[Iasa20] IASA 2.0 outcome properties

Alissa Cooper <alissa@cooperw.in> Wed, 19 April 2017 15:39 UTC

Return-Path: <alissa@cooperw.in>
X-Original-To: iasa20@ietfa.amsl.com
Delivered-To: iasa20@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 556DA129B15 for <iasa20@ietfa.amsl.com>; Wed, 19 Apr 2017 08:39:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level:
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cooperw.in header.b=ser+GlAo; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=qNIijTOG
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CT4tXV-C_6Jd for <iasa20@ietfa.amsl.com>; Wed, 19 Apr 2017 08:39:24 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E473F129B04 for <iasa20@ietf.org>; Wed, 19 Apr 2017 08:39:23 -0700 (PDT)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 4B98820C49 for <iasa20@ietf.org>; Wed, 19 Apr 2017 11:39:23 -0400 (EDT)
Received: from frontend1 ([10.202.2.160]) by compute7.internal (MEProxy); Wed, 19 Apr 2017 11:39:23 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cooperw.in; h= content-transfer-encoding:content-type:date:from:message-id :mime-version:subject:to:x-me-sender:x-me-sender:x-sasl-enc :x-sasl-enc; s=fm1; bh=KNeLUQW0XHD4LpG8UAJuMqMsSx3NZrslIrci/8jpy bY=; b=ser+GlAogrnyyXHjHHLr2VtRBuqSTQhHCazHro50Q17mQzJ76JQQYksem taSepusnIVugkLD93n+gynhl9bbWhPUT5yzUhInYSNCBqB79b3J2CF7IeEySfwah +L5KmmfJcxZUWOtrbJ6NqXB73dNJrMrkMW71K4CTrTDYBJOHbzaiST7sXI5rMuVl +aLjTg41zLUE4zjtJKj+SI+dvy4y3DQyDISnlfTKwuIR1aO+o6UgvDScFMR2/XOt nqgwfP+SgGaz899UtAq67ZH9oI5r8wgeBZzc5gt52MjZwLYcr+uiBwo3nISSa2lM aBG5JPwmhf96LpOYGRUUNjD4oTsZw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:message-id:mime-version:subject:to:x-me-sender :x-me-sender:x-sasl-enc:x-sasl-enc; s=fm1; bh=KNeLUQW0XHD4LpG8UA JuMqMsSx3NZrslIrci/8jpybY=; b=qNIijTOGpWEjjVrq9Gg9cHXzTJZeGOuBvk LgTXKZVa3OmBfp0ipuqqzLBmxBuCD+YZAyYyj6mG/KeWwGggZqozeSj5H61GHsQU DsahWaOfYV01XRI0VApK/R8j3ggYIiRQyM8DS4tFStinE0HoyhPc/fRXFHCUJP6Z ZS0SbWiJiYEQh2nKC6UT7mrRHiR+EaEKX4gpVJ1/plgH/XPH662yM8W0rTJ6xHy4 nL5yoCZUjEAPgWQbTnL8pucd4CndZUbRImpkAgEjYCkM9S4+7fKvFqnpV7MUfxqy 6cKHWJ5SgqlYZQ/x57oNE13tzZm++hPkl6Xf320ABlPyjitzHKMw==
X-ME-Sender: <xms:q4T3WPz7ScE9NLdDY7CmPuhJ3axO8sDBfve9INcvIeV8ttrHhIs14A>
X-Sasl-enc: 6VnsJE5L7fIwC5V85+upTCiV49uSyoEhDWMwQZeU9Fta 1492616363
Received: from [192.168.1.106] (cpe-72-224-239-82.maine.res.rr.com [72.224.239.82]) by mail.messagingengine.com (Postfix) with ESMTPA id 0D4547E8B5 for <iasa20@ietf.org>; Wed, 19 Apr 2017 11:39:23 -0400 (EDT)
From: Alissa Cooper <alissa@cooperw.in>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Message-Id: <42E39015-D0B6-4464-8792-9F3A7089975F@cooperw.in>
Date: Wed, 19 Apr 2017 11:39:21 -0400
To: iasa20@ietf.org
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/iasa20/NjkdfC9GZAJLg27k9hIkfSw9mCY>
Subject: [Iasa20] IASA 2.0 outcome properties
X-BeenThere: iasa20@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussions relating to reorganising the IETF administrative structures in the so called “IASA 2.0” project. <iasa20.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iasa20>, <mailto:iasa20-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iasa20/>
List-Post: <mailto:iasa20@ietf.org>
List-Help: <mailto:iasa20-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iasa20>, <mailto:iasa20-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Apr 2017 15:39:26 -0000

As noted at IETF 98, it seems that one reasonable next step here is to articulate some properties of the desirable end state of this work -- what Jonne called the target. What are the properties of the outcome that we want? I've put together the list below, reflecting the discussion in Chicago, the drafts that were written beforehand, and some material from BCP 101.

I don't think we need to nitpick on the details or wordsmith this per se, but it would be good to get a general sense of whether this captures the properties of the outcome that we're collectively looking for here. So please send feedback on whether you think the list below meets that bar. If we get to a place where there seems to be some agreement about a list of this sort, it will make it easier to start discussing solution options for the present set of problems. 

Below the list, I've included a couple of notes (just from my individual perspective) to try to provide a little more context.

== List ==

Administration

1. For each of the following functions, it should be clearly defined and documented who is responsible for executing the functions and who is responsible for overseeing those that do the execution. In cases where execution or oversight are done by paid staff, contractors, ISOC, or any paid entity, the mechanisms for obtaining community input and involvement should be clearly defined and documented.  

- Administrative support
- Budgeting
- Contracting
- Accounting
- Development (including fundraising)
- Meeting planning
- Legal support
- Communications
- Outreach
- IT support

(In the rest of this list, I refer to these functions and those executing them collectively as "administration" for short.)

2. Administration should have no influence over the technical decisions of the IETF or over the technical contents of IETF work. (By implication, suggestions for changes to standards development processes, technical leadership, technical leadership appointments, open participation, etc., are out of scope for this discussion.)

3. Administration should operate transparently, within the limits of business confidentiality. Budgets should be transparent.

4. Administration should be able to incorporate participation from community volunteers, but its functioning should not be dependent on community volunteers. In other words, the number of paid staff and contractors should be able to dynamically grow and shrink to suit the administrative needs of the IETF, including by accommodating those needs entirely with paid staff if volunteers are not available.


Oversight

1. Oversight over administration should be community-led. 

2. Oversight should be conducted transparently, within the limits of business confidentiality.

3. For personnel who are dedicated full-time or nearly full-time to IETF administration, the oversight function should include hiring and firing the personnel, reviewing the performance of the personnel, and setting the compensation of the personnel. (Text inspired by https://tools.ietf.org/html/bcp101#section-3). 

4. For personnel whose employment responsibilities include IETF administration as well as contractors, the oversight function should include reviewing the performance of those personnel and contractors. 


Funding

1. IETF funds should reside in their own independent financial account(s) with independent governance.

2. An organization that funds the IETF should have no more influence over IETF standards development outcomes than any other organization.

3. Funding for IETF operations should be derived from multiple sources.

4. The IETF funding strategy should incorporate both short-term/just-in-time and long-term fundraising vehicles. 

5. Long-term funding vehicles should have greater emphasis than short-term ones to reduce the overhead associated with obtaining sponsorships meeting-by-meeting and to allow for experimentation with new initiatives within the IETF.


== Discussion ==

Out of the list above, I think we do not currently meet the following ones, or we at least have room for improvement: administration #1, 3, and 4; oversight #2, 3 and 4, and funding #1, 4, and 5. Most of the rest were mentioned at IETF 98 or in the drafts and seem like things that people wanted to document to make sure they won't change going forward. 

Regarding oversight #3 and 4, the point here is to align individuals' employment objectives with the administrative objectives of the IETF. If we have administrative roles designed for people to be spending their paid work time on IETF administration, it makes sense that people from the IETF community would have some role in reviewing their performance. This is not the case today for a number of ISOC staff who provide administrative support to the IETF. And for individuals who spend the majority of their work time on IETF administration, it makes sense that people from the IETF community would have some additional role in selecting those individuals and setting their compensation (or that community participants would be able to choose to delegate those tasks, at least). Our documented process establishes that this is what we should be doing for the IAD and for contractors (assuming that establishing contract values and selecting firms are the equivalent steps for contractors) already. But this is not what we are doing for communications or fundraising.

Alissa