๐Ÿ“ตData Security Council

This page explains the role and constitution of Data Security Council, appointed by a Council Vote of the Open Council.

The role of the Data Security Council is to act on the Foundation's citizen privacy, security and enforcement of data protection rights of Muellners Foundation's community on its several public initiatives. This Council works on data security regulations, concerning communications policies.

Data Security Council members are generally individuals of industry-wide reputation, having had persistent success in contributing to humankind, with a major sustainable impact. They can be successful members of civil rights society, corporate lawyers, M&A lawyers, and holding an office of an institution that shapes data security policies of jurisdiction on this planet such as bureaucrats working with governmental data protection agencies and data Security Program Directors of intergovernmental agencies.

Members of this Council may also be industry professionals with a background in Banking, financial services insurance and other global value chain constituents.

The members of the Data Security Council have voluntarily chosen to actively contribute to the Foundation's agenda.

These members publish opinion articles on the Foundation's data protection research and self-governance, contribute directly using participation in presenting the Foundation's agenda in their industry network, and build strategic relationships with governmental and inter-governmental data protection agencies.

The members appointed to the Data Security Council generally stay on this committee for a fixed period.

The members of the Data Security Council may nominate and appoint several Steward Groups, linked to the Fiscal Hosts of the Muellners Foundation as their fiduciary duty. Read more on the Steward group here.

The members of the Data Security Council shall also participate in the constitution of Independent Core Working Groups like Open Bank CWC or Media CWC.

The members of the Data Security Council work with the following guidelines:

Meetings:

1. The Data Security Council members shall meet the Executive Council on an ongoing basis: 1.1 Generally recorded every month through an electronic meeting with the Executive Committee, either exclusively or through Open Convention

1.2 When recorded through the memberโ€™s presence in the Foundationโ€™s monthly Council meetings, or

1.3 When participating through the Independent Board's private mailing list on any Open Council vote, at least once a month.

2. The Data Security Council may convene to meet the Executive Council or other members through an electronic meeting, in addition to the monthly Council meetings, to contribute to the Council's roles and responsibilities.

Data Security Council also processes nominations and appointments of members to Steward Groups the Open Bank CWC, andMedia CWC.

Data Security Council members build strategic relationships on behalf of the Foundation's community, representing its citizen's data privacy rights in Economic Forums, Regulatory bodies and other industry networks, which may be outside the purview of the Foundation's ongoing programs.

3. The Data Security Council can convene an electronic meeting, inviting all the Open Council members or all the Foundation's members, to conduct an independent documented review of the Foundationโ€™s initiatives.

The meeting minutes from any convened โ€œData Security Council meetingโ€ shall be released to the Executive Council within 14 days of the meeting.

The Executive Council reserves the right to reject or release the meeting minutes and documented reviews of this council to the other members of the Foundation.

Open Constitution Governance Framework:

4. Muellners Foundation runs itself with a decentralised governance system. Therefore, the role of the Data Security Council is to work with the other Open Council bodies in steering the Foundationโ€™s self-governance model, inscribed into the Foundation's Open Constitution.

The Executive Council ratifies the Data Security Councilโ€™s Resolutions.

The Independent Board then ensures ratification of any amendments to this constitution, governance and steering of the Foundation, based on Executive Counselโ€™s public reports.

The chair of the Data Security Council may also get elected to an Open Tribunal, registered on the Open Constitution Governance System for arbitrations between disputing members of the Foundation.

Consideration:

5. Appointment to this Data Security Council is pro bono and voluntary. Appointments are generally made for an election period of at least 1 year and almost 3 years.

Appointment, Nomination, Removal and Resignation:

Appointment:

6.1 The following members can officially nominate a new or existing member of the Foundation to the Data Security Committee:

6.1 a. An elected member of the Executive Council or the Advisory Council the Regulations Council or the Data Security Council

6.1 b. A non-Councila member can also request a nomination, in the form of a community proposal. The Nomination action shall be officially initiated by the only members mentioned in above 6.1 โ€œaโ€.

6.2 Self-nomination by (an already elected) member of one of the bodies of the Open Council for his/her/their appointment to the Data Security Council is not acceptable.

Self-nomination by an existing non-Council member of the Foundation, for his/her/their appointment to the Data Security Council is not acceptable. Please read more.

6.3 Once the nomination is accepted by the Nominee, the Nominee or the member nominating the nominee, shall file supporting documentation such as the nominee's literature, publications, and demonstration of social activities on the Foundation's Membership Registry.

A Council Resolution "Vote IN" is then scheduled on the Council's mailing list.

Electoral Process for "Vote IN" is conditional to a quorum.

a. Quorum is achieved when a minimum of half of all the Open Council members, participate in the Council Resolution - "Vote IN". b. A decision is received in favour of the Council Resolution - "Vote IN", when the majority of all the participating members of the Open Council, vote "+1". E.g.: Let's say there are 21 Open Council members.

At least 11 members shall participate in the Council Resolution for the "Vote IN" to achieve a quorum. This is the qualifying state for the Council Resolution to be logged on the Open Constitution public ledger. For the appointment to be electorally approved, the "Vote IN" should receive at least half of the total votes(required for quorum), in favour of this Council Resolution. So, in this example, six (+1) votes of the participating 11 Council members will do the job.๐Ÿ˜’

6.4 Appointment to the Data Security Council is published on the public-facing records of the Muellners Foundation.

Removal Proceedings:

7.1 Members of the Executive Council or the Data Security Council or the Advisory Council or the Regulations Council can only officially propose the Removal of a member from the Data Security Council.

7.2 Open Council Resolution - โ€œVote OUT" is considered to be active on the Open Constitution system, once it is initiated on the Councilโ€™s private mailing list.

Electoral Process for "Vote OUT" is conditional to a quorum. a. Quorum is achieved when a minimum of half of all the Open Council members participate in the Council Resolution "Vote OUT". b. A decision is received in favour of the "Vote OUT", when the majority of all the participating members of the Open Council, vote "+1". E.g.: Let's say there are 21 Open Council members.

At least the 11 members shall participate in the Council Resolution for "Vote OUT" to achieve a quorum. This is the qualifying state for the Council Resolution to be locked on the Open Constitution public ledger. For the removal to be electorally approved for the next stage, the "Vote OUT" should receive at least half of the total votes(required for quorum), in favour of this Council Resolution. So, in this example, six (+1) votes of the participating 11 Council members will do the job.๐Ÿ˜’

A strong reason for violation of Muellners Foundationโ€™s governing policies and directives must be provided by member(s) initiating the resolution, to support the Council resolution โ€œVote OUTโ€.

7.3 Community Referendum: The final removal of a member from the Data Security Council is subject to a community referendum on the passed Council resolution โ€œVote OUTโ€, stated in 7.1 & 7.2 above.

Community Referendum is generally accessible by all members of the Muellners Foundation - both Council, its CWC members and non-Council members.

Quorum on the Community Referendum for the Council Resolution - "Vote Out" is achieved when 33% (more than 1/3rd) of all the voluntarily organised subscribed members participate. Of the minimum participating members, the Community Referendum stands as Decided when the majority of the quorum populace votes in favour of the stated Council resolution โ€œVote OUTโ€.

E.g.: Let's say there are 1000 Foundation members.

A minimum of 333 members are required to participate in the Community Referendum to achieve a quorum. The decision of the Community Referendum depends on a majority(167/333) in favour of, or against the subject of the Referendum. This is the qualifying state for the Referendum to get locked on the Open Constitution public ledger.

๐Ÿ˜’

8. A member may serve on more than one Open Council body. Each Council body membership reserves additional voting rights.

If a member happens to serve on two Open Council bodies, then this effectively means that two votes are counted for the same member for the Foundationโ€™s Council Vote-based decision proceedings, including but not limited to the governing protocols for the appointment of members or their removal to the Open Council.

Resignation:

9. A member's self-resignation from the Data Security Council is a voluntary action.

A member may resign from the Data Security Council by stating the reasons for resignation. The announcement of resignation can be done via electronic email on the Council's mailing list.

Miscellaneous:

10. The Independent Board reserves the right to update the terms and conditions, and statutes from time to time, in compliance with the existing rules and regulations of the association, including reserving the right to terminate the appointment to this Council at any time, without notice and without the due electoral process of removal, in the following scenario:

If the member is found convicted of criminal, civil and financial crimes, in any court of competent jurisdiction, across the world, where the Foundation has an active presence, either through a legal body representation or an affiliate network.

Read more on the guiding principles & diversity statement of the Foundation here.

Read more about the Foundationโ€™s Code of Conduct here.

11. The statutes of the Foundation and terms and conditions governing its functioning can be found here. The Independent Board reserves the right to dissolve the whole Data Security Council and initiate the constitution of a new Data Security Council.

12. The Foundation members communicate via cryptographic electronic communications systems and technology tools. In connection with the electronic meetings convened by members of this council, the Foundationโ€™s IT infrastructure shall be used.

If the meeting took place outside the Foundationโ€™s communications infrastructure, then the meeting minutes must be brought back to the notice of the Executive Council.

Upon a successful nomination and having received a passed Council Resolution "Vote IN", a new Open Council member should file their supporting documents to the Open Constitution Membership Registry. A private link is generated by the Open Constitution system.

Custodian: Election Council

Last updated

Logo

Maintained by ยฉ Muellners Foundation. All Rights Reserved.