Data Security Council
This page explains the role and constitution of Data Security Council, appointed by a Council Vote of the Open Council.
Last updated
Was this helpful?
This page explains the role and constitution of Data Security Council, appointed by a Council Vote of the Open Council.
Last updated
Was this helpful?
The role of the Data Security Council is to act on the Foundation's citizen privacy, security and enforcement of data protection rights of the Foundation's community on its several public initiatives. This Council works on data security regulations, concerning communications policies.
The members of the Data Security Council have voluntarily chosen to actively contribute to the Foundation's agenda.
These members publish opinion articles on the Foundation's data protection research and self-governance, contribute directly using participation in presenting the Foundation's agenda in their industry network, and build strategic relationships with governmental and inter-governmental data protection agencies.
The members appointed to the Data Security Council generally stay on this committee for a fixed period.
The members of the Data Security Council may nominate and appoint several Steward Groups, linked to the Fiscal Hosts of the Foundation as their fiduciary duty. Read more on the .
The members of the Data Security Council shall also participate in forming Independent Core Working Groups like Open Bank CWC or Media CWC.
The members of the Data Security Council work with the following guidelines:
Meetings:
1. The Data Security Council members shall meet the Executive Council on an ongoing basis: 1.1 Generally recorded every month through an electronic meeting with the Executive Committee, either exclusively or through Open Convention
1.2 When recorded through the member’s presence in the Foundation’s monthly Council meetings, or
1.3 When participating through the 's private mailing list on any Open Council vote, at least once a month.
2. The Data Security Council may convene to meet the Executive Council or other members through an electronic meeting, in addition to the monthly Council meetings, to contribute to the Council's roles and responsibilities.
3. The Data Security Council can convene an electronic meeting, inviting all the Open Council members or all the Foundation's members, to conduct an independent documented review of the Foundation’s initiatives.
The meeting minutes from any convened “Data Security Council meeting” shall be released to the Executive Council within 14 days of the meeting.
The Executive Council reserves the right to reject or release the meeting minutes and documented reviews of this council to the other members of the Foundation.
Open Constitution Governance Framework:
4. Foundation runs itself with a decentralised governance system. Therefore, the role of the Data Security Council is to work with the other Open Council bodies in steering the Foundation’s self-governance model, inscribed into the Foundation's Open Constitution.
Consideration:
5. Appointment to this Data Security Council is pro bono and voluntary. Appointments are generally made for an election period of at least 1 year and almost 3 years.
Appointment, Nomination, Removal and Resignation:
Appointment:
6.1 The following members can officially nominate a new or existing member of the Foundation to the Data Security Committee:
6.1 b. A non-Councila member can also request a nomination, in the form of a community proposal. The Nomination action shall be officially initiated by the only members mentioned in above 6.1 “a”.
6.2 Self-nomination by (an already elected) member of one of the bodies of the Open Council for his/her/their appointment to the Data Security Council is not acceptable.
Self-nomination by an existing non-Council member of the Foundation, for his/her/their appointment to the Data Security Council is not acceptable. Please read more.
6.3 Once the nomination is accepted by the Nominee, the Nominee or the member nominating the nominee, shall file supporting documentation such as the nominee's literature, publications, and demonstration of social activities on the Foundation's Membership Registry.
A Council Resolution "Vote IN" is then scheduled on the Council's mailing list.
6.4 Appointment to the Data Security Council is published on the public-facing records of the Muellners Foundation.
Removal Proceedings:
7.1 Members of the Executive Council or the Data Security Council or the Advisory Council or the Regulations Council can only officially propose the Removal of a member from the Data Security Council.
7.2 Open Council Resolution - “Vote OUT" is considered to be active on the Open Constitution system, once it is initiated on the Council’s private mailing list.
A strong reason for violation of Muellners Foundation’s governing policies and directives must be provided by member(s) initiating the resolution, to support the Council resolution “Vote OUT”.
7.3 Community Referendum: The final removal of a member from the Data Security Council is subject to a community referendum on the passed Council resolution “Vote OUT”, stated in 7.1 & 7.2 above.
8. A member may serve on more than one Open Council body. Each Council body membership reserves additional voting rights.
If a member happens to serve on two Open Council bodies, then this effectively means that two votes are counted for the same member for the Foundation’s Council Vote-based decision proceedings, including but not limited to the governing protocols for the appointment of members or their removal to the Open Council.
Resignation:
9. A member's self-resignation from the Data Security Council is a voluntary action.
A member may resign from the Data Security Council by stating the reasons for resignation. The announcement of resignation can be done via electronic email on the Council's mailing list.
Miscellaneous:
If the member is found convicted of criminal, civil and financial crimes, in any court of competent jurisdiction, across the world, where the Foundation has an active presence, either through a legal body representation or an affiliate network.
Read more about the Foundation’s Code of Conduct here.
12. The Foundation members communicate via cryptographic electronic communications systems and technology tools. In connection with the electronic meetings convened by members of this council, the Foundation’s IT infrastructure shall be used.
If the meeting took place outside the Foundation’s communications infrastructure, then the meeting minutes must be brought back to the notice of the Executive Council.
The ratifies the Data Security Council’s Resolutions.
The then ensures ratification of any amendments to this constitution, governance and steering of the Foundation, based on Executive Counsel’s public reports.
The chair of the Data Security Council may also get elected to an , registered on the Open Constitution Governance System for arbitrations between disputing members of the Foundation.
6.1 a. An elected member of the or the the Regulations Council or the Data Security Council
10. The reserves the right to update the terms and conditions, and statutes from time to time, in compliance with the existing rules and regulations of the association, including reserving the right to terminate the appointment to this Council at any time, without notice and without the due electoral process of removal, in the following scenario:
Read more on the of the Foundation here.
11. The of the Foundation and terms and conditions governing its functioning can be found here. The Independent Board reserves the right to dissolve the whole Data Security Council and initiate the constitution of a new Data Security Council.
Custodian: