Name
SESSION 8 | Part 1: Building trust: an overview of provenance and the global policy landscape | Part 2: Protecting privacy in developing and deploying Content Credentials
Date & Time
Wednesday, June 4, 2025, 2:00 PM - 5:15 PM
Jacobo Castellanos James Jarosz Claire Leibowicz
Description

Part 1

Building trust: an overview of provenance and the global policy landscape

As generative technologies challenge the boundaries of truth and trust, this session will examine the policy, legal, and institutional frameworks needed to safeguard authenticity. Participants will identify critical gaps, explore legislative and regulatory solutions, and consider strategies to enhance public awareness and engagement. Through a focus on civic and public sector priorities, the session aims to surface actionable opportunities to strengthen transparency and accountability in the information ecosystem.

Part 2

Protecting privacy in developing and deploying Content Credentials

This session will describe the Harm Modelling process carried out by WITNESS, a human rights non-profit organization, highlighting key privacy concerns that emerged and how they are or could be addressed in the C2PA specification and the accompanying guiding documents. Participants will be invited to comment on the current situation, and raise any other privacy concerns that they may have, including if there are specific aspects of the spec that should be reviewed more closely.

They will then be invited to brainstorm solutions or responses that could help inform changes to the spec, UX guidance, general media literacy, or other elements.

What we’re covering

  • Introduction to human rights angle of the C2PA: what are the use cases of C2PA for human rights, e.g.: legal evidence, journalistic credibility, etc.
  • Introduction to Threats and Harms C2PA Taskforce and an overview of the harm assessment: This would include the rationale, the process and general results of the Harms Modelling document.
  • Overview and discussion of privacy in the Technical Specifications (as laid out in the matrix of harms and the security considerations document). Ie: Specific privacy concerns identified (e.g.: Journalistic Freedom or Augmented Surveillance) and how it is currently being addressed.
  • Overview and discussion of privacy and content creator control of data in UX (as laid out in UX guidance).
  • Beyond the technical specifications: Discussion on how to protect privacy in C2PA implementations (via regulation and post standardization).