<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-iab-ai-control-report-02" category="info" consensus="true" submissionType="IAB" xml:lang="en" number="9969" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <link href="https://datatracker.ietf.org/doc/draft-iab-ai-control-report-02" rel="prev"/>
  <front>
    <title abbrev="IAB AI-CONTROL Workshop Report">Report from the IAB Workshop on AI-CONTROL</title>
    <seriesInfo name="RFC" value="9969"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <city>Melbourne</city>
          <country>Australia</country>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization/>
      <address>
        <email>suresh.krishnan@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="May"/>
    <keyword>policy</keyword>
    <keyword>Artificial Intelligence</keyword>
    <keyword>Robots Exclusion Protocol</keyword>
    <keyword>web crawler</keyword>
    <keyword>robots.txt</keyword>
    <abstract>
      <?line 91?>

<t>The AI-CONTROL Workshop was convened by the Internet Architecture Board (IAB) in September 2024. This report summarizes its significant points of discussion and identifies topics that may warrant further consideration and work.</t>
      <t>Note that this document is a report on the proceedings of the workshop.  The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet Architecture Board (IAB) holds occasional workshops designed to consider long-term issues and strategies for the Internet, and to suggest future directions for the Internet architecture. This long-term planning function of the IAB is complementary to the ongoing engineering efforts performed by working groups of the Internet Engineering Task Force (IETF).</t>
      <t>The Internet is one of the major sources of data used to train Large Language Models (LLMs) (or, more generally, Artificial Intelligence (AI)). Because this use was not envisioned by most publishers of information on the Internet, a means of expressing the owners' preferences regarding AI crawling has emerged, sometimes backed by law (e.g., in the European Union's AI Act <xref target="AI-ACT"/>).</t>
      <t>The IAB convened the AI-CONTROL Workshop on 19-20 September 2024 to "explore practical opt-out mechanisms for AI and build an understanding of use cases, requirements, and other considerations in this space" <xref target="CFP"/>. In particular, the emerging practice of using the Robots Exclusion Protocol <xref target="RFC9309"/> -- also known as "robots.txt" -- has not been coordinated between AI crawlers, resulting in considerable differences in how they treat it. Furthermore, robots.txt may or may not be a suitable way to control AI crawlers. However, discussion was not limited to consideration of robots.txt, and approaches other than opt-out were considered.</t>
      <t>To ensure many viewpoints were represented, the program committee invited a broad selection of technical experts, AI vendors, content publishers, civil society advocates, and policymakers.</t>
      <section anchor="chatham-house-rule">
        <name>Chatham House Rule</name>
        <t>Participants agreed to conduct the workshop under the Chatham House Rule <xref target="CHATHAM-HOUSE"/>, so this report does not attribute statements to individuals or organizations without express permission. Most submissions to the workshop were public and thus attributable; they are used here to provide substance and context.</t>
        <t><xref target="attendees"/> lists the workshop participants, unless they requested that this information be withheld.</t>
      </section>
      <section anchor="views-expressed-in-this-report">
        <name>Views Expressed in This Report</name>
        <t>This document is a report on the proceedings of the workshop. The views and positions documented in this report are expressed during the workshop by participants and do not necessarily reflect the IAB's views and positions.</t>
        <t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interpretation or validation. Thus, the content of this report follows the flow and dialog of the workshop but does not attempt to capture a consensus.</t>
      </section>
    </section>
    <section anchor="workshop-scope-and-discussion">
      <name>Workshop Scope and Discussion</name>
      <t>The workshop began by surveying the state of AI control.</t>
      <t>Currently, Internet publishers express their preferences for how their content is treated for the purposes of AI training using a variety of mechanisms. These include declarative mechanisms, such as terms of service, embedded metadata, and robots.txt <xref target="RFC9309"/>, as well as active mechanisms, such as use of paywalls and selective blocking of crawlers (e.g., by IP address or User-Agent).</t>
      <t>There was disagreement about the implications of AI opt-out overall. Research presented at the workshop <xref target="DECLINE"/> indicates that the use of such controls is becoming more prevalent, reducing the availability of data to AI (for purposes including training and inference-time usage). Some of the participants expressed concern about the implications of this -- although at least one AI vendor seemed less concerned by this, indicating that "there are plenty of tokens available" for training, even if many opt out. Others expressed a need to opt out of AI training because of how they perceive its effects on their control over content, seeing AI as usurping their relationships with customers and a potential threat to whole industries.</t>
      <t>However, there was quick agreement that both viewpoints were harmed by the current state of AI opt-out -- a situation where "no one is better off" (in the words of one participant).</t>
      <t>Much of that dysfunction was attributed to the lack of coordination and standards for AI opt-out. Currently, content publishers need to consult with each AI vendor to understand how to opt out of training their products, as there is significant variance in each vendor's behavior. Furthermore, publishers need to continually monitor both new vendors and policy updates from the vendors they are aware of.</t>
      <t>Underlying those immediate issues, however, are significant constraints that could be attributed to uncertainties in the legal context, the nature of AI, and the implications of needing to opt out of crawling for it.</t>
      <section anchor="crawl-time-vs-inference-time">
        <name>Crawl Time vs. Inference Time</name>
        <t>Perhaps most significant is the "crawl time vs. inference time" problem. Statements of preference are apparent at crawl time, bound to content either by location (e.g., robots.txt) or embedded inside the content itself as metadata. However, the target of those directives is often disassociated from the crawler, either because the crawl data is not only used for training AI models or because the preferences could be applicable at inference time.</t>
        <section anchor="multiple-uses-for-crawl-data">
          <name>Multiple Uses for Crawl Data</name>
          <t>A crawl's data might have multiple uses because the vendor also has another product that uses it (e.g., a search engine) or because the crawl is performed by a party other than the AI vendor. Both are very common patterns: Operators of many Internet search engines also train AI models, and many AI models use third-party crawl data. In either case, conflating different uses can change the incentives for publishers to cooperate with the crawler.</t>
          <t>Well-established uses of crawling, such as Internet searches, were seen by participants as at least partially aligned with the interests of publishers: They allow their sites to be crawled, and in return, they receive higher traffic and attention due to being in the search index. However, several participants pointed out that this symbiotic relationship does not exist for AI training uses -- with some viewing AI as hostile to publishers because it has the capacity to take traffic away from their sites.</t>
          <t>Therefore, when a crawler has multiple uses that include AI, participants observed that "collateral damage" was likely for non-AI uses, especially when publishers take more active control measures, such as blocking or paywalls, to protect their interests.</t>
          <t>Several participants expressed concerns about this phenomenon's effects on the ecosystem, effectively "locking down the Web" with one opining that there were implications for freedom of expression overall.</t>
        </section>
        <section anchor="application-of-preferences">
          <name>Application of Preferences</name>
          <t>When data is used to train an LLM, the resulting model does not have the ability to only selectively use a portion of it when performing a task because inference uses the whole model, and it is not possible to identify specific input data for its use in doing so.</t>
          <t>This means that while publishers' preferences may be available when content is crawled, they generally are not when inference takes place. Those preferences that are stated in reference to use by AI -- for example, "no military uses" or "non-commercial only" -- cannot be applied by a general-purpose "foundation" model.</t>
          <t>This leaves a few unappealing choices to AI vendors that wish to comply with those preferences. They can simply omit such data from foundation models, thereby reducing their viability. Or they can create a separate model for each permutation of preferences -- with a likely proliferation of models as the set of permutations expands.</t>
          <t>Compounding this issue was the observation that preferences change over time, whereas LLMs are created over long time frames and cannot easily be updated to reflect those changes. Of particular concern to some was how this makes an opt-out regime "stickier" because content that has no associated preference (such as that which predates the authors' knowledge of LLMs) is allowed to be used for these unforeseen purposes.</t>
        </section>
      </section>
      <section anchor="trust">
        <name>Trust</name>
        <t>Participants felt that the disconnection between the statement of preferences and its application contribute to a lack of trust in the ecosystem, along with the typical lack of attribution for data sources in LLMs, a lack of an incentive for publishers to contribute data, and finally (and most noted) a lack of any means of monitoring compliance with preferences.</t>
        <t>This lack of trust led some participants to question whether communicating preferences is sufficient in all cases without an accompanying way to enforce them, or even to audit adherence to them. Some participants also indicated that a lack of trust was the primary cause of the increasingly prevalent blocking of AI crawler IP addresses, among other measures.</t>
      </section>
      <section anchor="attachment">
        <name>Attachment</name>
        <t>One of the primary focuses of the workshop was on <em>attachment</em>, i.e., how preferences are associated with content on the Internet. A range of mechanisms was discussed.</t>
        <section anchor="robotstxt-and-similar">
          <name>robots.txt (and Similar)</name>
          <t>The Robots Exclusion Protocol <xref target="RFC9309"/> is widely recognized by AI vendors as an attachment mechanism for preferences. Several deficiencies were discussed.</t>
          <t>First, it does not scale to offer granular control over large sites where authors might want to express different policies for a range of content (for example, YouTube).</t>
          <t>robots.txt is also typically under the control of the site administrator. If a site has content from many creators (as is often the case for social media and similar platforms), the administrator may not allow them to express their preferences fully, or at all.</t>
          <t>If content is copied or moved to a different site, the preferences at the new site need to be explicitly transferred because robots.txt is a separate resource.</t>
          <t>These deficiencies led many participants to feel that robots.txt cannot be the only solution to opt-out: Rather, it should be part of a larger system that addresses its shortcomings.</t>
          <t>Participants noted that other similar attachment mechanisms have been proposed. However, none appear to have gained as much attention or implementation (both by AI vendors and content owners) as robots.txt.</t>
        </section>
        <section anchor="embedding">
          <name>Embedding</name>
          <t>Another mechanism for associating preferences with content is to embed them into the content itself. Many formats used on the Internet allow this; for example, HTML has the <tt>&lt;meta&gt;</tt> tag, images have Extensible Metadata Platform (XMP) and similar metadata sections, and XML and JSON have rich potential for extensions to carry such data.</t>
          <t>Embedded preferences were seen to have the advantage of granularity, and of "traveling with" content as it is produced, when the content that embeds the preferences is moved from site to site or when it is stored offline.</t>
          <t>However, several participants pointed out that embedded preferences are easily stripped from most formats. This is a common practice for reducing the size of a file (thereby improving performance when downloading it) and for assuring privacy (since metadata often leaks information unintentionally).</t>
          <t>Furthermore, some types of content are not suitable for embedding. For example, it is not possible to embed preferences into purely textual content, and web pages with content from several producers (such as a social media or comment feeds) cannot easily reflect preferences for each one.</t>
          <t>Participants noted that the means of embedding preferences in many formats would need to be determined by or coordinated with organizations outside the IETF. For example, HTML and many image formats are maintained by external bodies.</t>
        </section>
        <section anchor="registries">
          <name>Registries</name>
          <t>In some existing copyright management regimes, it is already common to have a registry of works that is consulted upon use. For example, this approach is often used for photographs, music, and video.</t>
          <t>Typically, registries use hashing mechanisms to create a "fingerprint" for the content that is robust to changes.</t>
          <t>Using a registry decouples the content in question from its location so that it can be found even if moved. It is also claimed to be robust against stripping of embedded metadata, which is a common practice to improve performance and/or privacy.</t>
          <t>However, several participants pointed out issues with deploying registries at the scale of the Internet. While they may be effective for (relatively) closed and well-known ecosystems, such as commercial music publishing, applying them to a diverse and very large ecosystem like the Internet has proven problematic.</t>
        </section>
      </section>
      <section anchor="vocabulary">
        <name>Vocabulary</name>
        <t>Another major focus area for the workshop was on <em>vocabulary</em> -- the specific semantics of the opt-out signal. Several participants noted that there are already many proposals for vocabularies, as well as many conflicting vocabularies already in use. Several examples were discussed, including where existing terms were ambiguous, did not address common use cases, or were used in conflicting ways by different actors.</t>
        <t>Although no conclusions regarding exact vocabulary were reached, it was generally agreed that a complex vocabulary is unlikely to succeed.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>Participants generally agreed that on its current path, the ecosystem is not sustainable. As one remarked, "robots.txt is broken and we broke it".</t>
      <t>Legal uncertainty, along with fundamental limitations of opt-out regimes pointed out above, limit the effectiveness of any technical solution, which will be operating in a system unlike either robots.txt (where there is a symbiotic relationship between content owners and the crawlers) or copyright (where the default is effectively opt-in, not opt-out).</t>
      <t>However, the workshop ended with general agreement that positive steps could be taken to improve the communication of preferences from content owners for AI use cases. In discussion, it was evident that the discovery of preferences from multiple attachment mechanisms is necessary to meet the diverse needs of content authors and, therefore, that defining how they are combined is important.</t>
      <t>We outline a proposed standard program below.</t>
      <section anchor="potential-standards-work">
        <name>Potential Standards Work</name>
        <t>The following items were identified as good starting points for IETF work:</t>
        <ul spacing="normal">
          <li>
            <t>Attachment to websites by location (in robots.txt or a similar mechanism)</t>
          </li>
          <li>
            <t>Attachment via embedding in IETF-controlled formats (e.g., HTTP headers)</t>
          </li>
          <li>
            <t>Definition of a common core vocabulary</t>
          </li>
          <li>
            <t>Definition of the overall regime, e.g., how to combine preferences discovered from multiple attachment mechanisms</t>
          </li>
        </ul>
        <t>It would be expected that the IETF would coordinate with other Standards Development Organizations (SDOs) to define embedding in other formats (e.g., HTML).</t>
        <section anchor="out-of-initial-scope">
          <name>Out of Initial Scope</name>
          <t>It was broadly agreed that it would not be useful to work on the following items, at least to begin with:</t>
          <ul spacing="normal">
            <li>
              <t>Enforcement mechanisms for preferences</t>
            </li>
            <li>
              <t>Registry-based solutions</t>
            </li>
            <li>
              <t>Identifying or authenticating crawlers and/or content owners</t>
            </li>
            <li>
              <t>Audit or transparency mechanisms</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document is a workshop report and does not impact the security of the Internet.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="CHATHAM-HOUSE" target="https://www.chathamhouse.org/about-us/chatham-house-rule">
        <front>
          <title>Chatham House Rule</title>
          <author>
            <organization>Chatham House</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="CFP" target="https://datatracker.ietf.org/group/aicontrolws/about/">
        <front>
          <title>IAB Workshop on AI-CONTROL</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="PAPERS" target="https://datatracker.ietf.org/group/aicontrolws/materials/">
        <front>
          <title>IAB Workshop on AI-CONTROL Materials</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="AI-ACT" target="https://eur-lex.europa.eu/eli/reg/2024/1689/oj">
        <front>
          <title>Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300/2008, (EU) No 167/2013, (EU) No 168/2013, (EU) 2018/858, (EU) 2018/1139 and (EU) 2019/2144 and Directives 2014/90/EU, (EU) 2016/797 and (EU) 2020/1828 (Artificial Intelligence Act) (Text with EEA relevance)</title>
          <author>
            <organization>European Parliament</organization>
          </author>
          <date year="2024" month="June" day="13"/>
        </front>
      </reference>
      <reference anchor="DECLINE" target="https://www.ietf.org/slides/slides-aicontrolws-consent-in-crisis-the-rapid-decline-of-the-ai-data-commons-00.pdf">
        <front>
          <title>Consent in Crisis: The Rapid Decline of the AI Data Commons</title>
          <author initials="S." surname="Longpre" fullname="Shayne Longpre">
            <organization/>
          </author>
          <author initials="R." surname="Mahari" fullname="Robert Mahari">
            <organization/>
          </author>
          <author initials="A." surname="Lee" fullname="Ariel Lee">
            <organization/>
          </author>
          <author initials="C." surname="Lund" fullname="Campbell Lund">
            <organization/>
          </author>
          <date year="2025"/>
        </front>
      </reference>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9309.xml"/>
    </references>
    <?line 253?>

<section anchor="about-the-workshop">
      <name>About the Workshop</name>
      <t>The AI-CONTROL Workshop was held on 2024-09-19 and 2024-09-20 at Wilkinson Barker Knauer in Washington, D.C., USA.</t>
      <t>Workshop attendees were asked to submit position papers. These papers are published on the IAB website <xref target="PAPERS"/>, unless the submitter requested it be withheld.</t>
      <t>The workshop was conducted under the Chatham House Rule <xref target="CHATHAM-HOUSE"/>, meaning that statements cannot be attributed to individuals or organizations without explicit authorization.</t>
      <section anchor="agenda">
        <name>Agenda</name>
        <t>This section outlines the broad areas of discussion on each day.</t>
        <section anchor="thursday-2024-09-19">
          <name>Thursday, 2024-09-19</name>
          <dl>
            <dt>Setting the stage:</dt>
            <dd>
              <t>An overview of the current state of AI opt-out, its impact, and existing work in this space</t>
            </dd>
            <dt>Lightning talks:</dt>
            <dd>
              <t>A variety of perspectives from participants</t>
            </dd>
          </dl>
        </section>
        <section anchor="friday-2024-09-20">
          <name>Friday, 2024-09-20</name>
          <dl>
            <dt>Opt-Out Attachment: robots.txt and beyond:</dt>
            <dd>
              <t>Considerations in how preferences are attached to content on the Internet</t>
            </dd>
            <dt>Vocabulary: what opt-out means:</dt>
            <dd>
              <t>What information the opt-out signal needs to convey</t>
            </dd>
            <dt>Discussion and wrap-up:</dt>
            <dd>
              <t>Synthesis of the workshop's topics and how future work might unfold</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="attendees">
        <name>Attendees</name>
        <t>Attendees of the workshop are listed with their primary affiliation. Attendees from the program committee (PC) and the Internet Architecture Board (IAB) are also marked.</t>
        <ul spacing="normal">
          <li>
            <t><contact fullname="Jari Arkko"/>, Ericsson</t>
          </li>
          <li>
            <t><contact fullname="Hirochika Asai"/>, Preferred Networks</t>
          </li>
          <li>
            <t><contact fullname="Farzaneh Badiei"/>, Digital Medusa (PC)</t>
          </li>
          <li>
            <t><contact fullname="Fabrice Canel"/>, Microsoft (PC)</t>
          </li>
          <li>
            <t><contact fullname="Lena Cohen"/>, EFF</t>
          </li>
          <li>
            <t><contact fullname="Alissa Cooper"/>, Knight-Georgetown Institute (PC, IAB)</t>
          </li>
          <li>
            <t><contact fullname="Marwan Fayed"/>, Cloudflare</t>
          </li>
          <li>
            <t><contact fullname="Christopher Flammang"/>, Elsevier</t>
          </li>
          <li>
            <t><contact fullname="Carl Gahnberg"/></t>
          </li>
          <li>
            <t><contact fullname="Max Gendler"/>, The News Corporation</t>
          </li>
          <li>
            <t><contact fullname="Ted Hardie"/></t>
          </li>
          <li>
            <t><contact fullname="Dominique Hazaël-Massieux"/>, W3C</t>
          </li>
          <li>
            <t><contact fullname="Gary Ilyes"/>, Google (PC)</t>
          </li>
          <li>
            <t><contact fullname="Sarah Jennings"/>, UK Department for Science, Innovation and Technology</t>
          </li>
          <li>
            <t><contact fullname="Paul Keller"/>, Open Future</t>
          </li>
          <li>
            <t><contact fullname="Elizabeth Kendall"/>, Meta</t>
          </li>
          <li>
            <t><contact fullname="Suresh Krishnan"/>, Cisco (PC, IAB)</t>
          </li>
          <li>
            <t><contact fullname="Mirja Kühlewind"/>, Ericsson (PC, IAB)</t>
          </li>
          <li>
            <t><contact fullname="Greg Leppert"/>, Berkman Klein Center</t>
          </li>
          <li>
            <t><contact fullname="Greg Lindahl"/>, Common Crawl Foundation</t>
          </li>
          <li>
            <t><contact fullname="Mike Linksvayer"/>, GitHub</t>
          </li>
          <li>
            <t><contact fullname="Fred von Lohmann"/>, OpenAI</t>
          </li>
          <li>
            <t><contact fullname="Shayne Longpre"/>, Data Provenance Initiative</t>
          </li>
          <li>
            <t><contact fullname="Don Marti"/>, Raptive</t>
          </li>
          <li>
            <t><contact fullname="Sarah McKenna"/>, Alliance for Responsible Data Collection; Sequentum</t>
          </li>
          <li>
            <t><contact fullname="Eric Null"/>, Center for Democracy and Technology</t>
          </li>
          <li>
            <t><contact fullname="Chris Needham"/>, BBC</t>
          </li>
          <li>
            <t><contact fullname="Mark Nottingham"/>, Cloudflare (PC)</t>
          </li>
          <li>
            <t><contact fullname="Paul Ohm"/>, Georgetown Law (PC)</t>
          </li>
          <li>
            <t><contact fullname="Braxton Perkins"/>, NBC Universal</t>
          </li>
          <li>
            <t><contact fullname="Chris Petrillo"/>, Wikimedia</t>
          </li>
          <li>
            <t><contact fullname="Sebastian Posth"/>, Liccium</t>
          </li>
          <li>
            <t><contact fullname="Michael Prorock"/></t>
          </li>
          <li>
            <t><contact fullname="Matt Rogerson"/>, Financial Times</t>
          </li>
          <li>
            <t><contact fullname="Peter Santhanam"/>, IBM</t>
          </li>
          <li>
            <t><contact fullname="Jeffrey Sedlik"/>, IPTC/PLUS</t>
          </li>
          <li>
            <t><contact fullname="Rony Shalit"/>, Alliance For Responsible Data Collection; Bright Data</t>
          </li>
          <li>
            <t><contact fullname="Ian Sohl"/>, OpenAI</t>
          </li>
          <li>
            <t><contact fullname="Martin Thomson"/>, Mozilla</t>
          </li>
          <li>
            <t><contact fullname="Thom Vaughan"/>, Common Crawl Foundation (PC)</t>
          </li>
          <li>
            <t><contact fullname="Kat Walsh"/>, Creative Commons</t>
          </li>
          <li>
            <t><contact fullname="James Whymark"/>, Meta</t>
          </li>
        </ul>
        <t>The following participants requested that their identity and/or affiliation not be revealed:</t>
        <ul spacing="normal">
          <li>
            <t>A government official</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="iab-members-at-the-time-of-approval">
      <name>IAB Members at the Time of Approval</name>
      <t>Internet Architecture Board members at the time this document was approved for publication were:</t>
      <ul spacing="normal">
        <li>
          <t><contact fullname="Matthew Bocci"/></t>
        </li>
        <li>
          <t><contact fullname="Roman Danyliw"/></t>
        </li>
        <li>
          <t><contact fullname="Dhruv Dhody"/></t>
        </li>
        <li>
          <t><contact fullname="Jana Iyengar"/></t>
        </li>
        <li>
          <t><contact fullname="Cullen Jennings"/></t>
        </li>
        <li>
          <t><contact fullname="Suresh Krishnan"/></t>
        </li>
        <li>
          <t><contact fullname="Mirja Kühlewind"/></t>
        </li>
        <li>
          <t><contact fullname="Warren Kumari"/></t>
        </li>
        <li>
          <t><contact fullname="Jason Livingood"/></t>
        </li>
        <li>
          <t><contact fullname="Mark Nottingham"/></t>
        </li>
        <li>
          <t><contact fullname="Tommy Pauly"/></t>
        </li>
        <li>
          <t><contact fullname="Alvaro Retana"/></t>
        </li>
        <li>
          <t><contact fullname="Qin Wu"/></t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The program committee and the IAB would like to thank Wilkinson Barker Knauer for their generosity in hosting the workshop.</t>
      <t>We also thank our scribes for capturing notes that assisted in the production of this report:</t>
      <ul spacing="normal">
        <li>
          <t><contact fullname="Zander Arnao"/></t>
        </li>
        <li>
          <t><contact fullname="Andrea Dean"/></t>
        </li>
        <li>
          <t><contact fullname="Patrick Yurky"/></t>
        </li>
      </ul>
    </section>
  </back>
</rfc>
