7. Privacy Considerations
Different places have different constraints on
individual privacy.
The requirements in this memo are intended to provide
for some
limited protections that attendees can apply. As
meetings are
announced, IASA SHALL inform the IETF of any
limitations to privacy
they have become aware of in their investigations.
For example,
participants would be informed of any regulatory
authentication or
logging requirements. This note reveals no personally
identifying
information apart from its authorship.
I do not understand the use of "attendees can apply" in
the second sentence.