Re: [Gendispatch] New Version Notification for draft-knodel-nomcom-gender-representation-00.txt

Ted Hardie <ted.ietf@gmail.com> Mon, 27 November 2023 08:33 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: gendispatch@ietfa.amsl.com
Delivered-To: gendispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71A8EC14CE2C for <gendispatch@ietfa.amsl.com>; Mon, 27 Nov 2023 00:33:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l7vhpqupYgLN for <gendispatch@ietfa.amsl.com>; Mon, 27 Nov 2023 00:33:18 -0800 (PST)
Received: from mail-yw1-x1129.google.com (mail-yw1-x1129.google.com [IPv6:2607:f8b0:4864:20::1129]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96691C14CF1D for <gendispatch@ietf.org>; Mon, 27 Nov 2023 00:33:18 -0800 (PST)
Received: by mail-yw1-x1129.google.com with SMTP id 00721157ae682-5cce3010367so36938937b3.0 for <gendispatch@ietf.org>; Mon, 27 Nov 2023 00:33:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1701073998; x=1701678798; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=wF+JLyhy8kPoS+aIoaeS0jm3rJt6eRKeyzGUlogN1YA=; b=SeIAGBOOPyigAaY9bHJF00xoy2kf90x0QCf4eQz/PZlF9l+kSscW5Hg7alYg+3IVA0 UJNnqeImZcjRYYXHO2k5nBUjIrv4HHZjlZQtt0mOrxVmn9NsfJSfURXTg/xYhNQ1bFRX nG0ZSxWf/5sK8M1M2yl9V75UrOV5DpF8u0udXPW3Gw1af6mjtekGXAXmZDZmuSX99akh 89JEbVgVT0lD1XCqkJV7JKU992kMjbmxLKE2AurqFfM0zYV5At5hmQn2kzbiW+ca+/2T JWS+kzKdQ0dQHt6nnBp39TfUIy6tYy6/2XqFF3BIKakeQQ0lgGrPkmijaOIdxMz/rUOs L0nA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701073998; x=1701678798; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=wF+JLyhy8kPoS+aIoaeS0jm3rJt6eRKeyzGUlogN1YA=; b=sPS27bqoa4q8qWhHoEphzeDEPi2VN6gyG7ORUHWxSVaVzi9DnukbpeHhRFbQE2PA6z 4QeldQO0Jvm8KUPzsIIylrHUsaMFmTTVGdZ1sGg8S4OSFb6+nSuIFuZ5h6XXtIqAqjm+ RdmVEGICa5gcvKmvRNbw/6FjYu+ld9Ss8FQJYh5wTFRXyKEwg0rU4+SHHXTUCSkT3hcg TuVYJPRwrKtoCprl4OR8/BgAx8eg/Z7uYqvY2j4mNV6YayP0XglCUfwcvFgMdsniIUcg d6su4jdpQ7mX9QTI+o9AsBNxr2CEO6IS0M3FPMjU7jZu573aFTJ+nyNz4zruCmHQEd42 /Qwg==
X-Gm-Message-State: AOJu0YyUCZmltWH99+yu1S52HzR73AMGvjF9X5l0SAcQm2NIm/t/+yBM q2wNuIOe6w4kzAvsmSnE1sBcN1zn454jLEorvrs=
X-Google-Smtp-Source: AGHT+IFHqW7prP8e7cp1FDvorauJn3lYV+TUwBOuTUndtJy8JRxeU96h/FWLcR491VdGnOaWWHZ7tGzSrtpt8J57/cM=
X-Received: by 2002:a81:b653:0:b0:5ca:c330:7ff7 with SMTP id h19-20020a81b653000000b005cac3307ff7mr10620886ywk.6.1701073997730; Mon, 27 Nov 2023 00:33:17 -0800 (PST)
MIME-Version: 1.0
References: <170047856358.34393.9049917006003776714@ietfa.amsl.com> <f871d358-8d9d-4714-99a8-6a51198a61c9@cdt.org> <CABcZeBO-DuAjhAnWBH3p-bvncG6u9Y7RfyeaGMDW6oGbkVt8rg@mail.gmail.com> <CAGVFjM+sTVKPwFaLLz57ni-qHVxY3cKuJgpxhu=6FtN-4gmqbA@mail.gmail.com> <7aa2509a-82d6-43f0-b0c8-8b8bf68c8f02@huitema.net> <f1932f22-0555-63d9-9a38-6f75e0739546@gmail.com> <AD39B27C-74EA-420B-925C-DFD4BD76F768@mnot.net> <d4222a78-6d73-4f7f-b3eb-ae4d83dfd6cd@betaapp.fastmail.com>
In-Reply-To: <d4222a78-6d73-4f7f-b3eb-ae4d83dfd6cd@betaapp.fastmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Mon, 27 Nov 2023 08:32:50 +0000
Message-ID: <CA+9kkMCq9YRdAU51Rcgmgsj=vPM17nkKyqgKEe0OpWJ5uCKJsA@mail.gmail.com>
To: Martin Thomson <mt@lowentropy.net>
Cc: Mark Nottingham <mnot=40mnot.net@dmarc.ietf.org>, Brian E Carpenter <brian.e.carpenter@gmail.com>, Christian Huitema <huitema@huitema.net>, Mallory Knodel <mknodel@cdt.org>, Eric Rescorla <ekr@rtfm.com>, "gendispatch@ietf.org" <gendispatch@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005f17ab060b1e27e1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/gendispatch/xfKmm-N8hk8v7FJewpFfaEhsaEc>
Subject: Re: [Gendispatch] New Version Notification for draft-knodel-nomcom-gender-representation-00.txt
X-BeenThere: gendispatch@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: General Area Dispatch <gendispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gendispatch>, <mailto:gendispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gendispatch/>
List-Post: <mailto:gendispatch@ietf.org>
List-Help: <mailto:gendispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gendispatch>, <mailto:gendispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Nov 2023 08:33:22 -0000

Hi Martin,

I'm not sure this works in all cases.  Imagine the case where one of the
original nine provides the information that they are gender fluid, even
though they have commonly presented as male in IETF contexts. If that
participant provides this data to the chair in private, the gender
diversity requirement will be met.  But the announcement that it has been
met will bring additional attention to the gender identities of all those
in the original set (because the community will not have expected it to
have been met based on their incomplete understanding of the situation).
That scrutiny will hit people who might have chosen PNTS and who might not
be okay with this scrutiny because of their own gender identities.

regards,

Ted Hardie

On Sat, Nov 25, 2023, at 16:24, Mark Nottingham wrote:
> > However, I am extremely wary of creating a situation where people's
> > gender identity is necessarily declared and scrutinised in public as
> > part of our process -- even with a 'prefer not to say' option.
>
> I have a suggestion that hopefully does a better job of balancing these
> concerns.
>
> The NomCom chair is entrusted with a lot of responsibility.  They could
> ask each volunteer as they are selected.  This information could be kept
> confidential short of an appeal specifically related to this specific
> question, in which case it would be revealed to the ISOC president.
>
> The audit requirement is largely met by announcing that all of the first
> nine fail to meet the diversity requirement.  People would then have to
> make their own inquiries to verify if the integrity of the NomCom chair is
> in question, or rely on the former chair, as noted below.  That largely
> fails to provide privacy for those who are unlucky enough to fall into that
> category, so this risk needs to be made clear when volunteering.  Though,
> with PNTS, it means that the nine all declared gender A or PNTS.
>
> The larger privacy failure is for the person who fills the final slot, who
> is thereby identified as a different gender to the majority, with no
> ambiguity about whether they chose PNTS.  Again, if information is
> requested by the NomCom chair at the time of selection, along with a
> reminder of the implication of different choices, someone who wants to
> avoid this can invoke the PNTS protection, though that would disqualify
> them.
>
> With the former NomCom chair as a trusted auditor, I think that this could
> work.
>
> The time needed to serially request gender after the draw might cause this
> to drag on a little.  The chair can maybe make some assumptions (as risky
> as that is) and make the request of more than one person at a time.
>
> Note that this creates a low probability scenario where there is a
> potential for abuse.  If all gender A or PNTS reaches 9/10, then everyone
> who is asked thereafter can strategically choose PNTS if they consider the
> next likely person to be a better option for some reason.  There is the
> option to have the chair execute a commit and reveal protocol, so that
> volunteers do not have this option, but that draws things out more and I
> don't think that is necessary.  We should instead rely on the fact that
> their own gender identity is not something that people treat so frivolously
> as to use it in this way.
>
> The other thing that has come up is the potential for a rule like this to
> cause the pool to be exhausted without resolution.  That would be bad, but
> my suggestion would be that the rule would be deactivated in that case,
> with the first person who was disqualified by it then being asked to serve.
>
> (A side note: this sort of complexity is why I think that attempting to
> index on other dimensions of diversity is not helpful.  I would suggest
> that if we ever find that gender diversity improves, we might drop this
> process so that we might apply it to another dimension.)
>
> Cheers,
> Martin
>
> --
> Gendispatch mailing list
> Gendispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/gendispatch
>