this purpose, it is useful to understand the internet as a <spanx style="emph">matrix of domination</spanx> in the sense pointed by <xref target="Collins"/>: as an institutional, political, symbolic and cultural context where different intersecting oppressions are shaped and reinforced.</t>

<t>This document addresses the opportunities and vulnerabilities incorporated into Internet protocols for specific, traditionally discriminated groups, on the assumption that these values are inherent in technological design. Through the proposed intersectional perspective, a multilevel description of the factors, processes and social structures that affect different experiences on the Internet is presented below and, based on specific cases, an analysis will be made of how the different protocols intervene in the shaping and reinforcement of intersecting oppressions faced by users on different social locations.</t>

</section>
</section>
<section anchor="brief-history-of-feminism-and-the-internet" title="Brief history of feminism and the internet">

<t>The ways in which feminists have understood, used and mobilised on the internet is significant for a baseline understanding of how internet protocols and feminism intersect. Intersectional feminist action and analysis can be collected into two strategies: addressing the status quo and creating alternatives. Feminists on the early internet embodied both.</t>

<t>It is important to note here that there has always existed a gender gap in access to the internet, which is exacerbated by global wealth inequality.</t>

<t>Since the 1980s, feminist movements have used the internet to challenge power. Globalisation. Development. Cyberfeminism. Internet governance. There is a deeper connection to the internet and social justice struggles in which communication becomes the primary strategy to address inequality. Indeed, in “A History of Feminist Engagement with Development and Digital Technologies” Anita Gurumurthy writes, “the history of the right to communicate reveals the contestation between powerful status quoist forces and those who seek transformative, global change for justice and equality.”</t>

<t>At the same time, feminists were using the internet to create feminist space.</t>

<t>Author Feminista Jones argues in “Reclaiming Our Space: How Black Feminists Are Changing the World from the Tweets to the Streets” that the feminist alternative spaces have become mainstream and are leading analysis and critique of the status quo, a merging and strengthening of the two strategies that emerge from this particular historical framing.</t>

<t>Given these myriad expressions of feminism online and feminist movement building online, one thread is perhaps most instructive to this exercise, which we use as the basis for this document: Feminist Principles of the Internet. More about the nature of the complex community that created the Feminist Principles of the Internet can be found at feministinternet.org. The principles, drafted and revised by hundreds of feminists mostly in the global south, highlight historical feminist themes for the digital age in its main categories: access, movements, economy, expression and embodiment.</t>

</section>
</section>
<section anchor="methodology" title="Methodology">
<t><list style="symbols">
  <t>Research: Archive review, HRPC-RG documents, Use cases (bottom-up, participative process within feministinternet community (TODO))</t>
  <t>Presentation: principle, harm identified, related protocols and rights.</t>
</list></t>

<t>TODO</t>

</section>
<section anchor="feminist-principles" title="Feminist Principles">

<section anchor="access" title="Access">

<t>Internet access is recognized as a human right <xref target="UNGA"/>, but its effective guarantee depends on different and unequal social, cultural, economic and political conditions. In 2018, barely half of the world’s population has access to the internet and in 88% of countries, men have more access than women <xref target="ITU"/>. Geographical location, age, educational and income level, as well as gender, significantly determine how people access to the internet <xref target="WebFoundation"/>.</t>

<t>The Feminist Principles of the Internet <xref target="FPI"/> explore a broad understanding of the term beyond technicalities. It seeks to connect the technical fact to gendered and socio-economic realities.</t>

<section anchor="internet-access" title="Internet access">

<t>Access must be to a universal, acceptable, affordable, unconditional, open, meaningful and equal internet, which guarantees rights rather than restricts them <xref target="FPI"/>. As some bodies have always been subject to social and cultural surveillance and violence because of their gender and sexuallity, their access to internet will not be satisfied with connected devices, but with safety and useful digital enviroments <xref target="SmKee"/>.</t>

<t>Harms: Restricted connectivity. i.e. Middleboxes (which can be Content Delivery Networks, Firewalls, NATs or other intermediary nodes that provide ‘services’besides routing). TODO</t>

<t>Related protocols: The end-to-end principle is important for the robustness of the network and innovation (RFC1958); Content agnosticism: Treating network traffic identically regardless of content.</t>

<t>Related rights: Freedom of expression, freedom of association.</t>

</section>
<section anchor="access-to-information" title="Access to information">

<t>Women and queer people have traditionally had restricted their reproductive and sexual rights. Today their rights are resticted in different levels and qualities in differents countries and regions. It is necessary to guarantee access to relevant information related to sexual and reproductive health and rights, pleasure, safe abortion, access to justice, and LGBTIQ+ issues.</t>

<t>Harms: Some goverments and ISPs block pages with this content or monitor online activity by sexual and gender related terminology. Therefore the considerations for anticensorship internet infrastructure technologies 
also consider, and can possibly alleviate, a gendered component to using the internet.</t>

<t>TODO. Blocked sites, Monitoring by content, identify users by IP or type of traffic.</t>

<t>Related protocols: Information in one’s own language is the first condition, as pointed out with the cencept of ‘Localization’ <xref target="RFC8280"/>, referred to the act of tailoring an application for a different language, script, or culture, and involves not only changing the language interaction but also other relevant changes, such as display of numbers, dates, currency, and so on.</t>

<t>TODO. Content agnosticism: Treating network traffic identically regardless of content (but it refers to header content). Censorship resistance.</t>

<t>Related rights: FoE, FoA, Right to political participation, Right to participate in cultural life, arts and science.</t>

</section>
<section anchor="usage-of-technology" title="Usage of technology">

<t>Beyond content, access implies the possibility to use, which means code, design, adapt and critically and sustainably use ICTs. Even though almost 75% of connected individuals are placed in the Global South 
<xref target="WhoseKnowledge"/>, technology is developped mainly in rich countries where student quotas and jobs are filled mainly by men.</t>

<t>However, there is still a long way to go in terms of inclusion of more diverse populations in the spaces of technology development and definition of protocoles and standards for the internet infrastructure <xref target="RFC7704"/>. Building and engineering critical internet technology is a component of ‘usage’ <xref target="Knodel"/>, one which chllenges challenge the cultures of sexism and discrimination.</t>

<t>Harms: Gender and race bian in algorithms, digital gender gap. Necessary to know the charset, gap. The presence of gendered subjects in the IETF RFCs and drafts archive demonstrates stereotyped male and feminine roles.</t>

<t>Related protocols: The concept of ‘Internationalization’ <xref target="RFC6365"/> refers to the practice of making protocols, standards, and implementations usable in different languages. This is a first step to democratize the development of technology, allowing its implementation in non-English-speaking countries.</t>

<t>TODO. <xref target="RFC5646"/> descentralization, reliability. Adaptability (permissionless innovation).</t>

<t>Related rights: Right to participate in cultural life, arts and science</t>

</section>
</section>
<section anchor="networked" title="Networked">

<t>In contexts where women do not have their rights fully guaranteed, or where sexual and gender diversity are socially condemned, the Web has served to meet, organize and resist. With the popularization of the internet, the freedom of expression of both women and other gender identities traditionally marginalized from public life and social acceptance (whom we refer to as queer) has been greatly enhanced.</t>

<t>By adding content in formats like text, audio and video, these groups have been able to connect with each other, as well as open spaces for discussion and visibility of topics that previously seemed vetoed. The web has become a space for activism, reclamation and protest against injustice and gender inequality. It has allowed the construction of international networks of solidarity, support and mobilization, and with this, the strengthening of feminism and other movements that fight for equal rights and for a fair recognition of difference.</t>

<section anchor="resistance" title="Resistance">

<t>The internet is a space where social norms are negotiated, performed and imposed. For users it increasingly functions as an extension of offline spaces shaped by patriarchy and heteronormativity. Disident content as well as widely accepted norms and values should have the same possibilities to be added, flow and stay on the net.</t>

<t>Harms: content blocking, content monitoring and identification, traffic monitoring</t>

<t>Related to protocols: Integrity</t>

<t>Related rights: Freedom of expression, Freedom of association.</t>

</section>
<section anchor="movement-building" title="Movement building">

<t>Given the shrinking of civic space offline, the internet provides a global public space, albeit one that relies on private infrastructure <xref target="tenOever"/>. For social causes that push for equality, it is 
therefore critical that the internet be maintained as a space for alignment, protest, dissent and escape. In the scope of this document, this is a call to maintain and enable the creation of spaces for 
sustained feminist movement building. Ihe internet provides new and novel ways for communities to come together across borders and without limits of geolocation.</t>

<t>Harms: However this positive aspect of internet communications is 
threatened by centralised systems of control and cooptation, specifically surveillance and other online repression.</t>

<t>Related protocols: Association of system architectures is a concept that overlaps neatly with the ideals of real-world associations of organisations and communities. “The ultimate model of P2P is a completely decentralized system, which is more resistant to speech regulation, immune to single points of failure and have a higher performance and scalability <xref target="tenOever"/>.” It can be descussed in terms of intersectionailty and what we mentioned about ‘different dimensions of freedom’. Maybe the ‘solution’ is not only P2P because it doesn’t take into account different distances from and capacities related to this technology, maybe mixed with another feature?. Integrity.</t>

<t>Related rights: Elements of freedom of assocation as explained in the UDHR include individual and collective rights to privacy and anonymity, as discussed in more detail below.</t>

</section>
<section anchor="internet-governance" title="Internet governance">

<t>It is critical for groups who represent civil society interests, social change and the larger public interest to challenge processes and institutions that govern the internet. This requires the inclusion 
of more feminists and queers at the decision-making table, which can be achieved through democratic policy making. Greater effect will be possible through diffuse ownership of and power in global and local networks.</t>

<t>Harms: Gender gap</t>

<t>Related to protocols: While there is no agreement regarding the ability of the internet to negatively or positively impact on social behaviors, or shape desirable practices <xref target="RFC8280"/>, more women and diverse populations’ 
participation in technical development and decision-making spaces will lead to greater possibilities for ICTs to reflect greater inclusiveness and enable less risky and harmful interactions <xref target="RFC7704"/>.</t>

<t>Related rights: Right to participate in cultural life, arts and science</t>

</section>
</section>
<section anchor="economy" title="Economy">

<t>From a feminist perspective, it is necessary to achieve the promise of an internet that facilitates economic cooperation and collaboration. One internet that can challenge models of economic inequality and transcend into other forms where women and queer people are not relegated or in economic dependence.</t>

<section anchor="business-models" title="Business models">

<t>Interrogating the capitalist logic that drives technology towards further privatisation, profit and corporate control implies open discussions on centralisation of services and the logic of vertical integration while holding nuance for the tensions between trust, reliability and diversity.</t>

<t>Alternative forms of economic power can be grounded in principles of cooperation, solidarity, commons, environmental sustainability and openness.</t>

<t>Harms: TODO</t>

<t>Related protocols: Centralisation of services is a current discussion in the IETF that should be informed by feminist critique of capitalist structures <xref target="Arkko"/>. End user centered; W3C, descentralization.</t>

<t>Related rights: TODO</t>

</section>
<section anchor="open-source" title="Open source">

<t>The digital gender gap has relegated women and other marginalized groups to be internet users, adding content for the benefit of the platforms themselves but without a deep understanding of how these platforms work. This requires shared terminology upon which technology is created to enable experimentation and values exchange. Not only that, but documenting, promoting, disseminating, and sharing knowledge about technology is at the heart of the long-standing free software community’s ethos. This aligns with a feminist approach to technology.</t>

<t>Given the established community of “free software”, it is important to note that freedom is not freedom for everyone, always. It is important to identify different dimensions of freedom and how it is 
expressed in different contexts.</t>

<t>Harms: TODO</t>

<t>Related protocols: Promoting transparency <xref target="RFC8280"/> and simplifying technical terminology is necessary to bridge this gap. Interoperabiliy, Open standards are important as they allow for permissionless innovation. Freedom and ability to freely create and deploy new protocols on top of the communications constructs that currently exist. Open standards.</t>

<t>Related rights: Right to participate in cultural life, arts and science</t>

</section>
</section>
<section anchor="expression" title="Expression">

<section anchor="amplify" title="Amplify">

<t>The state, the religious right and other extremist forces who monopolise discourses of morality have traditionally silence women’s voices and continue to silence feminist voices and persecute women’s human rights defenders.</t>

<t>Harms: Blocking and monitoring content, identifiyng site owners, manipulating indexed content on search engines, Trolling, coordinated attackes (DoS and DDoS).</t>

<t>Related protocols: Content agnosticism: Treating network traffic identically regardless of content, anti censorship.</t>

<t>Related rights: Freedom of expression, Freedom of association, Access to information</t>

</section>
<section anchor="expression-1" title="Expression">

<t>The political expression of gender has not been limited to voices, but has made use of the body and its representation. However, the use of body as a form of political expression on the internet implies a series of risks and vulnerabilities for the people involved in these movements, especially if they do not understand how internet technology works.</t>

<t>Harms: Surveillance, content regulations or restrictions, content blocking.</t>

<t>Related protocols: Confidentiality, keeping data secret from unintended listeners <xref target="BCP72"/>. Data protection <xref target="RFC1984"/>. Encryption</t>

<t>Related rights: Freedom of expression</t>

</section>
<section anchor="pornography" title="Pornography">

<t>Women’s sexual expression online is socially condemned and punushed with online gender based violence. On the other hand, queer people online sexuality is usually labeld as “harmful content”. These practices evidence how overcontrolled are gendered bodies and tend to confuse the differences between sexual expression and pornography.</t>

<t>Users build their own public digital identities while using private communications to disseminate information, explore their sexuality in text, image and video, share their initmity with others. Pornography online, on the other hand, has to do with agency, consent, power and labour.</t>

<t>Harms: In internet-connected devices, it has become much easier to mix leisure and work, which implies different risks for users.</t>

<t>Related protocols: <xref target="RFC3675"/></t>

<t>Related rights: Freedom of expression</t>

</section>
</section>
</section>
<section anchor="embodiment" title="Embodiment">

<t>Most of the threats women and queer people face on line, occur on the user levels of application and content. Most adversaries are other users, but also include institutions, platforms and governments.</t>

<t>For a long time, perhaps since the internet became popular, its use ceased to be a functional matter and became emotional. The access to chat rooms to connect with people at huge distances, the possibility of having personal e-mails, the appearance of social networks to share music, photos and then video, determined not only the social use of a new tool but also the configuration of digital sensitivities, understood by some as sensory extensions of the body.</t>

<t>The internet connections embedded have also meant a radical transformation in the way people access the internet. Much more, considering that today most internet connections, especially in the global south, are mobile connections.</t>

<t>Sharing personal information, and often sensitive data, through platforms that are synchronized with email accounts and other platforms where information considered non-sensitive is published, implies losing control over such information. Much more, considering that each platform hosts the information of its users according to their own terms and conditions in the treatment of data. For women and other groups marginalized by race or gender, these risks are greater.</t>

<t>Just as the internet connection can be considered an extension of the body, social problems such as discrimination and exclusion have been projected into the digital environment– sometimes intensified, 
sometimes reconfigured. And once again, women, queers, racialized people are the most vulnerable. Most of the threats they face on line, occur in the user level. Most of their “adversaries” are other users, who also act at the user level, with technical or social skills that threaten participation and expressions. Institutions, platforms and governments who are adversarial have great advantage.</t>

<t>At this point, what level of autonomy do these people have as internet users?</t>

<section anchor="consent" title="Consent">

<t>Some elements of consent online include but are not limited to the following list of issues, which should be elaborated on:</t>

<t><list style="symbols">
  <t>Data protection
     * Exposure of personal data</t>
  <t>Culture, design, policies and terms of service of internet platforms</t>
  <t>Agency lies in informed decisions
     * Real name policies</t>
  <t>Public versus private information
     * Dissemination of personal or intimate information
     * Exposure of intimacy
     * Unauthorized use of photos</t>
</list></t>

<t>Harms: TODO</t>

<t>Related protocols: TODO</t>

<t>Related rights: TODO</t>

<section anchor="privacy-and-data" title="Privacy and data">

<t>While mentioned at the intersection of previous issues outlined above, this section is particularly critical for women, queers and marginalised populations who are already at greater risk of control and surveillance:</t>

<t><list style="symbols">
  <t>Right to privacy</t>
  <t>Data protection</t>
  <t>Profit models</t>
  <t>Surveillance and patriarchy by states, individuals, private sector, etc. Those that enable surveillance, eg spouseware.</t>
</list></t>

<t>Harms: TODO</t>

<t>Related protocols: TODO</t>

<t>Related rights: TODO</t>

</section>
<section anchor="memory" title="Memory">

<t>One’s consent and control of the information that is available to them and about them online is a key aspect of being a fully empowered individual and community in the digital age. There are several considerations that deserve deeper inspection, such as:</t>

<t><list style="symbols">
  <t>Right to be forgotten</t>
  <t>Control over personal history and memory on the internet</t>
  <t>Access all our personal data and information online</t>
  <t>Delete forever</t>
</list></t>

<t>Harms: TODO</t>

<t>Related protocols: TODO</t>

<t>Related rights: TODO</t>

</section>
<section anchor="anonymity" title="Anonymity">

<t>While anonymity is never just about technical issues but users protection activities, it becomes more necessary to strenghten the design and functionality of networks, by default. There are several considerations for internet infrastructure related to enabling anonymity for online users. This is particularly important for marginalised groups and can be ennumerated, and expanded upon, thusly:</t>

<t><list style="symbols">
  <t>Right to anonymity</t>
  <t>Enables other rights like freedom of expression
     * Censorship
     * Defamation, descredit
     * Affectations to expression channels</t>
  <t>Breaking social taboos and heteronormativity
     * Hate Speech, discriminatory expressions</t>
  <t>Discrimination and safety from discrimination</t>
</list></t>

<t>Harms: TODO</t>

<t>Related protocols: TODO</t>

<t>Related rights: TODO</t>

</section>
<section anchor="children" title="Children">

<t>TODO</t>

<t>Harms: TODO</t>

<t>Related protocols: TODO</t>

<t>Related rights: TODO</t>

</section>
</section>
<section anchor="online-violence" title="Online violence">

<t>Where women and queer people have traditionally been marginalized, their participation in the internet is rejected through different forms of violence by other users, as well as institutions, platforms 
and governments. But the effects of these violences, which are nothing more than extensions of the traditional violence that these groups and individuals face in social life, increase to the extent that 
there is not enough technical knowledge to neutralize them, and this is the case of most people who struggle for the recognition of their gender difference.</t>

<t>The security considerations to counter online violence are critical. There is opportunity in a connected world for those who would perpetuate violence against women and other marginalised groups through 
the use of internet-enabled technologies, from the home to the prison.</t>

<t>Privacy is a critical component of security for populations at risk. The control of information is linked to privacy. Where some would like privacy in order to live privately, others need privacy in order to access information and circumvent censorship and surveillance. The protection of privacy is critical for those at risk to prevent vicimisation through extortion, doxxing, and myriad other threats. Lack of privacy leads to risks such as stalking, monitoring and persistent harrassment.</t>

<t>While making public otherwise private details about a person can consitute a form of abuse, the converse is also a risk: Being erased from society or having one’s online identity controlled by another is a form of control and manipulation. Censorship, misinformation and coersion may consitute violence online. Other forms of non-consensual manipulation of online content includes platform “real name policies”, sharing of intimate images and sexual abuse, spreading false accusations, flamming and other tactics.</t>

<t>Key to mitigating these threats is the element of consent.</t>

<t>Harms: TODO</t>

<t>Related protocols: TODO</t>

<t>Related rights: TODO</t>

</section>
</section>
<section anchor="references-not-yet-referenced" title="References not yet referenced">

<t>In plain sight, on sexuality, rights and the internet in India, Nepal and Sri Lanka https://www.genderit.org/articles/plain-sight-sexuality-rights-and-internet-india-nepal-and-sri-lanka</t>

<t>Human Rights and Internet Protocols: Comparing Processes and Principles https://www.apc.org/sites/default/files/ISSUE_human_rights_2.pdf</t>

<t>Principles of Unity for Infraestructuras Feministas https://pad.kefir.red/p/infraestucturas-feministas Feminist</t>

<t>Principles of the Internet https://feministinternet.org The UX Guide to Getting Consent https://iapp.org/resources/article/the-ux-guide-to-getting-consent</t>

<t>From steel to skin https://fermentos.kefir.red/english/aco-pele Responsible Data https://responsibledata.io</t>

<t>Impact for what and for whom? Digital technologies and feminist movement building internet https://www.genderit.org/feminist-talk/impact-what-and-whom-digital-technologies-and-feminist-movement-building</t>

<t>Design Justice https://docs.google.com/presentation/d/1J3ZWBgxe0QFQ8OmUr-QzE6Be8k_sI7XF0VWu4wfMIVM/edit#slide=id.gcad8d6cb9_0_198</t>

<t>Design Action Collective Points of Unity https://designaction.org/about/points-of-unity</t>

<t>CODING RIGHTS; INTERNETLAB. Violências de gênero na internet: diagnóstico, soluções e desafios. Contribuição conjunta do Brasil para a relatora especial da ONU sobre violência contra a mulher. São Paulo, 
2017. https://www.codingrights.org/wp-content/uploads/2017/11/Relatorio_ViolenciaGenero_v061.pdf</t>

<t>Barrera, L. y Rodríguez, C. La violencia en línea contra las mujeres en México. Informe para la Relatora sobre Violencia contra las Mujeres Ms. Dubravka Šimonović. 2017. 
https://luchadoras.mx/wp-content/uploads/2017/12/Informe_ViolenciaEnLineaMexico_InternetEsNuestra.pdf</t>

<t>Sephard, N. Big Data and Sexual Surveillance. APC issue papers. 2016. https://www.apc.org/sites/default/files/BigDataSexualSurveillance_0_0.pdf</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>As this document concerns a research document, there are no security considerations.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no actions for IANA.</t>

<t>Crenshaw, K. (2018). Demarginalizing the Intersection of Race and Sex: A Black Feminist Critique of Antidiscrimination Doctrine, Feminist Theory, and Antiracist Politics [1989]. In K. T. Bartlett &amp; R. Kennedy (Eds.), Feminist Legal Theory (1st ed., pp. 57–80; By K. Bartlett). https://doi.org/10.4324/9780429500480-5</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor='RFC8280' target='https://www.rfc-editor.org/info/rfc8280'>
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author initials='N.' surname='ten Oever' fullname='N. ten Oever'><organization /></author>
<author initials='C.' surname='Cath' fullname='C. Cath'><organization /></author>
<date year='2017' month='October' />
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name='RFC' value='8280'/>
<seriesInfo name='DOI' value='10.17487/RFC8280'/>
</reference>



<reference  anchor='RFC4949' target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>



<reference  anchor='RFC1244' target='https://www.rfc-editor.org/info/rfc1244'>
<front>
<title>Site Security Handbook</title>
<author initials='J.P.' surname='Holbrook' fullname='J.P. Holbrook'><organization /></author>
<author initials='J.K.' surname='Reynolds' fullname='J.K. Reynolds'><organization /></author>
<date year='1991' month='July' />
<abstract><t>This FYI RFC is a first attempt at providing Internet users guidance on how to deal with security issues in the Internet. This FYI RFC provides information for the Internet community.  It does not specify an Internet standard. [FYI 8]</t></abstract>
</front>
<seriesInfo name='RFC' value='1244'/>
<seriesInfo name='DOI' value='10.17487/RFC1244'/>
</reference>



<reference  anchor='RFC2122' target='https://www.rfc-editor.org/info/rfc2122'>
<front>
<title>VEMMI URL Specification</title>
<author initials='D.' surname='Mavrakis' fullname='D. Mavrakis'><organization /></author>
<author initials='H.' surname='Layec' fullname='H. Layec'><organization /></author>
<author initials='K.' surname='Kartmann' fullname='K. Kartmann'><organization /></author>
<date year='1997' month='March' />
<abstract><t>A new URL scheme, &quot;vemmi&quot; is defined.  VEMMI is a new international standard for on-line multimedia services, that is both an ITU-T (International Telecommunications Union, ex.  CCITT) International Standard (T.107) and an European Standard (ETSI European Telecommunications Standard Institute) standard (ETS 300 382, obsoleted by ETS 300 709).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2122'/>
<seriesInfo name='DOI' value='10.17487/RFC2122'/>
</reference>



<reference  anchor='RFC2310' target='https://www.rfc-editor.org/info/rfc2310'>
<front>
<title>The Safe Response Header Field</title>
<author initials='K.' surname='Holtman' fullname='K. Holtman'><organization /></author>
<date year='1998' month='April' />
<abstract><t>This document defines a HTTP response header field called Safe, which can be used to indicate that repeating a HTTP request is safe.  This memo defines an Experimental Protocol for the Internet community.  It does not specify an Internet standard of any kind.  Discussion and suggestions for improvement are requested.</t></abstract>
</front>
<seriesInfo name='RFC' value='2310'/>
<seriesInfo name='DOI' value='10.17487/RFC2310'/>
</reference>



<reference  anchor='RFC1746' target='https://www.rfc-editor.org/info/rfc1746'>
<front>
<title>Ways to Define User Expectations</title>
<author initials='B.' surname='Manning' fullname='B. Manning'><organization /></author>
<author initials='D.' surname='Perkins' fullname='D. Perkins'><organization /></author>
<date year='1994' month='December' />
<abstract><t>This paper covers basic fundamentals that must be understood when one defines, interprets, or implements methods to control user expectations on or over the Internet. This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1746'/>
<seriesInfo name='DOI' value='10.17487/RFC1746'/>
</reference>



<reference  anchor='RFC1941' target='https://www.rfc-editor.org/info/rfc1941'>
<front>
<title>Frequently Asked Questions for Schools</title>
<author initials='J.' surname='Sellers' fullname='J. Sellers'><organization /></author>
<author initials='J.' surname='Robichaux' fullname='J. Robichaux'><organization /></author>
<date year='1996' month='May' />
<abstract><t>The goal of this FYI document, produced by the Internet School Networking (ISN) group in the User Services Area of the Internet Engineering Task Force (IETF), is to act as an introduction to the Internet for faculty, administration, and other school personnel in primary and secondary schools.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='FYI' value='22'/>
<seriesInfo name='RFC' value='1941'/>
<seriesInfo name='DOI' value='10.17487/RFC1941'/>
</reference>



<reference  anchor='RFC3694' target='https://www.rfc-editor.org/info/rfc3694'>
<front>
<title>Threat Analysis of the Geopriv Protocol</title>
<author initials='M.' surname='Danley' fullname='M. Danley'><organization /></author>
<author initials='D.' surname='Mulligan' fullname='D. Mulligan'><organization /></author>
<author initials='J.' surname='Morris' fullname='J. Morris'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<date year='2004' month='February' />
<abstract><t>This document provides some analysis of threats against the Geopriv protocol architecture.  It focuses on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of information yielded by Geopriv.  Some security properties that meet these threats are enumerated as a reference for Geopriv requirements.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3694'/>
<seriesInfo name='DOI' value='10.17487/RFC3694'/>
</reference>



<reference  anchor='RFC6365' target='https://www.rfc-editor.org/info/rfc6365'>
<front>
<title>Terminology Used in Internationalization in the IETF</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='J.' surname='Klensin' fullname='J. Klensin'><organization /></author>
<date year='2011' month='September' />
<abstract><t>This document provides a list of terms used in the IETF when discussing internationalization.  The purpose is to help frame discussions of internationalization in the various areas of the IETF and to help introduce the main concepts to IETF participants.   This memo documents an Internet Best Current Practice.</t></abstract>
</front>
<seriesInfo name='BCP' value='166'/>
<seriesInfo name='RFC' value='6365'/>
<seriesInfo name='DOI' value='10.17487/RFC6365'/>
</reference>



<reference  anchor='RFC7704' target='https://www.rfc-editor.org/info/rfc7704'>
<front>
<title>An IETF with Much Diversity and Professional Conduct</title>
<author initials='D.' surname='Crocker' fullname='D. Crocker'><organization /></author>
<author initials='N.' surname='Clark' fullname='N. Clark'><organization /></author>
<date year='2015' month='November' />
<abstract><t>The process of producing today's Internet technologies through a culture of open participation and diverse collaboration has proved strikingly efficient and effective, and it is distinctive among standards organizations.  During the early years of the IETF and its antecedent, participation was almost entirely composed of a small group of well-funded, American, white, male technicians, demonstrating a distinctive and challenging group dynamic, both in management and in personal interactions.  In the case of the IETF, interaction style can often contain singularly aggressive behavior, often including singularly hostile tone and content.  Groups with greater diversity make better decisions.  Obtaining meaningful diversity requires more than generic good will and statements of principle.  Many different behaviors can serve to reduce participant diversity or participation diversity.  This document discusses IETF participation in terms of the nature of diversity and practical issues that can increase or decrease it.  The document represents the authors' assessments and recommendations, following general discussions of the issues in the IETF.</t></abstract>
</front>
<seriesInfo name='RFC' value='7704'/>
<seriesInfo name='DOI' value='10.17487/RFC7704'/>
</reference>



<reference  anchor='RFC3675' target='https://www.rfc-editor.org/info/rfc3675'>
<front>
<title>.sex Considered Dangerous</title>
<author initials='D.' surname='Eastlake 3rd' fullname='D. Eastlake 3rd'><organization /></author>
<date year='2004' month='February' />
<abstract><t>Periodically there are proposals to mandate the use of a special top level name or an IP address bit to flag &quot;adult&quot; or &quot;unsafe&quot; material or the like.  This document explains why this is an ill considered idea from the legal, philosophical, and particularly, the technical points of view.</t></abstract>
</front>
<seriesInfo name='RFC' value='3675'/>
<seriesInfo name='DOI' value='10.17487/RFC3675'/>
</reference>



<reference  anchor='RFC1984' target='https://www.rfc-editor.org/info/rfc1984'>
<front>
<title>IAB and IESG Statement on Cryptographic Technology and the Internet</title>
<author><organization>IAB</organization></author>
<author><organization>IESG</organization></author>
<date year='1996' month='August' />
<abstract><t>The Internet Architecture Board (IAB) and the Internet Engineering Steering Group (IESG), the bodies which oversee architecture and standards for the Internet, are concerned by the need for increased protection of international commercial transactions on the Internet, and by the need to offer all Internet users an adequate degree of privacy. This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='BCP' value='200'/>
<seriesInfo name='RFC' value='1984'/>
<seriesInfo name='DOI' value='10.17487/RFC1984'/>
</reference>



<reference  anchor='RFC5646' target='https://www.rfc-editor.org/info/rfc5646'>
<front>
<title>Tags for Identifying Languages</title>
<author initials='A.' surname='Phillips' fullname='A. Phillips' role='editor'><organization /></author>
<author initials='M.' surname='Davis' fullname='M. Davis' role='editor'><organization /></author>
<date year='2009' month='September' />
<abstract><t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object.  It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange.  This document  specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='47'/>
<seriesInfo name='RFC' value='5646'/>
<seriesInfo name='DOI' value='10.17487/RFC5646'/>
</reference>


<reference anchor="BCP72" target="https://datatracker.ietf.org/doc/bcp72/">
  <front>
    <title>Guidelines for Writing RFC Text on Security Considerations</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2003"/>
  </front>
</reference>
<reference anchor="Comninos" target="https://www.apc.org/sites/default/files/PRINT_ISSUE_Cyberseguridad_EN.pdf">
  <front>
    <title>A cyber security Agenda for civil society: What is at stake?</title>
    <author initials="." surname="Alex Comninos">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="Tao" target="https://www.ietf.org/about/participate/tao">
  <front>
    <title>The Tao of the IETF.</title>
    <author >
      <organization>Internet Engineering Task Force</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="UNGA" target="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G12/147/10/PDF/G1214710.pdf?OpenElement">
  <front>
    <title>The promotion, protection and enjoyment of human rights on the Internet.</title>
    <author >
      <organization>United Nations General Assembly</organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="ITU" target="https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx">
  <front>
    <title>Statisctics. Global, Regional and Country ICT Data.</title>
    <author >
      <organization>International Telecommunications Union (ITU)</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="WebFoundation" target="http://webfoundation.org/docs/2018/08/Advancing-Womens-Rights-Online_Gaps-and-Opportunities-in-Policy-and-Research.pdf">
  <front>
    <title>Advancing Women's Rights Online: Gaps and Opportunities in Policy and Research.</title>
    <author >
      <organization>Web Foundation</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="FPI" target="https://feministinternet.org">
  <front>
    <title>The Feminist Principles of the Internet.</title>
    <author >
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="SmKee" target="http://link.springer.com/10.1057/s41301-017-0137-2">
  <front>
    <title>Imagine a Feminist Internet.</title>
    <author initials="." surname="Jac Sm Kee">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="WhoseKnowledge" target="https://whoseknowledge.org/wp-content/uploads/2018/10/DTI-2018-Summary-Report.pdf">
  <front>
    <title>Decolonizing the Internet, Summary Report.</title>
    <author >
      <organization>Whose Knowledge</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="Arkko" target="https://datatracker.ietf.org/doc/draft-arkko-iab-internet-consolidation">
  <front>
    <title>Considerations on Internet Consolidation and the Internet Architecture.</title>
    <author initials="J." surname="Arkko">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="Collins" >
  <front>
    <title>Black Feminist Thought: Knowledge, consciousness and the politics of empowerment.</title>
    <author initials="P.H." surname="Collins">
      <organization></organization>
    </author>
    <date year="2000"/>
  </front>
</reference>
<reference anchor="Crenshaw" target="https://doi.org/10.4324/9780429500480-5">
  <front>
    <title>Demarginalizing the Intersection of Race and Sex: A Black Feminist Critique of Antidiscrimination Doctrine, Feminist Theory, and Antiracist Politics.</title>
    <author initials="K." surname="Crenshaw">
      <organization></organization>
    </author>
    <date year="1989"/>
  </front>
</reference>
<reference anchor="Lorde" >
  <front>
    <title>unknown.</title>
    <author initials="." surname="Lorde">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="Davis" >
  <front>
    <title>unknown.</title>
    <author initials="." surname="Davis">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="Hankivsky" target="http://vawforum-cwr.ca/sites/default/files/attachments/intersectionallity_101.pdf">
  <front>
    <title>Intersectionality 101.</title>
    <author initials="O." surname="Hankivsky">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="Mason" >
  <front>
    <title>Leading at the Intersections: An Introduction to the Intersectional Approach Model for Policy and Social Change.</title>
    <author initials="C.N." surname="Mason">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="Symington" target="https://www.awid.org/sites/default/files/atoms/files/intersectionality_a_tool_for_gender_and_economic_justice.pdf">
  <front>
    <title>Intersectionality: a Tool for Gender and Economic Justice.</title>
    <author initials="A." surname="Symington">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
</reference>
<reference anchor="tenOever" target="https://datatracker.ietf.org/doc/html/draft-irtf-hrpc-association">
  <front>
    <title>Freedom of Association on the Internet.</title>
    <author initials="N." surname="ten Oever">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="Knodel" target="https://datatracker.ietf.org/doc/draft-knodel-terminology">
  <front>
    <title>Terminology, Power and Offensive Language.</title>
    <author initials="M." surname="Knodel">
      <organization></organization>
    </author>
    <author initials="N." surname="ten Oever">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
</reference>


    </references>



  </back>
</rfc>

