[Note that this file is a concatenation of more than one RFC.]





Network Working Group                                         S. Bradner
Request for Comments: 2418                                        Editor
Obsoletes: 1603                                       Harvard University
BCP: 25                                                   September 1998
Category: Best Current Practice


                          IETF Working Group
                      Guidelines and Procedures

Status of this Memo

  This document specifies an Internet Best Current Practices for the
  Internet Community, and requests discussion and suggestions for
  improvements.  Distribution of this memo is unlimited.

Copyright Notice

  Copyright (C) The Internet Society (1998).  All Rights Reserved.

Abstract

  The Internet Engineering Task Force (IETF) has responsibility for
  developing and reviewing specifications intended as Internet
  Standards. IETF activities are organized into working groups (WGs).
  This document describes the guidelines and procedures for formation
  and operation of IETF working groups. It also describes the formal
  relationship between IETF participants WG and the Internet
  Engineering Steering Group (IESG) and the basic duties of IETF
  participants, including WG Chairs, WG participants, and IETF Area
  Directors.

Table of Contents

  Abstract .........................................................  1
  1. Introduction ..................................................  2
    1.1. IETF approach to standardization ..........................  4
    1.2. Roles within a Working Group ..............................  4
  2. Working group formation .......................................  4
    2.1. Criteria for formation ....................................  4
    2.2. Charter ...................................................  6
    2.3. Charter review & approval .................................  8
    2.4. Birds of a feather (BOF) ..................................  9
  3. Working Group Operation ....................................... 10
    3.1. Session planning .......................................... 11
    3.2. Session venue ............................................. 11
    3.3. Session management ........................................ 13
    3.4. Contention and appeals .................................... 15



Bradner                  Best Current Practice                  [Page 1]

RFC 2418                Working Group Guidelines          September 1998


  4. Working Group Termination ..................................... 15
  5. Rechartering a Working Group .................................. 15
  6. Staff Roles ................................................... 16
    6.1. WG Chair .................................................. 16
    6.2. WG Secretary .............................................. 18
    6.3. Document Editor ........................................... 18
    6.4. WG Facilitator ............................................ 18
    6.5. Design teams .............................................. 19
    6.6. Working Group Consultant .................................. 19
    6.7. Area Director ............................................. 19
  7. Working Group Documents ....................................... 19
    7.1. Session documents ......................................... 19
    7.2. Internet-Drafts (I-D) ..................................... 19
    7.3. Request For Comments (RFC) ................................ 20
    7.4. Working Group Last-Call ................................... 20
    7.5. Submission of documents ................................... 21
  8. Review of documents ........................................... 21
  9. Security Considerations ....................................... 22
  10. Acknowledgments .............................................. 23
  11. References ................................................... 23
  12. Editor's Address ............................................. 23
  Appendix:  Sample Working Group Charter .......................... 24
  Full Copyright Statement ......................................... 26

1. Introduction

  The Internet, a loosely-organized international collaboration of
  autonomous, interconnected networks, supports host-to-host
  communication through voluntary adherence to open protocols and
  procedures defined by Internet Standards.  There are also many
  isolated interconnected networks, which are not connected to the
  global Internet but use the Internet Standards. Internet Standards
  are developed in the Internet Engineering Task Force (IETF).  This
  document defines guidelines and procedures for IETF working groups.
  The Internet Standards Process of the IETF is defined in [1]. The
  organizations involved in the IETF Standards Process are described in
  [2] as are the roles of specific individuals.

  The IETF is a large, open community of network designers, operators,
  vendors, users, and researchers concerned with the Internet and the
  technology used on it. The primary activities of the IETF are
  performed by committees known as working groups. There are currently
  more than 100 working groups. (See the IETF web page for an up-to-
  date list of IETF Working Groups - http://www.ietf.org.) Working
  groups tend to have a narrow focus and a lifetime bounded by the
  completion of a specific set of tasks, although there are exceptions.





Bradner                  Best Current Practice                  [Page 2]

RFC 2418                Working Group Guidelines          September 1998


  For management purposes, the IETF working groups are collected
  together into areas, with each area having a separate focus.  For
  example, the security area deals with the development of security-
  related technology.  Each IETF area is managed by one or two Area
  Directors (ADs).  There are currently 8 areas in the IETF but the
  number changes from time to time.  (See the IETF web page for a list
  of the current areas, the Area Directors for each area, and a list of
  which working groups are assigned to each area.)

  In many areas, the Area Directors have formed an advisory group or
  directorate.  These comprise experienced members of the IETF and the
  technical community represented by the area.  The specific name and
  the details of the role for each group differ from area to area, but
  the primary intent is that these groups assist the Area Director(s),
  e.g., with the review of specifications produced in the area.

  The IETF area directors are selected by a nominating committee, which
  also selects an overall chair for the IETF.  The nominations process
  is described in [3].

  The area directors sitting as a body, along with the IETF Chair,
  comprise the Internet Engineering Steering Group (IESG). The IETF
  Executive Director is an ex-officio participant of the IESG, as are
  the IAB Chair and a designated Internet Architecture Board (IAB)
  liaison.  The IESG approves IETF Standards and approves the
  publication of other IETF documents.  (See [1].)

  A small IETF Secretariat provides staff and administrative support
  for the operation of the IETF.

  There is no formal membership in the IETF.  Participation is open to
  all.  This participation may be by on-line contribution, attendance
  at face-to-face sessions, or both.  Anyone from the Internet
  community who has the time and interest is urged to participate in
  IETF meetings and any of its on-line working group discussions.
  Participation is by individual technical contributors, rather than by
  formal representatives of organizations.

  This document defines procedures and guidelines for the formation and
  operation of working groups in the IETF. It defines the relations of
  working groups to other bodies within the IETF. The duties of working
  group Chairs and Area Directors with respect to the operation of the
  working group are also defined.  When used in this document the key
  words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
  "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" are to be
  interpreted as described in RFC 2119 [6].  RFC 2119 defines the use
  of these key words to help make the intent of standards track
  documents as clear as possible.  The same key words are used in this



Bradner                  Best Current Practice                  [Page 3]

RFC 2418                Working Group Guidelines          September 1998


  document to help smooth WG operation and reduce the chance for
  confusion about the processes.

1.1. IETF approach to standardization

  Familiarity with The Internet Standards Process [1] is essential for
  a complete understanding of the philosophy, procedures and guidelines
  described in this document.

1.2. Roles within a Working Group

  The document, "Organizations Involved in the IETF Standards Process"
  [2] describes the roles of a number of individuals within a working
  group, including the working group chair and the document editor.
  These descriptions are expanded later in this document.

2. Working group formation

  IETF working groups (WGs) are the primary mechanism for development
  of IETF specifications and guidelines, many of which are intended to
  be standards or recommendations. A working group may be established
  at the initiative of an Area Director or it may be initiated by an
  individual or group of individuals. Anyone interested in creating an
  IETF working group MUST obtain the advice and consent of the IETF
  Area Director(s) in whose area the working group would fall and MUST
  proceed through the formal steps detailed in this section.

  Working groups are typically created to address a specific problem or
  to produce one or more specific deliverables (a guideline, standards
  specification, etc.).  Working groups are generally expected to be
  short-lived in nature.  Upon completion of its goals and achievement
  of its objectives, the working group is terminated. A working group
  may also be terminated for other reasons (see section 4).
  Alternatively, with the concurrence of the IESG, Area Director, the
  WG Chair, and the WG participants, the objectives or assignment of
  the working group may be extended by modifying the working group's
  charter through a rechartering process (see section 5).

2.1. Criteria for formation

  When determining whether it is appropriate to create a working group,
  the Area Director(s) and the IESG will consider several issues:

   - Are the issues that the working group plans to address clear and
     relevant to the Internet community?

   - Are the goals specific and reasonably achievable, and achievable
     within a reasonable time frame?



Bradner                  Best Current Practice                  [Page 4]

RFC 2418                Working Group Guidelines          September 1998


   - What are the risks and urgency of the work, to determine the level
     of effort required?

   - Do the working group's activities overlap with those of another
     working group?  If so, it may still be appropriate to create the
     working group, but this question must be considered carefully by
     the Area Directors as subdividing efforts often dilutes the
     available technical expertise.

   - Is there sufficient interest within the IETF in the working
     group's topic with enough people willing to expend the effort to
     produce the desired result (e.g., a protocol specification)?
     Working groups require considerable effort, including management
     of the working group process, editing of working group documents,
     and contributing to the document text.  IETF experience suggests
     that these roles typically cannot all be handled by one person; a
     minimum of four or five active participants in the management
     positions are typically required in addition to a minimum of one
     or two dozen people that will attend the working group meetings
     and contribute on the mailing list.  NOTE: The interest must be
     broad enough that a working group would not be seen as merely the
     activity of a single vendor.

   - Is there enough expertise within the IETF in the working group's
     topic, and are those people interested in contributing in the
     working group?

   - Does a base of interested consumers (end-users) appear to exist
     for the planned work?  Consumer interest can be measured by
     participation of end-users within the IETF process, as well as by
     less direct means.

   - Does the IETF have a reasonable role to play in the determination
     of the technology?  There are many Internet-related technologies
     that may be interesting to IETF members but in some cases the IETF
     may not be in a position to effect the course of the technology in
     the "real world".  This can happen, for example, if the technology
     is being developed by another standards body or an industry
     consortium.

   - Are all known intellectual property rights relevant to the
     proposed working group's efforts issues understood?

   - Is the proposed work plan an open IETF effort or is it an attempt
     to "bless" non-IETF technology where the effect of input from IETF
     participants may be limited?





Bradner                  Best Current Practice                  [Page 5]

RFC 2418                Working Group Guidelines          September 1998


   - Is there a good understanding of any existing work that is
     relevant to the topics that the proposed working group is to
     pursue?  This includes work within the IETF and elsewhere.

   - Do the working group's goals overlap with known work in another
     standards body, and if so is adequate liaison in place?

  Considering the above criteria, the Area Director(s), using his or
  her best judgement, will decide whether to pursue the formation of
  the group through the chartering process.

2.2. Charter

  The formation of a working group requires a charter which is
  primarily negotiated between a prospective working group Chair and
  the relevant Area Director(s), although final approval is made by the
  IESG with advice from the Internet Architecture Board (IAB).  A
  charter is a contract between a working group and the IETF to perform
  a set of tasks.  A charter:

  1. Lists relevant administrative information for the working group;
  2. Specifies the direction or objectives of the working group and
     describes the approach that will be taken to achieve the goals;
     and
  3. Enumerates a set of milestones together with time frames for their
     completion.

  When the prospective Chair(s), the Area Director and the IETF
  Secretariat are satisfied with the charter form and content, it
  becomes the basis for forming a working group. Note that an Area
  Director MAY require holding an exploratory Birds of a Feather (BOF)
  meeting, as described below, to gage the level of support for a
  working group before submitting the charter to the IESG and IAB for
  approval.

  Charters may be renegotiated periodically to reflect the current
  status, organization or goals of the working group (see section 5).
  Hence, a charter is a contract between the IETF and the working group
  which is committing to meet explicit milestones and delivering
  specific "products".

  Specifically, each charter consists of the following sections:

  Working group name
     A working group name should be reasonably descriptive or
     identifiable. Additionally, the group shall define an acronym
     (maximum 8 printable ASCII characters) to reference the group in
     the IETF directories, mailing lists, and general documents.



Bradner                  Best Current Practice                  [Page 6]

RFC 2418                Working Group Guidelines          September 1998


  Chair(s)
     The working group may have one or more Chairs to perform the
     administrative functions of the group. The email address(es) of
     the Chair(s) shall be included.  Generally, a working group is
     limited to two chairs.

  Area and Area Director(s)
     The name of the IETF area with which the working group is
     affiliated and the name and electronic mail address of the
     associated Area Director(s).

  Responsible Area Director
     The Area Director who acts as the primary IESG contact for the
     working group.

  Mailing list
     An IETF working group MUST have a general Internet mailing list.
     Most of the work of an IETF working group will be conducted on the
     mailing list. The working group charter MUST include:

     1. The address to which a participant sends a subscription request
        and the procedures to follow when subscribing,

     2. The address to which a participant sends submissions and
        special procedures, if any, and

     3. The location of the mailing list archive. A message archive
        MUST be maintained in a public place which can be accessed via
        FTP or via the web.

        As a service to the community, the IETF Secretariat operates a
        mailing list archive for working group mailing lists. In order
        to take advantage of this service, working group mailing lists
        MUST include the address "[email protected]"
        (where "wg_acronym" is the working group acronym) in the
        mailing list in order that a copy of all mailing list messages
        be recorded in the Secretariat's archive.  Those archives are
        located at ftp://ftp.ietf.org/ietf-mail-archive.  For
        robustness, WGs SHOULD maintain an additional archive separate
        from that maintained by the Secretariat.

  Description of working group
     The focus and intent of the group shall be set forth briefly. By
     reading this section alone, an individual should be able to decide
     whether this group is relevant to their own work. The first
     paragraph must give a brief summary of the problem area, basis,
     goal(s) and approach(es) planned for the working group.  This
     paragraph can be used as an overview of the working group's



Bradner                  Best Current Practice                  [Page 7]

RFC 2418                Working Group Guidelines          September 1998


     effort.

     To facilitate evaluation of the intended work and to provide on-
     going guidance to the working group, the charter must describe the
     problem being solved and should discuss objectives and expected
     impact with respect to:

        - Architecture
        - Operations
        - Security
        - Network management
        - Scaling
        - Transition (where applicable)

  Goals and milestones
     The working group charter MUST establish a timetable for specific
     work items.  While this may be renegotiated over time, the list of
     milestones and dates facilitates the Area Director's tracking of
     working group progress and status, and it is indispensable to
     potential participants identifying the critical moments for input.
     Milestones shall consist of deliverables that can be qualified as
     showing specific achievement; e.g., "Internet-Draft finished" is
     fine, but "discuss via email" is not. It is helpful to specify
     milestones for every 3-6 months, so that progress can be gauged
     easily.  This milestone list is expected to be updated
     periodically (see section 5).

     An example of a WG charter is included as Appendix A.

2.3. Charter review & approval

  Proposed working groups often comprise technically competent
  participants who are not familiar with the history of Internet
  architecture or IETF processes.  This can, unfortunately, lead to
  good working group consensus about a bad design.  To facilitate
  working group efforts, an Area Director may assign a Consultant from
  among the ranks of senior IETF participants.  (Consultants are
  described in section 6.)  At the discretion of the Area Director,
  approval of a new WG may be withheld in the absence of sufficient
  consultant resources.

  Once the Area Director (and the Area Directorate, as the Area
  Director deems appropriate) has approved the working group charter,
  the charter is submitted for review by the IAB and approval by the
  IESG.  After a review period of at least a week the proposed charter
  is posted to the IETF-announce mailing list as a public notice that
  the formation of the working group is being considered.  At the same
  time the proposed charter is also posted to the "new-work" mailing



Bradner                  Best Current Practice                  [Page 8]

RFC 2418                Working Group Guidelines          September 1998


  list.  This mailing list has been created to let qualified
  representatives from other standards organizations know about pending
  IETF working groups.  After another review period lasting at least a
  week the IESG MAY approve the charter as-is, it MAY request that
  changes be made in the charter, or MAY decline to approve chartering
  of the working group

  If the IESG approves the formation of the working group it remands
  the approved charter to the IETF Secretariat who records and enters
  the information into the IETF tracking database.  The working group
  is announced to the IETF-announce a by the IETF Secretariat.

2.4. Birds of a Feather (BOF)

  Often it is not clear whether an issue merits the formation of a
  working group.  To facilitate exploration of the issues the IETF
  offers the possibility of a Birds of a Feather (BOF) session, as well
  as the early formation of an email list for preliminary discussion.
  In addition, a BOF may serve as a forum for a single presentation or
  discussion, without any intent to form a working group.

  A BOF is a session at an IETF meeting which permits "market research"
  and technical "brainstorming".  Any individual may request permission
  to hold a BOF on a subject. The request MUST be filed with a relevant
  Area Director who must approve a BOF before it can be scheduled. The
  person who requests the BOF may be asked to serve as Chair of the
  BOF.

  The Chair of the BOF is also responsible for providing a report on
  the outcome of the BOF.  If the Area Director approves, the BOF is
  then scheduled by submitting a request to [email protected] with copies
  to the Area Director(s). A BOF description and agenda are required
  before a BOF can be scheduled.

  Available time for BOFs is limited, and BOFs are held at the
  discretion of the ADs for an area.  The AD(s) may require additional
  assurances before authorizing a BOF.  For example,

   - The Area Director MAY require the establishment of an open email
     list prior to authorizing a BOF.  This permits initial exchanges
     and sharing of framework, vocabulary and approaches, in order to
     make the time spent in the BOF more productive.

   - The Area Director MAY require that a BOF be held, prior to
     establishing a working group (see section 2.2).

   - The Area Director MAY require that there be a draft of the WG
     charter prior to holding a BOF.



Bradner                  Best Current Practice                  [Page 9]

RFC 2418                Working Group Guidelines          September 1998


   - The Area Director MAY require that a BOF not be held until an
     Internet-Draft describing the proposed technology has been
     published so it can be used as a basis for discussion in the BOF.

  In general, a BOF on a particular topic is held only once (ONE slot
  at one IETF Plenary meeting). Under unusual circumstances Area
  Directors may, at their discretion, allow a BOF to meet for a second
  time. BOFs are not permitted to meet three times.  Note that all
  other things being equal, WGs will be given priority for meeting
  space over BOFs.  Also, occasionally BOFs may be held for other
  purposes than to discuss formation of a working group.

  Usually the outcome of a BOF will be one of the following:

   - There was enough interest and focus in the subject to warrant the
     formation of a WG;

   - While there was a reasonable level of interest expressed in the
     BOF some other criteria for working group formation was not met
     (see section 2.1).

   - The discussion came to a fruitful conclusion, with results to be
     written down and published, however there is no need to establish
     a WG; or

   - There was not enough interest in the subject to warrant the
     formation of a WG.

3.  Working Group Operation

  The IETF has basic requirements for open and fair participation and
  for thorough consideration of technical alternatives.  Within those
  constraints, working groups are autonomous and each determines most
  of the details of its own operation with respect to session
  participation, reaching closure, etc. The core rule for operation is
  that acceptance or agreement is achieved via working group "rough
  consensus".  WG participants should specifically note the
  requirements for disclosure of conflicts of interest in [2].

  A number of procedural questions and issues will arise over time, and
  it is the function of the Working Group Chair(s) to manage the group
  process, keeping in mind that the overall purpose of the group is to
  make progress towards reaching rough consensus in realizing the
  working group's goals and objectives.

  There are few hard and fast rules on organizing or conducting working
  group activities, but a set of guidelines and practices has evolved
  over time that have proven successful. These are listed here, with



Bradner                  Best Current Practice                 [Page 10]

RFC 2418                Working Group Guidelines          September 1998


  actual choices typically determined by the working group participants
  and the Chair(s).

3.1. Session planning

  For coordinated, structured WG interactions, the Chair(s) MUST
  publish a draft agenda well in advance of the actual session. The
  agenda should contain at least:

  - The items for discussion;
  - The estimated time necessary per item; and
  - A clear indication of what documents the participants will need to
    read before the session in order to be well prepared.

  Publication of the working group agenda shall include sending a copy
  of the agenda to the working group mailing list and to
  [email protected].

  All working group actions shall be taken in a public forum, and wide
  participation is encouraged. A working group will conduct much of its
  business via electronic mail distribution lists but may meet
  periodically to discuss and review task status and progress, to
  resolve specific issues and to direct future activities.  IETF
  Plenary meetings are the primary venue for these face-to-face working
  group sessions, and it is common (though not required) that active
  "interim" face-to-face meetings, telephone conferences, or video
  conferences may also be held.  Interim meetings are subject to the
  same rules for advance notification, reporting, open participation,
  and process, which apply to other working group meetings.

  All working group sessions (including those held outside of the IETF
  meetings) shall be reported by making minutes available.  These
  minutes should include the agenda for the session, an account of the
  discussion including any decisions made, and a list of attendees. The
  Working Group Chair is responsible for insuring that session minutes
  are written and distributed, though the actual task may be performed
  by someone designated by the Working Group Chair. The minutes shall
  be submitted in printable ASCII text for publication in the IETF
  Proceedings, and for posting in the IETF Directories and are to be
  sent to: [email protected]

3.2. Session venue

  Each working group will determine the balance of email and face-to-
  face sessions that is appropriate for achieving its milestones.
  Electronic mail permits the widest participation; face-to-face
  meetings often permit better focus and therefore can be more
  efficient for reaching a consensus among a core of the working group



Bradner                  Best Current Practice                 [Page 11]

RFC 2418                Working Group Guidelines          September 1998


  participants.  In determining the balance, the WG must ensure that
  its process does not serve to exclude contribution by email-only
  participants.  Decisions reached during a face-to-face meeting about
  topics or issues which have not been discussed on the mailing list,
  or are significantly different from previously arrived mailing list
  consensus MUST be reviewed on the mailing list.

  IETF Meetings
  If a WG needs a session at an IETF meeting, the Chair must apply for
  time-slots as soon as the first announcement of that IETF meeting is
  made by the IETF Secretariat to the WG-chairs list.  Session time is
  a scarce resource at IETF meetings, so placing requests early will
  facilitate schedule coordination for WGs requiring the same set of
  experts.

  The application for a WG session at an IETF meeting MUST be made to
  the IETF Secretariat at the address [email protected].  Some Area
  Directors may want to coordinate WG sessions in their area and
  request that time slots be coordinated through them.  If this is the
  case it will be noted in the IETF meeting announcement. A WG
  scheduling request MUST contain:

  - The working group name and full title;
  - The amount of time requested;
  - The rough outline of the WG agenda that is expected to be covered;
  - The estimated number of people that will attend the WG session;
  - Related WGs that should not be scheduled for the same time slot(s);
    and
  - Optionally a request can be added for the WG session to be
    transmitted over the Internet in audio and video.

  NOTE: While open discussion and contribution is essential to working
  group success, the Chair is responsible for ensuring forward
  progress.  When acceptable to the WG, the Chair may call for
  restricted participation (but not restricted attendance!) at IETF
  working group sessions for the purpose of achieving progress. The
  Working Group Chair then has the authority to refuse to grant the
  floor to any individual who is unprepared or otherwise covering
  inappropriate material, or who, in the opinion of the Chair is
  disrupting the WG process.  The Chair should consult with the Area
  Director(s) if the individual persists in disruptive behavior.

  On-line
  It can be quite useful to conduct email exchanges in the same manner
  as a face-to-face session, with published schedule and agenda, as
  well as on-going summarization and consensus polling.





Bradner                  Best Current Practice                 [Page 12]

RFC 2418                Working Group Guidelines          September 1998


  Many working group participants hold that mailing list discussion is
  the best place to consider and resolve issues and make decisions. The
  choice of operational style is made by the working group itself.  It
  is important to note, however, that Internet email discussion is
  possible for a much wider base of interested persons than is
  attendance at IETF meetings, due to the time and expense required to
  attend.

  As with face-to-face sessions occasionally one or more individuals
  may engage in behavior on a mailing list which disrupts the WG's
  progress.  In these cases the Chair should attempt to discourage the
  behavior by communication directly with the offending individual
  rather than on the open mailing list.  If the behavior persists then
  the Chair must involve the Area Director in the issue.  As a last
  resort and after explicit warnings, the Area Director, with the
  approval of the IESG, may request that the mailing list maintainer
  block the ability of the offending individual to post to the mailing
  list. (If the mailing list software permits this type of operation.)
  Even if this is done, the individual must not be prevented from
  receiving messages posted to the list.  Other methods of mailing list
  control may be considered but must be approved by the AD(s) and the
  IESG.

3.3. Session management

  Working groups make decisions through a "rough consensus" process.
  IETF consensus does not require that all participants agree although
  this is, of course, preferred.  In general, the dominant view of the
  working group shall prevail.  (However, it must be noted that
  "dominance" is not to be determined on the basis of volume or
  persistence, but rather a more general sense of agreement.) Consensus
  can be determined by a show of hands, humming, or any other means on
  which the WG agrees (by rough consensus, of course).  Note that 51%
  of the working group does not qualify as "rough consensus" and 99% is
  better than rough.  It is up to the Chair to determine if rough
  consensus has been reached.

  It can be particularly challenging to gauge the level of consensus on
  a mailing list.  There are two different cases where a working group
  may be trying to understand the level of consensus via a mailing list
  discussion. But in both cases the volume of messages on a topic is
  not, by itself, a good indicator of consensus since one or two
  individuals may be generating much of the traffic.

  In the case where a consensus which has been reached during a face-
  to-face meeting is being verified on a mailing list the people who
  were in the meeting and expressed agreement must be taken into
  account.  If there were 100 people in a meeting and only a few people



Bradner                  Best Current Practice                 [Page 13]

RFC 2418                Working Group Guidelines          September 1998


  on the mailing list disagree with the consensus of the meeting then
  the consensus should be seen as being verified.  Note that enough
  time should be given to the verification process for the mailing list
  readers to understand and consider any objections that may be raised
  on the list.  The normal two week last-call period should be
  sufficient for this.

  The other case is where the discussion has been held entirely over
  the mailing list.  The determination of the level of consensus may be
  harder to do in this case since most people subscribed to mailing
  lists do not actively participate in discussions on the list. It is
  left to the discretion of the working group chair how to evaluate the
  level of consensus.  The most common method used is for the working
  group chair to state what he or she believes to be the consensus view
  and. at the same time, requests comments from the list about the
  stated conclusion.

  The challenge to managing working group sessions is to balance the
  need for open and fair consideration of the issues against the need
  to make forward progress.  The working group, as a whole, has the
  final responsibility for striking this balance.  The Chair has the
  responsibility for overseeing the process but may delegate direct
  process management to a formally-designated Facilitator.

  It is occasionally appropriate to revisit a topic, to re-evaluate
  alternatives or to improve the group's understanding of a relevant
  decision.  However, unnecessary repeated discussions on issues can be
  avoided if the Chair makes sure that the main arguments in the
  discussion (and the outcome) are summarized and archived after a
  discussion has come to conclusion. It is also good practice to note
  important decisions/consensus reached by email in the minutes of the
  next 'live' session, and to summarize briefly the decision-making
  history in the final documents the WG produces.

  To facilitate making forward progress, a Working Group Chair may wish
  to decide to reject or defer the input from a member, based upon the
  following criteria:

  Old
  The input pertains to a topic that already has been resolved and is
  redundant with information previously available;

  Minor
  The input is new and pertains to a topic that has already been
  resolved, but it is felt to be of minor import to the existing
  decision;





Bradner                  Best Current Practice                 [Page 14]

RFC 2418                Working Group Guidelines          September 1998


  Timing
  The input pertains to a topic that the working group has not yet
  opened for discussion; or

  Scope
  The input is outside of the scope of the working group charter.

3.4. Contention and appeals

  Disputes are possible at various stages during the IETF process. As
  much as possible the process is designed so that compromises can be
  made, and genuine consensus achieved; however, there are times when
  even the most reasonable and knowledgeable people are unable to
  agree.  To achieve the goals of openness and fairness, such conflicts
  must be resolved by a process of open review and discussion.

  Formal procedures for requesting a review of WG, Chair, Area Director
  or IESG actions and conducting appeals are documented in The Internet
  Standards Process [1].

4. Working Group Termination

  Working groups are typically chartered to accomplish a specific task
  or tasks.  After the tasks are complete, the group will be disbanded.
  However, if a WG produces a Proposed or Draft Standard, the WG will
  frequently become dormant rather than disband (i.e., the WG will no
  longer conduct formal activities, but the mailing list will remain
  available to review the work as it moves to Draft Standard and
  Standard status.)

  If, at some point, it becomes evident that a working group is unable
  to complete the work outlined in the charter, or if the assumptions
  which that work was based have been modified in discussion or by
  experience, the Area Director, in consultation with the working group
  can either:

  1. Recharter to refocus its tasks,
  2. Choose new Chair(s), or
  3. Disband.

  If the working group disagrees with the Area Director's choice, it
  may appeal to the IESG (see section 3.4).

5. Rechartering a Working Group

  Updated milestones are renegotiated with the Area Director and the
  IESG, as needed, and then are submitted to the IESG Secretariat:
  [email protected].



Bradner                  Best Current Practice                 [Page 15]

RFC 2418                Working Group Guidelines          September 1998


  Rechartering (other than revising milestones) a working group follows
  the same procedures that the initial chartering does (see section 2).
  The revised charter must be submitted to the IESG and IAB for
  approval.  As with the initial chartering, the IESG may approve new
  charter as-is, it may request that changes be made in the new charter
  (including having the Working Group continue to use the old charter),
  or it may decline to approve the rechartered working group.  In the
  latter case, the working group is disbanded.

6. Staff Roles

  Working groups require considerable care and feeding.  In addition to
  general participation, successful working groups benefit from the
  efforts of participants filling specific functional roles.  The Area
  Director must agree to the specific people performing the WG Chair,
  and Working Group Consultant roles, and they serve at the discretion
  of the Area Director.

6.1. WG Chair

  The Working Group Chair is concerned with making forward progress
  through a fair and open process, and has wide discretion in the
  conduct of WG business.  The Chair must ensure that a number of tasks
  are performed, either directly or by others assigned to the tasks.

  The Chair has the responsibility and the authority to make decisions,
  on behalf of the working group, regarding all matters of working
  group process and staffing, in conformance with the rules of the
  IETF.  The AD has the authority and the responsibility to assist in
  making those decisions at the request of the Chair or when
  circumstances warrant such an intervention.

  The Chair's responsibility encompasses at least the following:

  Ensure WG process and content management

     The Chair has ultimate responsibility for ensuring that a working
     group achieves forward progress and meets its milestones.  The
     Chair is also responsible to ensure that the working group
     operates in an open and fair manner.  For some working groups,
     this can be accomplished by having the Chair perform all
     management-related activities.  In other working groups --
     particularly those with large or divisive participation -- it is
     helpful to allocate process and/or secretarial functions to other
     participants.  Process management pertains strictly to the style
     of working group interaction and not to its content. It ensures
     fairness and detects redundancy.  The secretarial function
     encompasses document editing.  It is quite common for a working



Bradner                  Best Current Practice                 [Page 16]

RFC 2418                Working Group Guidelines          September 1998


     group to assign the task of specification Editor to one or two
     participants.  Sometimes, they also are part of the design team,
     described below.

  Moderate the WG email list

     The Chair should attempt to ensure that the discussions on this
     list are relevant and that they converge to consensus agreements.
     The Chair should make sure that discussions on the list are
     summarized and that the outcome is well documented (to avoid
     repetition).  The Chair also may choose to schedule organized on-
     line "sessions" with agenda and deliverables.  These can be
     structured as true meetings, conducted over the course of several
     days (to allow participation across the Internet).

     Organize, prepare and chair face-to-face and on-line formal
     sessions.

  Plan WG Sessions

     The Chair must plan and announce all WG sessions well in advance
     (see section 3.1).

  Communicate results of sessions

     The Chair and/or Secretary must ensure that minutes of a session
     are taken and that an attendance list is circulated (see section
     3.1).

     Immediately after a session, the WG Chair MUST provide the Area
     Director with a very short report (approximately one paragraph,
     via email) on the session.

  Distribute the workload

     Of course, each WG will have participants who may not be able (or
     want) to do any work at all. Most of the time the bulk of the work
     is done by a few dedicated participants. It is the task of the
     Chair to motivate enough experts to allow for a fair distribution
     of the workload.

  Document development

     Working groups produce documents and documents need authors. The
     Chair must make sure that authors of WG documents incorporate
     changes as agreed to by the WG (see section 6.3).





Bradner                  Best Current Practice                 [Page 17]

RFC 2418                Working Group Guidelines          September 1998


  Document publication

     The Chair and/or Document Editor will work with the RFC Editor to
     ensure document conformance with RFC publication requirements [5]
     and to coordinate any editorial changes suggested by the RFC
     Editor.  A particular concern is that all participants are working
     from the same version of a document at the same time.

  Document implementations

     Under the procedures described in [1], the Chair is responsible
     for documenting the specific implementations which qualify the
     specification for Draft or Internet Standard status along with
     documentation about testing of the interoperation of these
     implementations.

6.2. WG Secretary

  Taking minutes and editing working group documents often is performed
  by a specifically-designated participant or set of participants.  In
  this role, the Secretary's job is to record WG decisions, rather than
  to perform basic specification.

6.3. Document Editor

  Most IETF working groups focus their efforts on a document, or set of
  documents, that capture the results of the group's work.  A working
  group generally designates a person or persons to serve as the Editor
  for a particular document.  The Document Editor is responsible for
  ensuring that the contents of the document accurately reflect the
  decisions that have been made by the working group.

  As a general practice, the Working Group Chair and Document Editor
  positions are filled by different individuals to help ensure that the
  resulting documents accurately reflect the consensus of the working
  group and that all processes are followed.

6.4. WG Facilitator

  When meetings tend to become distracted or divisive, it often is
  helpful to assign the task of "process management" to one
  participant.  Their job is to oversee the nature, rather than the
  content, of participant interactions.  That is, they attend to the
  style of the discussion and to the schedule of the agenda, rather
  than making direct technical contributions themselves.






Bradner                  Best Current Practice                 [Page 18]

RFC 2418                Working Group Guidelines          September 1998


6.5. Design teams

  It is often useful, and perhaps inevitable, for a sub-group of a
  working group to develop a proposal to solve a particular problem.
  Such a sub-group is called a design team.  In order for a design team
  to remain small and agile, it is acceptable to have closed membership
  and private meetings.  Design teams may range from an informal chat
  between people in a hallway to a formal set of expert volunteers that
  the WG chair or AD appoints to attack a controversial problem.  The
  output of a design team is always subject to approval, rejection or
  modification by the WG as a whole.

6.6. Working Group Consultant

  At the discretion of the Area Director, a Consultant may be assigned
  to a working group.  Consultants have specific technical background
  appropriate to the WG and experience in Internet architecture and
  IETF process.

6.7. Area Director

  Area Directors are responsible for ensuring that working groups in
  their area produce coherent, coordinated, architecturally consistent
  and timely output as a contribution to the overall results of the
  IETF.

7.  Working Group Documents

7.1. Session documents

  All relevant documents to be discussed at a session should be
  published and available as Internet-Drafts at least two weeks before
  a session starts.  Any document which does not meet this publication
  deadline can only be discussed in a working group session with the
  specific approval of the working group chair(s).  Since it is
  important that working group members have adequate time to review all
  documents, granting such an exception should only be done under
  unusual conditions.  The final session agenda should be posted to the
  working group mailing list at least two weeks before the session and
  sent at that time to [email protected] for publication on the IETF web
  site.

7.2. Internet-Drafts (I-D)

  The Internet-Drafts directory is provided to working groups as a
  resource for posting and disseminating in-process copies of working
  group documents. This repository is replicated at various locations
  around the Internet. It is encouraged that draft documents be posted



Bradner                  Best Current Practice                 [Page 19]

RFC 2418                Working Group Guidelines          September 1998


  as soon as they become reasonably stable.

  It is stressed here that Internet-Drafts are working documents and
  have no official standards status whatsoever. They may, eventually,
  turn into a standards-track document or they may sink from sight.
  Internet-Drafts are submitted to: [email protected]

  The format of an Internet-Draft must be the same as for an RFC [2].
  Further, an I-D must contain:

  - Beginning, standard, boilerplate text which is provided by the
    Secretariat on their web site and in the ftp directory;
  - The I-D filename; and
  - The expiration date for the I-D.

  Complete specification of requirements for an Internet-Draft are
  found in the file "1id-guidelines.txt" in the Internet-Drafts
  directory at an Internet Repository site.  The organization of the
  Internet-Drafts directory is found in the file "1id-organization" in
  the Internet-Drafts directory at an Internet Repository site.  This
  file also contains the rules for naming Internet-Drafts.  (See [1]
  for more information about Internet-Drafts.)

7.3. Request For Comments (RFC)

  The work of an IETF working group often results in publication of one
  or more documents, as part of the Request For Comments (RFCs) [1]
  series. This series is the archival publication record for the
  Internet community. A document can be written by an individual in a
  working group, by a group as a whole with a designated Editor, or by
  others not involved with the IETF.

  NOTE: The RFC series is a publication mechanism only and publication
  does not determine the IETF status of a document.  Status is
  determined through separate, explicit status labels assigned by the
  IESG on behalf of the IETF.  In other words, the reader is reminded
  that all Internet Standards are published as RFCs, but NOT all RFCs
  specify standards [4].

7.4. Working Group Last-Call

  When a WG decides that a document is ready for publication it may be
  submitted to the IESG for consideration. In most cases the
  determination that a WG feels that a document is ready for
  publication is done by the WG Chair issuing a working group Last-
  Call.  The decision to issue a working group Last-Call is at the
  discretion of the WG Chair working with the Area Director.  A working
  group Last-Call serves the same purpose within a working group that



Bradner                  Best Current Practice                 [Page 20]

RFC 2418                Working Group Guidelines          September 1998


  an IESG Last-Call does in the broader IETF community (see [1]).

7.5. Submission of documents

  Once that a WG has determined at least rough consensus exists within
  the WG for the advancement of a document the following must be done:

  - The version of the relevant document exactly as agreed to by the WG
    MUST be in the Internet-Drafts directory.

  - The relevant document MUST be formatted according to section 7.3.

  - The WG Chair MUST send email to the relevant Area Director.  A copy
    of the request MUST be also sent to the IESG Secretariat.  The mail
    MUST contain the reference to the document's ID filename, and the
    action requested.  The copy of the message to the IESG Secretariat
    is to ensure that the request gets recorded by the Secretariat so
    that they can monitor the progress of the document through the
    process.

  Unless returned by the IESG to the WG for further development,
  progressing of the document is then the responsibility of the IESG.
  After IESG approval, responsibility for final disposition is the
  joint responsibility of the RFC Editor, the WG Chair and the Document
  Editor.

8. Review of documents

  The IESG reviews all documents submitted for publication as RFCs.
  Usually minimal IESG review is necessary in the case of a submission
  from a WG intended as an Informational or Experimental RFC. More
  extensive review is undertaken in the case of standards-track
  documents.

  Prior to the IESG beginning their deliberations on standards-track
  documents, IETF Secretariat will issue a "Last-Call" to the IETF
  mailing list (see [1]). This Last Call will announce the intention of
  the IESG to consider the document, and it will solicit final comments
  from the IETF within a period of two weeks.  It is important to note
  that a Last-Call is intended as a brief, final check with the
  Internet community, to make sure that no important concerns have been
  missed or misunderstood. The Last-Call should not serve as a more
  general, in-depth review.

  The IESG review takes into account responses to the Last-Call and
  will lead to one of these possible conclusions:





Bradner                  Best Current Practice                 [Page 21]

RFC 2418                Working Group Guidelines          September 1998


  1. The document is accepted as is for the status requested.
     This fact will be announced by the IETF Secretariat to the IETF
     mailing list and to the RFC Editor.

  2. The document is accepted as-is but not for the status requested.
     This fact will be announced by the IETF Secretariat to the IETF
     mailing list and to the RFC Editor (see [1] for more details).

  3. Changes regarding content are suggested to the author(s)/WG.
     Suggestions from the IESG must be clear and direct, so as to
     facilitate working group and author correction of the
     specification.  If the author(s)/WG can explain to the
     satisfaction of the IESG why the changes are not necessary, the
     document will be accepted for publication as under point 1, above.
     If the changes are made the revised document may be resubmitted
     for IESG review.

  4. Changes are suggested by the IESG and a change in status is
     recommended.
     The process described above for 3 and 2 are followed in that
     order.

  5. The document is rejected.
     Any document rejection will be accompanied by specific and
     thorough arguments from the IESG. Although the IETF and working
     group process is structured such that this alternative is not
     likely to arise for documents coming from a working group, the
     IESG has the right and responsibility to reject documents that the
     IESG feels are fatally flawed in some way.

     If any individual or group of individuals feels that the review
     treatment has been unfair, there is the opportunity to make a
     procedural complaint. The mechanism for this type of complaints is
     described in [1].

9. Security Considerations

  Documents describing IETF processes, such as this one, do not have an
  impact on the security of the network infrastructure or of Internet
  applications.

  It should be noted that all IETF working groups are required to
  examine and understand the security implications of any technology
  they develop.  This analysis must be included in any resulting RFCs
  in a Security Considerations section.  Note that merely noting a
  significant security hole is no longer sufficient.  IETF developed
  technologies should not add insecurity to the environment in which
  they are run.



Bradner                  Best Current Practice                 [Page 22]

RFC 2418                Working Group Guidelines          September 1998


10. Acknowledgments

  This revision of this document relies heavily on the previous version
  (RFC 1603) which was edited by Erik Huizer and Dave Crocker.  It has
  been reviewed by the Poisson Working Group.

11. References

  [1] Bradner, S., Editor, "The Internet Standards Process -- Revision
      3", BCP 9, RFC 2026, October 1996.

  [2] Hovey, R., and S. Bradner, "The Organizations involved in the
      IETF Standards Process", BCP 11, RFC 2028, October 1996.

  [3] Gavin, J., "IAB and IESG Selection, Confirmation, and Recall
      Process: Operation of the Nominating and Recall Committees", BCP
      10, RFC 2282, February 1998.

  [4] Huitema, C., J. Postel, S. Crocker, "Not all RFCs are Standards",
      RFC 1796, April 1995.

  [5] Postel, J., and J. Reynolds, "Instructions to RFC Authors", RFC
      2223, October 1997.

  [6] Bradner, S., "Key words for use in RFCs to Indicate Requirement
      Level", BCP 14, RFC 2119, March 1997.


12. Editor's Address

  Scott Bradner
  Harvard University
  1350 Mass Ave.
  Cambridge MA
  02138
  USA

  Phone +1 617 495 3864
  EMail: [email protected]












Bradner                  Best Current Practice                 [Page 23]

RFC 2418                Working Group Guidelines          September 1998


  Appendix:  Sample Working Group Charter

  Working Group Name:
       IP Telephony (iptel)

  IETF Area:
       Transport Area

  Chair(s):
       Jonathan Rosenberg <[email protected]>

  Transport Area Director(s):
       Scott Bradner <[email protected]>
       Allyn Romanow <[email protected]>

  Responsible Area Director:
       Allyn Romanow <[email protected]>

  Mailing Lists:
       General Discussion:[email protected]
       To Subscribe: [email protected]
       Archive: http://www.bell-labs.com/mailing-lists/siptel

  Description of Working Group:

  Before Internet telephony can become a widely deployed service, a
  number of protocols must be deployed. These include signaling and
  capabilities exchange, but also include a number of "peripheral"
  protocols for providing related services.

  The primary purpose of this working group is to develop two such
  supportive protocols and a frameword document. They are:

  1. Call Processing Syntax. When a call is setup between two
  endpoints, the signaling will generally pass through several servers
  (such as an H.323 gatekeeper) which are responsible for forwarding,
  redirecting, or proxying the signaling messages. For example, a user
  may make a call to [email protected]. The signaling message to
  initiate the call will arrive at some server at bigcompany. This
  server can inform the caller that the callee is busy, forward the
  call initiation request to another server closer to the user, or drop
  the call completely (among other possibilities). It is very desirable
  to allow the callee to provide input to this process, guiding the
  server in its decision on how to act. This can enable a wide variety
  of advanced personal mobility and call agent services.






Bradner                  Best Current Practice                 [Page 24]

RFC 2418                Working Group Guidelines          September 1998


  Such preferences can be expressed in a call processing syntax, which
  can be authored by the user (or generated automatically by some
  tool), and then uploaded to the server. The group will develop this
  syntax, and specify means of securely transporting and extending it.
  The result will be a single standards track RFC.

  2. In addition, the group will write a service model document, which
  describes the services that are enabled by the call processing
  syntax, and discusses how the syntax can be used. This document will
  result in a single RFC.

  3. Gateway Attribute Distribution Protocol. When making a call
  between an IP host and a PSTN user, a telephony gateway must be used.
  The selection of such gateways can be based on many criteria,
  including client expressed preferences, service provider preferences,
  and availability of gateways, in addition to destination telephone
  number.  Since gateways outside of the hosts' administrative domain
  might be used, a protocol is required to allow gateways in remote
  domains to distribute their attributes (such as PSTN connectivity,
  supported codecs, etc.) to entities in other domains which must make
  a selection of a gateway. The protocol must allow for scalable,
  bandwidth efficient, and very secure transmission of these
  attributes. The group will investigate and design a protocol for this
  purpose, generate an Internet Draft, and advance it to RFC as
  appropriate.

  Goals and Milestones:

  May 98    Issue first Internet-Draft on service framework
  Jul 98    Submit framework ID to IESG for publication as an RFC.
  Aug 98    Issue first Internet-Draft on Call Processing Syntax
  Oct 98    Submit Call processing syntax to IESG for consideration
            as a Proposed Standard.
  Dec 98    Achieve consensus on basics of gateway attribute
            distribution protocol
  Jan 99    Submit Gateway Attribute Distribution protocol to IESG
            for consideration as a RFC (info, exp, stds track TB














Bradner                  Best Current Practice                 [Page 25]

RFC 2418                Working Group Guidelines          September 1998


Full Copyright Statement

  Copyright (C) The Internet Society (1998).  All Rights Reserved.

  This document and translations of it may be copied and furnished to
  others, and derivative works that comment on or otherwise explain it
  or assist in its implementation may be prepared, copied, published
  and distributed, in whole or in part, without restriction of any
  kind, provided that the above copyright notice and this paragraph are
  included on all such copies and derivative works.  However, this
  document itself may not be modified in any way, such as by removing
  the copyright notice or references to the Internet Society or other
  Internet organizations, except as needed for the purpose of
  developing Internet standards in which case the procedures for
  copyrights defined in the Internet Standards process must be
  followed, or as required to translate it into languages other than
  English.

  The limited permissions granted above are perpetual and will not be
  revoked by the Internet Society or its successors or assigns.

  This document and the information contained herein is provided on an
  "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
  TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
  BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
  HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
  MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
























Bradner                  Best Current Practice                 [Page 26]

=========================================================================





Network Working Group                                       M. Wasserman
Request for Comments: 3934                                    ThingMagic
Updates: 2418                                               October 2004
BCP: 94
Category: Best Current Practice


  Updates to RFC 2418 Regarding the Management of IETF Mailing Lists

Status of this Memo

  This document specifies an Internet Best Current Practices for the
  Internet Community, and requests discussion and suggestions for
  improvements.  Distribution of this memo is unlimited.

Copyright Notice

  Copyright (C) The Internet Society (2004).

Abstract

  This document is an update to RFC 2418 that gives WG chairs explicit
  responsibility for managing WG mailing lists.  In particular, it
  gives WG chairs the authority to temporarily suspend the mailing list
  posting privileges of disruptive individuals.

Table of Contents

  1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2
  2.  Specific Changes to RFC 2418 . . . . . . . . . . . . . . . . .  2
  3.  Security Considerations  . . . . . . . . . . . . . . . . . . .  3
  4.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . .  3
  5.  References . . . . . . . . . . . . . . . . . . . . . . . . . .  3
      5.1.  Normative References . . . . . . . . . . . . . . . . . .  3
      5.2.  Informative References . . . . . . . . . . . . . . . . .  3
  6.  Author's Address . . . . . . . . . . . . . . . . . . . . . . .  4
  7.  Full Copyright Statement . . . . . . . . . . . . . . . . . . .  5














Wasserman                Best Current Practice                  [Page 1]

RFC 3934             Mailing List Management Update         October 2004


1.  Introduction

  As written, RFC 2418 [RFC2418] gives WG chairs more authority to
  manage face-to-face discussions than to manage mailing list
  discussions.  In face-to-face meetings, the WG chair has the
  authority "to refuse to grant the floor to any individual who is
  unprepared or otherwise covering inappropriate material, or who, in
  the opinion of the Chair, is disrupting the WG process."  However,
  RFC 2418 does not give the WG Chair the authority to suspend the
  mailing list posting privileges of an individual who is similarly
  disrupting WG mailing list discussions.  RFC 2418 explicitly requires
  full IESG approval for this action.

  This document is an update to RFC 2418, section 3.2.  It gives WG
  chairs the authority to temporarily suspend the posting privileges of
  disruptive individuals without IESG approval.

2.  Specific Changes to RFC 2418

  The following paragraphs supersede the last paragraph of RFC 2418,
  section 3.2:

  As in face-to-face sessions, occasionally one or more individuals may
  engage in behavior on a mailing list that, in the opinion of the WG
  chair, is disruptive to the WG process.  Unless the disruptive
  behavior is severe enough that it must be stopped immediately, the WG
  chair should attempt to discourage the disruptive behavior by
  communicating directly with the offending individual.  If the
  behavior persists, the WG chair should send at least one public
  warning on the WG mailing list.  As a last resort and typically after
  one or more explicit warnings and consultation with the responsible
  Area Director, the WG chair may suspend the mailing list posting
  privileges of the disruptive individual for a period of not more than
  30 days.  Even while posting privileges are suspended, the individual
  must not be prevented from receiving messages posted to the list.
  Like all other WG chair decisions, any suspension of posting
  privileges is subject to appeal, as described in RFC 2026 [RFC2026].

  This mechanism is intended to permit a WG chair to suspend posting
  privileges of a disruptive individual for a short period of time.
  This mechanism does not permit WG chairs to suspend an individual's
  posting privileges for a period longer than 30 days regardless of the
  type or severity of the disruptive incident.  However, further
  disruptive behavior by the same individual will be considered
  separately and may result in further warnings or suspensions.  Other
  methods of mailing list control, including longer suspensions, must





Wasserman                Best Current Practice                  [Page 2]

RFC 3934             Mailing List Management Update         October 2004


  be carried out in accordance with other IETF-approved procedures.
  See BCP 83 [RFC3683] for one set of procedures already defined and
  accepted by the community.

3.  Security Considerations

  This document describes a modification to the IETF process for
  managing mailing list discussions.  It has no security
  considerations.

4.  Acknowledgements

  This document reflects a discussion that was held on the MPOWR
  mailing list in December 2003 and January 2004.  In particular, the
  following people contributed ideas that influenced this document:
  Harald Alvestrand, Dave Crocker, James Kempf, and John Klensin.

  This document was written with the xml2rfc tool described in RFC 2629
  [RFC2629].

5.  References

5.1.  Normative References

  [RFC2026]  Bradner, S., "The Internet Standards Process -- Revision
             3", BCP 9, RFC 2026, October 1996.

  [RFC2418]  Bradner, S., "IETF Working Group Guidelines and
             Procedures", BCP 25, RFC 2418, September 1998.

5.2.  Informative References

  [RFC2629]  Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
             June 1999.

  [RFC3683]  Rose, M., "A Practice for Revoking Posting Rights to IETF
             Mailing Lists", BCP 83, RFC 3683, March 2004.














Wasserman                Best Current Practice                  [Page 3]

RFC 3934             Mailing List Management Update         October 2004


6.  Author's Address

  Margaret Wasserman
  ThingMagic
  One Broadway, 14th Floor
  Cambridge, MA  02142
  USA

  Phone: +1 617 758 4177
  EMail: [email protected]
  URI:   http://www.thingmagic.com/








































Wasserman                Best Current Practice                  [Page 4]

RFC 3934             Mailing List Management Update         October 2004


7.  Full Copyright Statement

  Copyright (C) The Internet Society (2004).

  This document is subject to the rights, licenses and restrictions
  contained in BCP 78, and at www.rfc-editor.org, and except as set
  forth therein, the authors retain all their rights.

  This document and the information contained herein are provided on an
  "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
  OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
  ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
  INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
  INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
  WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

  The IETF takes no position regarding the validity or scope of any
  Intellectual Property Rights or other rights that might be claimed to
  pertain to the implementation or use of the technology described in
  this document or the extent to which any license under such rights
  might or might not be available; nor does it represent that it has
  made any independent effort to identify any such rights.  Information
  on the ISOC's procedures with respect to rights in ISOC Documents can
  be found in BCP 78 and BCP 79.

  Copies of IPR disclosures made to the IETF Secretariat and any
  assurances of licenses to be made available, or the result of an
  attempt made to obtain a general license or permission for the use of
  such proprietary rights by implementers or users of this
  specification can be obtained from the IETF on-line IPR repository at
  http://www.ietf.org/ipr.

  The IETF invites any interested party to bring to its attention any
  copyrights, patents or patent applications, or other proprietary
  rights that may cover technology that may be required to implement
  this standard.  Please address the information to the IETF at ietf-
  [email protected].

Acknowledgement

  Funding for the RFC Editor function is currently provided by the
  Internet Society.







Wasserman                Best Current Practice                  [Page 5]

=========================================================================





Internet Engineering Task Force (IETF)                        P. Resnick
Request for Comments: 7776                   Qualcomm Technologies, Inc.
BCP: 25                                                        A. Farrel
Updates: 2418, 7437                                     Juniper Networks
Category: Best Current Practice                               March 2016
ISSN: 2070-1721


                   IETF Anti-Harassment Procedures

Abstract

  IETF Participants must not engage in harassment while at IETF
  meetings, virtual meetings, or social events or while participating
  in mailing lists.  This document lays out procedures for managing and
  enforcing this policy.

  This document updates RFC 2418 by defining new working group
  guidelines and procedures.  This document updates RFC 7437 by
  allowing the Ombudsteam to form a recall petition without further
  signatories.

Status of This Memo

  This memo documents an Internet Best Current Practice.

  This document is a product of the Internet Engineering Task Force
  (IETF).  It represents the consensus of the IETF community.  It has
  received public review and has been approved for publication by the
  Internet Engineering Steering Group (IESG).  Further information on
  BCPs is available in Section 2 of RFC 5741.

  Information about the current status of this document, any errata,
  and how to provide feedback on it may be obtained at
  http://www.rfc-editor.org/info/rfc7776.
















Resnick & Farrel          Best Current Practice                 [Page 1]

RFC 7776               Anti-Harassment Procedures             March 2016


Copyright Notice

  Copyright (c) 2016 IETF Trust and the persons identified as the
  document authors.  All rights reserved.

  This document is subject to BCP 78 and the IETF Trust's Legal
  Provisions Relating to IETF Documents
  (http://trustee.ietf.org/license-info) in effect on the date of
  publication of this document.  Please review these documents
  carefully, as they describe your rights and restrictions with respect
  to this document.  Code Components extracted from this document must
  include Simplified BSD License text as described in Section 4.e of
  the Trust Legal Provisions and are provided without warranty as
  described in the Simplified BSD License.

Table of Contents

  1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
  2.  Definitions . . . . . . . . . . . . . . . . . . . . . . . . .   3
  3.  The Ombudsteam  . . . . . . . . . . . . . . . . . . . . . . .   5
    3.1.  Size of the Ombudsteam  . . . . . . . . . . . . . . . . .   5
    3.2.  Appointing the Ombudsteam . . . . . . . . . . . . . . . .   5
    3.3.  Professional Advisors . . . . . . . . . . . . . . . . . .   5
    3.4.  Qualifications and Training . . . . . . . . . . . . . . .   6
    3.5.  Term of Service . . . . . . . . . . . . . . . . . . . . .   6
    3.6.  Compensation  . . . . . . . . . . . . . . . . . . . . . .   6
    3.7.  Removal . . . . . . . . . . . . . . . . . . . . . . . . .   7
    3.8.  Disputes with the IETF Chair Regarding the Ombudsteam . .   7
  4.  Handling Reports of Harassment  . . . . . . . . . . . . . . .   7
    4.1.  Ombudsteam Operating Practices  . . . . . . . . . . . . .   8
  5.  Remedies  . . . . . . . . . . . . . . . . . . . . . . . . . .  10
    5.1.  Remedies for Respondents in IETF Positions  . . . . . . .  11
    5.2.  Purpose of Remedies . . . . . . . . . . . . . . . . . . .  13
  6.  Disputes with the Ombudsteam  . . . . . . . . . . . . . . . .  14
  7.  Conflicts of Interest . . . . . . . . . . . . . . . . . . . .  15
  8.  Confidentiality . . . . . . . . . . . . . . . . . . . . . . .  15
  9.  Security Considerations . . . . . . . . . . . . . . . . . . .  16
  10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  16
    10.1.  Normative References . . . . . . . . . . . . . . . . . .  16
    10.2.  Informative References . . . . . . . . . . . . . . . . .  17
  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .  17
  Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  18









Resnick & Farrel          Best Current Practice                 [Page 2]

RFC 7776               Anti-Harassment Procedures             March 2016


1.  Introduction

  The IETF has general policies for managing disruptive behavior in the
  context of IETF activities.  In particular, [RFC7154] provides a set
  of guidelines for personal interaction in the IETF, and [RFC2418] and
  [RFC3934] give guidelines for how to deal with disruptive behavior
  that occurs in the context of IETF working group face-to-face
  meetings and on mailing lists.

  However, there is other problematic behavior that may be more
  personal and that can occur in the context of IETF activities
  (meetings, mailing list discussions, or social events) that does not
  directly disrupt working group progress but nonetheless is
  unacceptable behavior between IETF Participants.  This sort of
  behavior, described in the IESG Statement "IETF Anti-Harassment
  Policy" [Policy], is not easily dealt with by our previously existing
  working group guidelines and procedures.  Therefore, this document
  sets forth procedures to deal with such harassing behavior.

  These procedures are intended to be used when other IETF policies and
  procedures do not apply or have been ineffective.

  Nothing in this document should be taken to interfere with the due
  process of law.  Similarly, it does not release any person from any
  contractual or corporate policies to which they may be subject.

2.  Definitions

  The following terms are used in this document:

  o  IETF Participant: Anyone who participates in an IETF activity,
     including IETF support staff.

  o  Reporter: An IETF Participant who reports potential harassment to
     an Ombudsperson.

  o  Respondent: An IETF Participant who is claimed to have engaged in
     harassing behavior.

  o  Ombudsteam: A group of people who have been selected to take
     reports of potential harassment, evaluate them, and impose
     appropriate actions and/or remedies to address the circumstances.

  o  Ombudsperson: A member of the Ombudsteam.

  o  Lead Ombudsperson: The Ombudsperson assigned to be the primary
     contact person for a particular report of potential harassment.




Resnick & Farrel          Best Current Practice                 [Page 3]

RFC 7776               Anti-Harassment Procedures             March 2016


  o  Subject: An individual, group, or class of IETF Participant to
     whom the potentially harassing behavior was directed or who might
     be subject to the behavior.

  The IESG Statement on harassment [Policy] gives a general definition
  of harassment as:

     unwelcome hostile or intimidating behavior -- in particular,
     speech or behavior that is sexually aggressive or intimidates
     based on attributes such as race, gender, religion, age, color,
     national origin, ancestry, disability, sexual orientation, or
     gender identity.

  This document adopts that general definition but does not attempt to
  further precisely define behavior that falls under the set of
  procedures identified here, nor does it attempt to list every
  possible attribute that might be the basis for harassment, except to
  note that it may be targeted at an individual, directed at a specific
  group of people, or more generally impact a broader class of people.

  This document concerns itself with harassment that has the purpose or
  effect of unreasonably interfering with an individual's participation
  in IETF activities or of creating an environment within the IETF that
  would be intimidating, hostile, or offensive in such a situation.
  One way in which harassment can occur is when submission to such
  conduct is made, either explicitly or implicitly, a term or condition
  of an individual's participation in IETF activities or is used as a
  basis for decisions affecting that individual's relationship to the
  IETF.

  In general, disruptive behavior that occurs in the context of an IETF
  general or working group mailing list, or happens in a face-to-face
  or virtual meeting of a working group or the IETF plenary, can be
  dealt with by our normal procedures, whereas harassing behavior is
  more appropriately handled by the procedures described here.
  However, there are plausible reasons to address behaviors that take
  place during working group meetings using these procedures.  This
  document gives some guidance to those involved in these situations in
  order to decide how to handle particular incidents, but the final
  decision will involve judgment and the guidance of the Ombudsteam.

  Any definition of harassment prohibited by an applicable law can be
  subject to this set of procedures.








Resnick & Farrel          Best Current Practice                 [Page 4]

RFC 7776               Anti-Harassment Procedures             March 2016


3.  The Ombudsteam

  This section describes the role of the Ombudsteam in terms of the
  appointment of Ombudspersons, their qualifications and training, the
  length of the term of service, any compensation from the IETF for
  their service, and how they may be removed from service.  The general
  operational procedures for the Ombudsteam are described in Sections
  4, 5, and 6.

3.1.  Size of the Ombudsteam

  The Ombudsteam shall comprise no fewer than three people.  From time
  to time, the size may fall below that number owing to changes in
  membership, but the team will be rapidly brought up to size through
  new appointments.  The team may be grown to a larger size as
  described in Section 3.2

3.2.  Appointing the Ombudsteam

  The Ombudsteam is appointed by the IETF Chair.  The appointment is
  solely the responsibility of the IETF Chair, who may choose to
  consult with members of the IETF community.

  The IETF Chair is encouraged to appoint at least some of the
  Ombudsteam from within the IETF community.

  The IETF Chair may choose to solicit nominations or advertise the
  post.  This is entirely at the discretion of the IETF Chair.

  The IETF Chair is also free to decide to appoint more than three
  Ombudspersons to the Ombudsteam.  This may depend on the skill sets
  available, the work load, and the opinions of the seated Ombudsteam.
  Furthermore, the IETF Chair may consider elements of diversity in
  making this decision.

3.3.  Professional Advisors

  It is recognized that the Ombudsteam may need to call on professional
  services from external advisors for certain matters, including legal
  and Human Resources (HR) advice.  The IETF (via the IETF
  Administrative Support Activity (IASA)) is committed to funding such
  advice as needed.









Resnick & Farrel          Best Current Practice                 [Page 5]

RFC 7776               Anti-Harassment Procedures             March 2016


3.4.  Qualifications and Training

  It is not expected that there will be candidates with all of the
  necessary Ombudsperson skills and training who also have a clear
  understanding and familiarity with the IETF processes and culture.
  The Chair might choose someone with a great deal of professional
  experience evaluating and mediating harassment disputes but little
  exposure to the IETF or could select someone with more exposure to
  the IETF community but without as much experience dealing with issues
  of harassment.  Since all of these attributes may be regarded by the
  IETF Chair as essential for the team, the IETF is committed to
  providing training (or funding for it) as deemed necessary for
  appointed Ombudspersons.  In determining the appropriate training,
  the IETF Chair and Ombudsteam shall take professional advice and will
  consult with the IETF Administrative Oversight Committee (IAOC) with
  respect to the overall IETF budget.

3.5.  Term of Service

  An Ombudsperson shall be appointed for a two-year term.  That is, the
  Ombudsperson is making a commitment to serve for two years.  It is
  understood, however, that circumstances may lead an Ombudsperson to
  resign for personal or other reasons.  See also Section 3.7.

  If an Ombudsperson's term ends while they are acting as Lead
  Ombudsperson for a report as described in Section 4, that
  Ombudsperson's term shall be extended until the handling of that
  report has been completed.

  It is entirely at the discretion of the IETF Chair whether a serving
  Ombudsperson is reappointed at the end of their term.  Given the
  sensitivity of, and training required for, this role and the ideal
  being a lack of activity, it is likely the IETF Chair may choose to
  reappoint a successful and still-willing Ombudsperson for a number of
  two-year terms.

3.6.  Compensation

  An Ombudsperson shall receive no compensation from the IETF for their
  services.  This includes, but is not limited to:

  o  IETF meeting fees

  o  Remuneration for time spent

  o  Out-of-pocket expenses (such as telephone charges)

  o  Travel or accommodation expenses



Resnick & Farrel          Best Current Practice                 [Page 6]

RFC 7776               Anti-Harassment Procedures             March 2016


  The IETF will, however, meet the costs of training when agreed to by
  the IETF Chair as described in Section 3.4.

3.7.  Removal

  The IETF Chair may remove a serving Ombudsperson before the end of
  their term without explanation to the community, including during the
  course of processing an active case.  Such an action shall be
  appealable as described in Section 3.8.

  An Ombudsperson shall not be removed from service, even if their term
  has expired, during the period that the IETF Chair is recused as
  described in Section 7.  Once the case that led to the Chair being
  recused has been closed, normal processes resume.

3.8.  Disputes with the IETF Chair Regarding the Ombudsteam

  If an individual should disagree with an action taken by the IETF
  Chair regarding the appointment, removal, or management of an
  Ombudsperson or the Ombudsteam, that person should first discuss the
  issue with the IETF Chair directly.  If the IETF Chair is unable to
  resolve the issue, the dissatisfied party may appeal to the IESG as a
  whole.  The IESG shall then review the situation and attempt to
  resolve it in a manner of its own choosing.  The procedures of
  Section 6.5.4 of [RFC2026] apply to this sort of appeal.

4.  Handling Reports of Harassment

  Any IETF Participant who believes that they have been harassed, or
  that any other IETF Participant or group of IETF Participants has
  been or may have been harassed, should bring the concern to the
  attention of any serving Ombudsperson.  This can be done by email to
  [email protected] or can be done directly to a chosen Ombudsperson.
  Direct contact information for the members of the Ombudsteam,
  including the email addresses to which mail to [email protected] is
  forwarded, can be found at <https://www.ietf.org/ombudsteam>
  [OmbudsteamPages].

  All IETF Participants are encouraged to talk with the Ombudsteam if
  they are uncomfortable or unsure about any behaviors.  Though much of
  this document relates to the formal duties of the Ombudsteam, it
  should be understood that an important function of the Ombudsteam is
  to provide confidential advice and counsel for any IETF Participant
  regarding issues of harassment.  The Ombudsteam will not commence a
  formal investigation of any potential incident of harassment without
  agreement by the Reporter and Subject.





Resnick & Farrel          Best Current Practice                 [Page 7]

RFC 7776               Anti-Harassment Procedures             March 2016


  When a Reporter brings an incident of potential harassment to the
  attention of the Ombudsteam, a single Ombudsperson shall be
  designated as the primary contact person (the Lead Ombudsperson) for
  the report.  When the Reporter contacts a single Ombudsperson, that
  Ombudsperson shall be the Lead Ombudsperson for the report unless the
  Reporter and Ombudsperson mutually agree to select another Lead
  Ombudsperson.

  Information conveyed by the Reporter should be kept in confidence by
  the Lead Ombudsperson to the greatest extent possible.  When
  necessary (for example, in the course of a formal investigation), the
  Lead Ombudsperson may share information regarding the report with the
  rest of the Ombudsteam except when an Ombudsperson is recused (see
  Section 7).  If a Reporter believes that a member of the Ombudsteam
  should recuse themself, the Reporter should make this known to the
  Lead Ombudsperson as soon as possible.  See Section 4.1 for further
  discussion of the confidentiality requirements of the Ombudsteam.

  The Lead Ombudsperson will discuss the events with the Reporter and
  may give advice, including recommendations on how the Reporter can
  handle the issue on their own as well as strategies on how to prevent
  the issue from arising again.  The Lead Ombudsperson may also
  indicate that the issue would be best handled using regular IETF
  procedures (such as those for dealing with disruptive behavior)
  outside the context of harassment, and in this case, the Lead
  Ombudsperson will provide assistance in using the relevant IETF
  procedures.  Otherwise, with agreement to proceed from the Subject
  (or the Reporter if there is no individual Subject), the Ombudsteam
  may initiate a detailed investigation of the matter and may
  subsequently, after completing their investigation, impose a remedy
  as described in Section 5.  The Subject can withdraw their agreement
  to proceed at any time.

4.1.  Ombudsteam Operating Practices

  The Ombudsteam is responsible for devising and documenting their
  operating practices.  These practices must be discussed with the IESG
  and published in a publicly visible place (such as on the IETF web
  site).  Discussion with the IETF community is encouraged and, while
  IETF consensus is not necessary, significant objections to the
  processes that are not addressed should result in an appeal per
  Section 6.5.3 of [RFC2026] and/or a recall petition against the IETF
  Chair (and any of the rest of the IESG if appropriate) if they do not
  address the concern.







Resnick & Farrel          Best Current Practice                 [Page 8]

RFC 7776               Anti-Harassment Procedures             March 2016


  The practices must include at least the following high-level
  components:

  o  Each member of the Ombudsteam is expected to be present at the
     majority of IETF meetings and to be available for face-to-face
     discussions.  The Ombudsteam is expected to arrange itself so that
     there is coverage of every IETF meeting by at least one
     Ombudsperson.

  o  The Ombudsteam shall strive to keep all information brought to it
     in strict confidence.  However, it is acknowledged that the
     operation of the Ombudsteam may involve sharing of information
     within the team and may require that the parties to the complaint
     (the Reporter, Respondent, and Subject) learn some of the
     confidential information.  The Ombudsteam is responsible for
     documenting its expectations of when disclosures of confidential
     information are likely to be made in the process and to whom.  Any
     electronic information (such as email messages) that needs to be
     archived shall be encrypted before it is stored using tools
     similar to those used by the Nominating Committee (NomCom).

  o  When conducting a detailed investigation of the circumstances
     regarding the complaint of harassment, the Ombudsteam may contact
     the Respondent and request a meeting in person or by a voice call.
     The Ombudsteam shall have contacted the Respondent and either
     discussed the matter or ascertained the Respondent's unwillingness
     to cooperate prior to deciding to impose a remedy as described in
     Section 5.  The Respondent is not obliged to cooperate, but the
     Ombudsteam may consider failure to cooperate when determining a
     remedy (Section 5).

  o  The Ombudsteam shall endeavor to complete its investigation in a
     timely manner.

  o  Any individuals who make a good faith report of harassment or who
     cooperate with an investigation shall not be subject to
     retaliation for reporting, complaining, or cooperating, even if
     the investigation, once completed, shows no harassment occurred.
     Anti-retaliation is noted here to alleviate concerns individuals
     may have with reporting an incident they feel should be reviewed
     or cooperating with an investigation.

  o  In all cases, the Ombudsteam will strive to maintain
     confidentiality for all parties, including the very fact of
     contact with the Ombudsteam.






Resnick & Farrel          Best Current Practice                 [Page 9]

RFC 7776               Anti-Harassment Procedures             March 2016


  o  The results of investigations as reported to the Subject or
     Respondent and all requests for remedial action (such as to the
     IETF Secretariat) shall be in writing.

  o  The Ombudsteam shall keep written records of their investigation
     and any contacts or interviews such that there is material
     available in the event of an appeal or legal action.  Such records
     shall be held securely and in confidence.

  When investigating reports of harassment and determining remedies, it
  is up to the Ombudsteam whether they choose to act as a body or
  delegate duties to the Lead Ombudsperson.

5.  Remedies

  After examining the circumstances regarding the complaint of
  harassment, the Ombudsteam should prepare a brief summary of the
  incident and their conclusions and discuss this with all parties.
  The objective of this step is to make clear what the Ombudsteam has
  concluded and to make an attempt at getting all parties to reach
  agreement.

  If the Ombudsteam determines that harassment has taken place, the
  Ombudsteam is expected to determine the next action.

  o  In some cases, a mechanism or established IETF process may already
     exist for handling the specific event.  In these cases, the
     Ombudsteam may decide that the misbehavior is best handled with
     the regular IETF procedures for dealing with disruptive behavior
     and may assist the Reporter to bring the issue to the attention of
     the WG Chair or IESG member who can deal with the incident.

  o  In other cases, there is a spectrum of remedies that may be
     appropriate to the circumstances.  At one end of the spectrum, the
     Ombudsteam might choose to discuss the situation with the
     Respondent and come up with a plan such that there is no repeat of
     the harassment.  With the agreement of both parties, the
     Ombudsteam can also help to mediate a conversation between the
     Respondent and the Subject (or the Reporter if there is no
     individual Subject) in order to address the issue.  If mediation
     fails, then the Ombudsteam can decide to apply other remedies,
     including those discussed here.

  o  At the other end of the spectrum, the Ombudsteam could decide that
     the Respondent is no longer permitted to participate in a
     particular IETF activity, for example, ejecting them from a
     meeting or requiring that the Respondent can no longer attend
     future meetings to ensure that the reported harassment cannot



Resnick & Farrel          Best Current Practice                [Page 10]

RFC 7776               Anti-Harassment Procedures             March 2016


     continue or escalate.  If the Respondent holds a management
     position in the IETF, the remedies imposed may make it difficult
     or impossible for them to perform the duties required of that
     position.  Further remedies may be applied to Respondents in IETF
     management positions as described in Section 5.1.

  o  In determining the appropriate remedy, the Ombudsteam may
     communicate with the Reporter, Subject, or Respondent in order to
     assess the impact that the imposition of a remedy might have on
     any of those parties.  However, the Ombudsteam has ultimate
     responsibility for the choice of remedy.

  o  In all cases, the Lead Ombudsperson informs the Respondent of the
     decision and imposes the remedy as appropriate.  In cases where
     the remedy is removal from IETF activities, the Lead Ombudsperson
     will confidentially notify the Secretariat in writing of the
     remedy such that the Secretariat can take whatever logistical
     actions are required to effect the remedy.  Only the remedy itself
     shall be disclosed to the Secretariat, not any information
     regarding the nature of the harassment.

  Where specific action is required to ensure that a remedy is realized
  or enforced, the Ombudsteam will make a request in writing to the
  IETF Secretariat and/or IETF Administrative Director (IAD) to take
  action as appropriate.

5.1.  Remedies for Respondents in IETF Positions

  The remedies discussed earlier in this section are equally applicable
  to all IETF Participants regardless of role.

  The Ombudsteam will want to be aware of the impact of remedies on the
  ability of an individual to carry out their duties in IETF management
  positions, but this should not dissuade the Ombudsteam from applying
  remedies that they deem appropriate.  Per Section 5, the Ombudsteam
  is expected to apply proportionality and reasonableness, as well as
  to consider the impact of the remedy on the Respondent.  Per
  Section 4.1, the Ombudsteam may communicate with the Respondent in
  order to assess the impact that the remedy might have.

  There may be cases where the Ombudsteam considers that it is
  inappropriate for a Respondent to continue in their IETF management
  position, that is, where the desired remedy is to remove the
  Respondent from their management position.  The Ombudsteam cannot by
  itself remove a Respondent who is in an IETF management position from
  that position.  However, the Ombudsteam can recommend the use of
  existing mechanisms within the IETF process for the removal of people
  from IETF management positions as follows:



Resnick & Farrel          Best Current Practice                [Page 11]

RFC 7776               Anti-Harassment Procedures             March 2016


  o  Many IETF management positions are appointed by the NomCom with
     confirmation from the IESG, IAB, or ISOC.  [RFC7437] describes the
     recall procedure for such appointments.  This document updates
     [RFC7437] by allowing the Ombudsteam to form a recall petition on
     its own and without requiring 20 signatories from the community.
     Such a petition shall be treated in all ways like any other recall
     petition as described in [RFC7437]: that is, the fact of the
     petition and its signatories (the Ombudsteam) shall be announced
     to the IETF community, and a Recall Committee Chair shall be
     appointed to complete the Recall Committee process.  It is
     expected that the Recall Committee will receive a briefing from
     the Ombudsteam explaining why recall is considered an appropriate
     remedy.

  o  Other IETF management positions are filled by appointment of the
     IESG, the IAB, the ISOC Board, or the ISOC President.  In such
     cases, the Ombudsteam may recommend to the appointing body that
     the Respondent be removed from their position.

  o  Many IETF management positions are filled through appointment by
     an AD or by the ADs for an IETF Area.  In such cases, the
     Ombudsteam may recommend to those ADs in writing that the
     Respondent be removed from their position.

  o  Some other IETF management positions are filled through
     appointment by WG Chairs.  In such cases, the Ombudsteam may make
     a recommendation in writing to the responsible AD (that is, not
     directly to the WG Chairs) that the Respondent be removed from
     their position.

  In each of the cases listed here, it is expected that the person or
  body responsible for removing someone from an IETF management
  position will take a recommendation from the Ombudsteam extremely
  seriously and that it would be very unusual for them to not act on
  the recommendation.  It is not the intent that the person or body
  attempt to reinvestigate the circumstances of the harassment.  They
  are expected to understand that they are not qualified in evaluating
  or handling issues of harassment.  They must seek to preserve
  confidentiality.  If the person or body feels removal from position
  is not the correct remedy, they must discuss their concern with the
  Ombudsteam.

  In the event that an AD declines to follow the recommendation of the
  Ombudsteam, and if the AD fails to convince the Ombudsteam of the
  reasons for this, the Ombudsteam should raise the issue with the
  whole IESG while continuing to attempt to retain confidentiality.
  The IESG may choose to reorganize the responsibilities for working




Resnick & Farrel          Best Current Practice                [Page 12]

RFC 7776               Anti-Harassment Procedures             March 2016


  groups within its own structure so that the AD concerned is no longer
  in the direct management path.

  All such forced removals from management positions must be considered
  by the Ombudsteam as acts of last resort.  That is, before a
  Respondent is recommended for removal, the Ombudsteam should consider
  other possible remedies and should discuss the situation with the
  Respondent, giving them ample opportunity to understand what might
  happen and to step down of their own volition.

  As described in Section 4.1, the Ombudsteam is required to maintain
  the highest degree of confidentiality.  In recommending action as
  described above, the Ombudsteam will clearly have to indicate that
  some event has occurred that led to their recommendation, but it is
  not expected that the Ombudsteam will need to divulge substantially
  more information.  It should be enough that the Ombudsteam explains
  the severity of the situation, that they have considered other lesser
  remedies, and that they deem the recommended remedy to be
  appropriate.

  In removing someone from their position, it may become apparent to
  the IETF community that the removal is a remedy recommended by the
  Ombudsteam.  However, revealing the underlying events should be
  avoided as far as possible.

5.2.  Purpose of Remedies

  The purpose of the anti-harassment policy is to prevent all incidents
  of harassment in the IETF.  The set of procedures documented here
  serves to provide a mechanism whereby any harassment that occurs can
  be reported and handled both sympathetically and effectively.  The
  policy also sends a clear message that the IETF does not tolerate
  harassment in any form.

  However, any remedy is imposed to try to make sure that the incident
  does not escalate and to ensure that a similar situation is unlikely
  to occur with the same Respondent in the future.

  Because the handling of incidents of harassment (including the
  imposition of remedies) is confidential, an imposed remedy cannot
  itself serve as a deterrent to others, nor can it be used to "teach"
  the community how to behave.  ([RFC7154] gives guidelines for conduct
  in the IETF.)  Furthermore, a remedy is not to be imposed for the
  purposes of retribution.  However, the knowledge of the existence of
  a range of remedies and of processes by which they can be applied
  serves both as a statement of the IETF's seriousness in this matter
  and as a deterrent to potential offenders.




Resnick & Farrel          Best Current Practice                [Page 13]

RFC 7776               Anti-Harassment Procedures             March 2016


  The Ombudsteam is expected to apply the above considerations, as well
  as proportionality and reasonableness, in selecting a remedy.  They
  are asked to consider the impact of the remedy on the Respondent as
  well as on the Subject.

6.  Disputes with the Ombudsteam

  If either the Subject (or the Reporter if there is no individual
  Subject) or the Respondent is dissatisfied with the decision of the
  Ombudsteam, the dissatisfied party should first contact the Lead
  Ombudsperson and discuss the situation.  If the issue cannot be
  resolved through discussion with the Lead Ombudsperson, the issue may
  be raised with the IETF Chair.

  If necessary, the IETF Chair may recuse themself from any part of
  this process (see Section 7) and request the IESG to select another
  of its members to serve in this role.  This IESG member is known as
  the "delegated IESG member".

  The IETF Chair (or the delegated IESG member if the Chair is recused)
  will attempt to resolve the issue in discussion with the dissatisfied
  party and the Lead Ombudsperson.  If this further discussion does not
  bring a satisfactory resolution, the Ombudsteam's decision may be
  formally appealed.  The appeal is strictly on the issue of whether
  the Ombudsteam exercised due diligence both in their decision as to
  whether harassment had taken place as well as in their determination
  of any appropriate remedy that was imposed.  In particular, the
  purpose of the appeal is not to re-investigate the circumstances of
  the incident or to negotiate the severity of the remedy.

  All elements of the appeal, including the fact of the appeal, will be
  held in confidence but will be recorded and held securely for future
  reference.

  The appeal will be evaluated by the IETF Chair (or the delegated IESG
  member) and two other members of the IESG selected by the IETF Chair
  (or the delegated IESG member) and confirmed by the appellant.  This
  Appeals Group shall convene as quickly as possible to evaluate and
  determine the appeal.  Where the impacts are immediate and related to
  participation in an ongoing meeting, this shall happen in no more
  than 24 hours after receiving the appeal.  The Appeals Group may ask
  the appellant and the Lead Ombudsperson for statements or other
  information to consider.  If the Appeals Group concludes that due
  diligence was exercised by the Ombudsteam, this shall be reported to
  the appellant, and the matter is concluded.  If the Appeals Group
  finds that due diligence was not exercised, the Appeals Group shall
  report this to the Ombudsteam and consult with the Ombudsteam on how
  to complete the due diligence.



Resnick & Farrel          Best Current Practice                [Page 14]

RFC 7776               Anti-Harassment Procedures             March 2016


  Because of the need to keep the information regarding these matters
  as confidential as possible, the Appeals Group's decision is final
  with respect to the question of whether the Ombudsteam has used due
  diligence in their decision.  The only further recourse available is
  to claim that the procedures themselves (i.e., the procedures
  described in this document) are inadequate or insufficient to the
  protection of the rights of all parties.  Such a claim may be made in
  an appeal to the Internet Society Board of Trustees, as described in
  Section 6.5.3 of [RFC2026].  Again, even in this circumstance, the
  particulars of the incident at hand will be held in confidence.

7.  Conflicts of Interest

  In the event of any conflict of interest, the conflicted person
  (member of the Ombudsteam, member of the Appeals Group, IETF Chair,
  etc.) is expected to recuse themselves.

  A conflict of interest may arise if someone involved in the process
  of handling a harassment report is in the role of Reporter,
  Respondent, or Subject.  Furthermore, a conflict of interest arises
  if the person involved in the process of handling a harassment report
  is closely associated personally or through affiliation with any of
  the Reporter, Respondent, or Subject.

  For the avoidance of doubt, recusal in this context means completely
  stepping out of any advisory or decision-making part of any process
  associated with handling a harassment report, remedy arising from a
  harassment report, or appeal into the handling of a harassment
  report.  That means that a recused person has no more right to
  participate in or witness the process than any other person from the
  community in the same situation.  For example, an Ombudsperson
  subject to a complaint of harassment shall not be privy to the
  deliberations of another Ombudsperson handling the report.  Nor would
  an IESG member who was party to an appeal be able to witness the
  discussions of the Appeals Group.

  In the event that there is an appeal and the IETF Chair is somehow
  involved, the Chair will immediately recuse themself, and the IESG
  will select a single person to take the Chair's role in the appeal
  process as described in Section 6.

8.  Confidentiality

  Throughout this document, there are mentions of requirements to keep
  information confidential.  This section summarizes those requirements
  for clarity.





Resnick & Farrel          Best Current Practice                [Page 15]

RFC 7776               Anti-Harassment Procedures             March 2016


  The Ombudsteam is expected to strive for confidentiality.
  Confidentiality protects the Reporter, Subject, and Respondent in any
  case of alleged harassment.  It also protects witnesses or others
  consulted by the Ombudsteam during their investigation.

  The Ombudsteam will keep its email and other archival records in a
  secure system and will not discuss details of any case beyond what is
  necessary for executing a thorough investigation.

  Third-party receivers of output from the Ombudsteam (for example, ADs
  or the IETF Secretariat who are asked to take action) are required to
  keep such output confidential.

  Participants in an investigation (Reporters, Subjects, Respondents,
  and anyone interviewed by the Ombudsteam during an investigation) are
  requested to keep the details of the events and investigation
  confidential.

  It is likely that members of the community will want to know more
  when they have become aware of some details of a case of harassment.
  The community is asked to show restraint and to trust the Ombudsteam.
  This process is designed to provide remedies not punishment, as
  described in Section 5.2, and public discussion of the events or
  remedies does not form part of this process.

9.  Security Considerations

  "Human beings the world over need freedom and security that they may
  be able to realize their full potential." -- Aung San Suu Kyi

10.  References

10.1.  Normative References

  [RFC2026]  Bradner, S., "The Internet Standards Process -- Revision
             3", BCP 9, RFC 2026, DOI 10.17487/RFC2026, October 1996,
             <http://www.rfc-editor.org/info/rfc2026>.

  [RFC2418]  Bradner, S., "IETF Working Group Guidelines and
             Procedures", BCP 25, RFC 2418, DOI 10.17487/RFC2418,
             September 1998, <http://www.rfc-editor.org/info/rfc2418>.

  [RFC3934]  Wasserman, M., "Updates to RFC 2418 Regarding the
             Management of IETF Mailing Lists", BCP 25, RFC 3934,
             DOI 10.17487/RFC3934, October 2004,
             <http://www.rfc-editor.org/info/rfc3934>.





Resnick & Farrel          Best Current Practice                [Page 16]

RFC 7776               Anti-Harassment Procedures             March 2016


  [RFC7154]  Moonesamy, S., Ed., "IETF Guidelines for Conduct", BCP 54,
             RFC 7154, DOI 10.17487/RFC7154, March 2014,
             <http://www.rfc-editor.org/info/rfc7154>.

  [RFC7437]  Kucherawy, M., Ed., "IAB, IESG, and IAOC Selection,
             Confirmation, and Recall Process: Operation of the
             Nominating and Recall Committees", BCP 10, RFC 7437,
             DOI 10.17487/RFC7437, January 2015,
             <http://www.rfc-editor.org/info/rfc7437>.

10.2.  Informative References

  [OmbudsteamPages]
             IESG, "Reporting Potential Harassment",
             <https://www.ietf.org/ombudsteam>.

  [Policy]   IESG, "IETF Anti-Harassment Policy",
             <https://www.ietf.org/iesg/statement/
             ietf-anti-harassment-policy.html>.

Acknowledgements

  The text in this document benefited from the lively discussion on the
  [email protected] mailing list.  Thanks to everyone who participated.

  Specific changes to this document resulted from comments by
  Abdussalam Baryun, Alessandro Vesely, S. Moonesamy, Timothy
  B. Terriberry, John Levine, Andrea Glorioso, Dave Crocker, John
  Leslie, Linda Klieforth, Brian Carpenter, Mary Barnes, Richard
  Barnes, Spencer Dawkins, Michael StJohns, Alissa Cooper, James
  Woodyatt, Tom Taylor, Sam Hartman, Stewart Bryant, Stephen Farrell,
  Nico Williams, Mark Nottingham, and Jari Arkko.  The authors would
  like to express their gratitude.

  A design team comprising Linda Klieforth, Allison Mankin, Suresh
  Krishnan, Pete Resnick, and Adrian Farrel was convened by the IETF
  Chair (Jari Arkko) to address the issue of "Remedies for Respondents
  in IETF Positions" and the text in Section 5.1.

  The authors would like to thank Ines Robles for diligent shepherding
  of this document and for tracking the many issues raised in and after
  IETF last call.

  Thanks to Greg Kapfer at ISOC, Ray Pelletier (the IAD), Scott Bradner
  and Lou Berger on the IAOC, and Scott Young and David Wilson of
  Thompson Hine for considering the legal and insurance implications.





Resnick & Farrel          Best Current Practice                [Page 17]

RFC 7776               Anti-Harassment Procedures             March 2016


Authors' Addresses

  Pete Resnick
  Qualcomm Technologies, Inc.
  5775 Morehouse Drive
  San Diego, CA  92121
  United States

  Phone: +1 858 651 4478
  Email: [email protected]


  Adrian Farrel
  Juniper Networks

  Email: [email protected]



































Resnick & Farrel          Best Current Practice                [Page 18]

=========================================================================



Internet Engineering Task Force (IETF)                        P. Resnick
Request for Comments: 8716            Episteme Technology Consulting LLC
BCP: 25                                                        A. Farrel
Updates: 7776                                         Old Dog Consulting
Category: Best Current Practice                            February 2020
ISSN: 2070-1721


Update to the IETF Anti-Harassment Procedures for the Replacement of the
     IETF Administrative Oversight Committee (IAOC) with the IETF
                          Administration LLC

Abstract

  The IETF Anti-Harassment Procedures are described in RFC 7776.

  The IETF Administrative Oversight Committee (IAOC) has been replaced
  by the IETF Administration LLC, and the IETF Administrative Director
  has been replaced by the IETF LLC Executive Director.  This document
  updates RFC 7776 to amend these terms.

  RFC 7776 contained updates to RFC 7437.  RFC 8713 has incorporated
  those updates, so this document also updates RFC 7776 to remove those
  updates.

Status of This Memo

  This memo documents an Internet Best Current Practice.

  This document is a product of the Internet Engineering Task Force
  (IETF).  It represents the consensus of the IETF community.  It has
  received public review and has been approved for publication by the
  Internet Engineering Steering Group (IESG).  Further information on
  BCPs is available in Section 2 of RFC 7841.

  Information about the current status of this document, any errata,
  and how to provide feedback on it may be obtained at
  https://www.rfc-editor.org/info/rfc8716.

Copyright Notice

  Copyright (c) 2020 IETF Trust and the persons identified as the
  document authors.  All rights reserved.

  This document is subject to BCP 78 and the IETF Trust's Legal
  Provisions Relating to IETF Documents
  (https://trustee.ietf.org/license-info) in effect on the date of
  publication of this document.  Please review these documents
  carefully, as they describe your rights and restrictions with respect
  to this document.  Code Components extracted from this document must
  include Simplified BSD License text as described in Section 4.e of
  the Trust Legal Provisions and are provided without warranty as
  described in the Simplified BSD License.

Table of Contents

  1.  Introduction
  2.  Changes to RFC 7776
    2.1.  Changes to Section 3.4
    2.2.  Changes to Section 5
    2.3.  Changes to References to RFC 7437
      2.3.1.  Changes to Metadata
      2.3.2.  Changes to the Abstract
      2.3.3.  Changes to Section 5.1
  3.  IANA Considerations
  4.  Security Considerations
  5.  References
    5.1.  Normative References
    5.2.  Informative References
  Acknowledgements
  Authors' Addresses

1.  Introduction

  The IETF Anti-Harassment Procedures are described in RFC 7776
  [RFC7776].  Those procedures include direction for the IETF Chair and
  Ombudsteam to take advice from the IETF Administrative Oversight
  Committee (IAOC) with respect to the budget available for training.

  The IAOC has been replaced by the IETF Administration LLC, and the
  IETF Administrative Director has been replaced by the IETF LLC
  Executive Director.  This document updates RFC 7776 to amend these
  terms and to update a reference.

  RFC 7776 contained updates to [RFC7437].  [RFC8713] has incorporated
  those updates, so this document also updates RFC 7776 to remove those
  updates.

  This document makes no other changes to the procedures described in
  RFC 7776.

2.  Changes to RFC 7776

2.1.  Changes to Section 3.4

  Section 3.4 of [RFC7776] is about the qualifications and training of
  the Ombudsteam.  The last paragraph of that section is replaced as
  follows:

  OLD

  |  In determining the appropriate training, the IETF Chair and
  |  Ombudsteam shall take professional advice and will consult with
  |  the IETF Administrative Oversight Committee (IAOC) with respect to
  |  the overall IETF budget.

  NEW

  |  In determining the appropriate training, the IETF Chair and
  |  Ombudsteam shall take professional advice and will consult with
  |  the IETF Administration LLC with respect to the overall IETF
  |  budget.

  END

2.2.  Changes to Section 5

  Section 5 of [RFC7776] is about remedies available to the Ombudsteam.
  The last paragraph of that section is replaced as follows:

  OLD

  |  Where specific action is required to ensure that a remedy is
  |  realized or enforced, the Ombudsteam will make a request in
  |  writing to the IETF Secretariat and/or IETF Administrative
  |  Director (IAD) to take action as appropriate.

  NEW

  |  Where specific action is required to ensure that a remedy is
  |  realized or enforced, the Ombudsteam will make a request in
  |  writing to the IETF Secretariat and/or IETF LLC Executive Director
  |  to take action as appropriate.

  END

2.3.  Changes to References to RFC 7437

  RFC 7776 updated RFC 7437 [RFC7437] by allowing the Ombudsteam to
  form a recall petition.  This document does not change any of the
  associated processes.  However, during the process of documenting the
  replacement of the IAOC by the IETF Administration LLC, RFC 7437 has
  been obsoleted by [RFC8713], and as part of that work, [RFC8713] has
  included the update from RFC 7776.

  This document updates RFC 7776 to remove the update of RFC 7437.

2.3.1.  Changes to Metadata

  The following change is made to the metadata at the head of
  [RFC7776]:

  OLD

  |  Updates: 2418, 7437

  NEW

  |  Updates: 2418

  END

2.3.2.  Changes to the Abstract

  The following change is made to text in the Abstract of [RFC7776]:

  DELETE

  |  This document updates RFC 7437 by allowing the Ombudsteam to form
  |  a recall petition without further signatories.

  END

2.3.3.  Changes to Section 5.1

  The following change is made to text in Section 5.1 of [RFC7776]:

  OLD

  |  *  Many IETF management positions are appointed by the NomCom with
  |     confirmation from the IESG, IAB, or ISOC.  [RFC7437] describes
  |     the recall procedure for such appointments.  This document
  |     updates [RFC7437] by allowing the Ombudsteam to form a recall
  |     petition on its own and without requiring 20 signatories from
  |     the community.  Such a petition shall be treated in all ways
  |     like any other recall petition as described in [RFC7437]: that
  |     is, the fact of the petition and its signatories (the
  |     Ombudsteam) shall be announced to the IETF community, and a
  |     Recall Committee Chair shall be appointed to complete the
  |     Recall Committee process.  It is expected that the Recall
  |     Committee will receive a briefing from the Ombudsteam
  |     explaining why recall is considered an appropriate remedy.

  NEW

  |  *  The Ombudsteam may form a recall petition on its own without
  |     requiring signatures from the community as described in
  |     [RFC8713].

  END

3.  IANA Considerations

  This document has no IANA actions.

4.  Security Considerations

  This document has no implications for Internet security.

5.  References

5.1.  Normative References

  [RFC7776]  Resnick, P. and A. Farrel, "IETF Anti-Harassment
             Procedures", BCP 25, RFC 7776, DOI 10.17487/RFC7776, March
             2016, <https://www.rfc-editor.org/info/rfc7776>.

  [RFC8713]  Kucherawy, M., Ed., Hinden, R., Ed., and J. Livingood,
             Ed., "IAB, IESG, and IETF LLC Selection, Confirmation, and
             Recall Process: Operation of the IETF Nominating and
             Recall Committees", BCP 10, RFC 8713,
             DOI 10.17487/RFC8713, February 2020,
             <https://www.rfc-editor.org/info/rfc8713>.

5.2.  Informative References

  [RFC7437]  Kucherawy, M., Ed., "IAB, IESG, and IAOC Selection,
             Confirmation, and Recall Process: Operation of the
             Nominating and Recall Committees", BCP 10, RFC 7437,
             DOI 10.17487/RFC7437, January 2015,
             <https://www.rfc-editor.org/info/rfc7437>.

Acknowledgements

  Thanks to Jason Livingood for suggesting the need for this document.

  Subramanian Moonesamy, Sean Turner, Jon Peterson, Roman Danyliw, and
  Barry Leiba raised useful points during their reviews of this work.

Authors' Addresses

  Pete Resnick
  Episteme Technology Consulting LLC
  503 West Indiana Avenue
  Urbana, Illinois 61801-4941
  United States of America

  Phone: +1 217 337 1905
  Email: [email protected]


  Adrian Farrel
  Old Dog Consulting

  Email: [email protected]