<aside> ⚠️

Focus: This report describes safety, security, and privacy considerations arising when DPV (and DPV:27560 guidance) is used to model digital identification and consent/notice evidence without capturing scope of authority and notice-first constraints.

*** DOWNLOAD ***

Primary issues referenced:

1. Executive summary

This report identifies a systemic failure mode in machine-readable privacy and consent modeling: legal basis assertions and “consent receipt” artefacts can be represented without proving that the asserted legal basis is valid in context (authority + scope) and without proving notice occurred before identification and processing.

When these constraints are absent, DPV modeling can unintentionally enable:

2. DPV:27560-specific failure mode (ISO/IEC 27560 consent record → surveillance record)

DPV:27560 safety, security & privacy header

DPV:27560 safety, security & privacy header

2.1 Problem statement

DPV:27560 guidance risks encoding a structural category error: treating a controller-side PII processing record as if it were consent evidence.

When the model allows identifier-first recordkeeping, the resulting artefact functions as a surveillance record information structure that can be presented as “consent” (or “privacy receipt”) even when meaningful choice never occurred.

2.2 What the record must prove (minimum)

For a DPV:27560 artefact to be defensible as consent evidence (where consent is the legal basis), it must prove:

2.3 Specific DPV:27560 risk signals (from the ISO/IEC 27560 pattern)