<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Conserver]]></title><description><![CDATA[From vCon’s innovators: actionable insights on open conversation intelligence and SCITT consent infrastructure, driving business outcomes. Subscribe to stay ahead.]]></description><link>https://www.theconserver.com</link><image><url>https://substackcdn.com/image/fetch/$s_!ZL3n!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d2aa84e-d5f7-4eb1-82ca-7041b02de60f_1000x1000.png</url><title>The Conserver</title><link>https://www.theconserver.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 05 May 2026 12:26:10 GMT</lastBuildDate><atom:link href="https://www.theconserver.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ken Herron]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[theconserver@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[theconserver@substack.com]]></itunes:email><itunes:name><![CDATA[The Conserver]]></itunes:name></itunes:owner><itunes:author><![CDATA[The Conserver]]></itunes:author><googleplay:owner><![CDATA[theconserver@substack.com]]></googleplay:owner><googleplay:email><![CDATA[theconserver@substack.com]]></googleplay:email><googleplay:author><![CDATA[The Conserver]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The 15-Minute Privacy Revolution: How This One Framework Creates Unbreakable AI Trust]]></title><description><![CDATA[(While Everyone Else Still Argues About It)]]></description><link>https://www.theconserver.com/p/the-15-minute-privacy-revolution</link><guid isPermaLink="false">https://www.theconserver.com/p/the-15-minute-privacy-revolution</guid><dc:creator><![CDATA[Thomas McCarthy-Howe]]></dc:creator><pubDate>Tue, 26 Aug 2025 14:02:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fIC0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fIC0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fIC0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic 424w, https://substackcdn.com/image/fetch/$s_!fIC0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic 848w, https://substackcdn.com/image/fetch/$s_!fIC0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic 1272w, https://substackcdn.com/image/fetch/$s_!fIC0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fIC0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1011252,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.theconserver.com/i/171754577?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fIC0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic 424w, https://substackcdn.com/image/fetch/$s_!fIC0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic 848w, https://substackcdn.com/image/fetch/$s_!fIC0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic 1272w, https://substackcdn.com/image/fetch/$s_!fIC0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a8430d7-7336-4b0e-863d-4ef7dcea7bc4_4363x2909.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h6> Photo Credit: Spencer Davis on <a href="https://unsplash.com/@spencerdavis">Unsplash</a></h6><p></p><h5><em>TL;DR?</em> Listen to the NotebookLM Audio Overview:</h5><div class="native-audio-embed" data-component-name="AudioPlaceholder" data-attrs="{&quot;label&quot;:null,&quot;mediaUploadId&quot;:&quot;1fadc241-b50f-4c39-82ef-bcabcc5ddd4f&quot;,&quot;duration&quot;:821.10693,&quot;downloadable&quot;:false,&quot;isEditorNode&quot;:true}"></div><p></p><p><em>This article is part 3 of our 6-part series on revolutionizing conversational data privacy. In my last article, we explored why vCons and SCITT create an unprecedented win-win for businesses and consumers. Today, I&#8217;ll show you the exact step-by-step mechanics that make this framework work in practice.</em></p><p><strong>Here&#8217;s what happened after the last article:</strong> The compliance officer from our story sent me a message: &#8220;I shared your article with our entire C-suite. They want to know three things: How exactly does this work? What does implementation look like? And can you walk us through a real scenario?&#8221;</p><p><strong>Today, I&#8217;ll answer all three questions</strong> by taking you inside the complete technical journey, showing you exactly how vCons and SCITT transform from a theoretical framework to a practical implementation that protects privacy while unlocking AI innovation.</p><h2>The Architecture That Actually Works: Three Pillars of Unbreakable Trust</h2><blockquote><p><em>&#8220;The future belongs to organizations that can prove their privacy claims, not just promise them.&#8221; </em>&#8212; Industry Report, 2025</p></blockquote><p>Think of traditional data privacy as a locked filing cabinet. You promise to keep the keys safe, but consumers have to trust you. The vCons and SCITT framework is different; it&#8217;s like having a transparent, tamper-proof safe where everyone can see exactly what you&#8217;re doing with their data, but only you can access what you&#8217;re authorized to use.</p><p>Here&#8217;s how the three interconnected pillars create this trust:</p><h2><strong>Pillar 1: Standardized Containers (vCons)</strong></h2><p>Every conversation becomes a secure, self-contained package carrying its own permissions like a smart shipping container that knows exactly who can open it and why.</p><h2><strong>Pillar 2: Immutable Transparency (SCITT)</strong></h2><p>Every action on that conversation gets cryptographically recorded in an unalterable ledger. Think blockchain-level security without the complexity or energy costs.</p><h2><strong>Pillar 3: Automated Enforcement</strong></h2><p>Consent preferences travel with the data and are automatically enforced by every system. No human errors, no &#8220;oops, we forgot&#8221; moments.</p><div class="pullquote"><p><strong>&#128161; Quick question:</strong> <em>What would change in your business if customers could see exactly how their data was being used, and you could prove compliance instantly?</em></p></div><h2>The Complete Customer Journey: Sarah&#8217;s Call Transforms Everything</h2><p>Let me show you precisely what happens when this framework handles a real customer interaction. We&#8217;ll follow Sarah through her insurance claim call and see how every moment creates transparency and trust.</p><h2><strong>Minutes 0:00-0:30: The Foundation</strong></h2><p>When Sarah&#8217;s call connects, something fundamentally different happens. The system isn&#8217;t just recording, it&#8217;s preparing to create an auditable container with complete context and metadata.</p><p><strong>Traditional approach:</strong> Basic recording to the database</p><p><strong>vCon approach:</strong> Structured data preparation with embedded permissions</p><h2><strong>Minutes 0:30-0:45: The Consent Revolution</strong></h2><p><strong>The old way:</strong> <em>&#8220;This call may be recorded for quality purposes.&#8221;</em></p><p><strong>The new way:</strong> The system asks, <em>&#8220;This call may be recorded for quality and training. Say &#8216;yes&#8217; to agree, or tell us your specific preferences.&#8221;</em></p><p>Sarah responds: <strong>&#8220;Yes, but not for AI training.&#8221;</strong></p><p>Here&#8217;s the magic: this nuanced consent gets captured as structured, enforceable data:</p><ul><li><p>Quality monitoring: &#9989; <strong>Granted</strong></p></li><li><p>Human training: &#9989; <strong>Granted</strong></p></li><li><p>AI training: &#10060; <strong>Denied</strong></p></li></ul><p>This consent immediately gets recorded in SCITT as a <em>vcon_consent_accepted</em> event with cryptographic proof of precisely what was agreed to.</p><div class="pullquote"><p><strong>&#128293; Share-worthy insight:</strong> Traditional systems record blanket consent. vCons capture granular, enforceable preferences that travel with the recording forever.</p></div><h2><strong>Minutes 0:45-15:00: Transparent Processing</strong></h2><p>As Sarah discusses her claim with agent James, the system continues building the complete audit trail:</p><ul><li><p>Supervisor escalation at 8:30 &#8594; <strong>Logged</strong></p></li><li><p>Hold periods &#8594; <strong>Timestamped</strong></p></li><li><p>Resolution details &#8594; <strong>Captured</strong></p></li></ul><p>Every significant event becomes part of the immutable record.</p><h2><strong>Minutes 15:00-15:30: The vCon Creation</strong></h2><p>When the call ends, everything gets packaged into vCon #789456, a secure digital container containing:</p><ul><li><p>The complete audio recording</p></li><li><p>All participant information</p></li><li><p>Sarah&#8217;s specific consent preferences</p></li><li><p>The timestamped event log</p></li><li><p>All processing metadata</p></li></ul><p>The vCon creation gets immediately registered in SCITT: &#8220;<em>vcon_created</em>: vCon #789456 created at 3:15 PM containing call from 555-0123, duration 15 minutes, with specified consent parameters.&#8221;</p><div class="pullquote"><p><strong>&#128161; Discussion starter:</strong> <em>How would your customer relationships change if every interaction created this level of transparency?</em></p></div><h2><strong>Minutes 15:01-15:30: Automated Enforcement in Action</strong></h2><p>Now watch the power of automated consent enforcement:</p><p><strong>&#9989; Transcription Service</strong> &#8594; Checks consent (quality monitoring: &#9989;) &#8594; Processes &#8594; Adds transcript &#8594; Logs action in SCITT</p><p><strong>&#9989; Quality Analytics</strong> &#8594; Checks consent (human training: &#9989;) &#8594; Analyzes call &#8594; Adds insights &#8594; Records in SCITT</p><p><strong>&#10060; AI Training Team</strong> &#8594; Checks consent (AI training: &#10060;) &#8594; <strong>ACCESS DENIED</strong> &#8594; Denial logged with cryptographic proof</p><p>Every interaction gets recorded using standardized event types from the IETF vCon Lifecycle specification:</p><ul><li><p><em>vcon_sent</em>: vCon #789456 sent to TranscriptionCo at 3:16 PM</p></li><li><p><em>vcon_received</em>: TranscriptionCo confirmed receipt at 3:16 PM</p></li><li><p>Access denied: AI Training Team - consent not granted at 3:25 PM</p></li></ul><p><strong>The breakthrough:</strong> Sarah&#8217;s preferences are automatically enforced without any human intervention. If she ever wants to know how her data was used, she can request access to the SCITT ledger and see cryptographic proof of every interaction.</p><h2><strong>Six Months Later: The &#8220;Right to Know&#8221; Revolution</strong></h2><p>Sarah exercises her &#8220;right to be forgotten.&#8221; Here&#8217;s where traditional systems fail, and this framework shines:</p><ol><li><p><strong>System queries SCITT:</strong> &#8220;Where did vCon #789456 go?&#8221;</p></li><li><p><strong>SCITT returns a complete audit trail</strong> showing every <em>vcon_sent</em> and <em>vcon_received</em> event</p></li><li><p><strong>The system sends cryptographically signed deletion orders</strong> to each party</p></li><li><p><strong>Each party deletes and logs:</strong> <em>vcon_deleted</em> events in SCITT</p></li><li><p><strong>Sarah receives mathematical proof</strong> of complete deletion</p></li></ol><p><strong>Traditional approach:</strong> Email requests and crossed fingers</p><p><strong>This approach:</strong> Mathematical certainty with cryptographic proof</p><h2>What This Means for Your Business Right Now</h2><p><strong>If you&#8217;re a CTO:</strong> This framework gives you mathematical proof of privacy compliance, no more sleepless nights about data audits.</p><p><strong>If you&#8217;re a compliance officer:</strong> You get real-time visibility into exactly how customer data is being used across your entire organization.</p><p><strong>If you&#8217;re a CEO:</strong> You can finally say &#8220;yes&#8221; to AI innovation while saying &#8220;yes&#8221; to consumer privacy, no more choosing between them.</p><p><strong>Ready to dive deeper?</strong> In my next article, we&#8217;ll explore the specific types of consent you can capture with this framework. You&#8217;ll see how consent evolves from a binary checkbox into an intelligent system that enables innovation while respecting boundaries.</p><div class="pullquote"><p><em><strong>&#128172; What&#8217;s your biggest privacy challenge?</strong> Share it in the comments. I personally respond to every question and often turn the best ones into detailed follow-up posts.</em></p></div><p><strong>About Thomas McCarthy-Howe</strong></p><p>CTO at Strolid, Inc., leading next-generation automotive business development solutions. 30+ years in communications technology, co-author of the IETF vCon draft specification, 15 patents in telecommunications and data management. Focused on building scalable, privacy-first systems that unlock business value from conversational data.</p><div><hr></div><p><strong>&#128279; Want more insights like this?</strong> Hit the <strong>Subscribe</strong> button and join executives who rely on this newsletter for privacy innovation insights.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.theconserver.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>&#128200; Found this valuable?</strong> Share it with your network. Privacy-conscious leaders need to see this framework.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/p/the-15-minute-privacy-revolution?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.theconserver.com/p/the-15-minute-privacy-revolution?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><blockquote><p><em>The age of trustworthy AI isn&#8217;t coming; it&#8217;s here for organizations ready to embrace transparency. The question isn&#8217;t whether this framework will become standard practice. The question is whether your organization will lead or follow.</em></p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/p/the-15-minute-privacy-revolution/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.theconserver.com/p/the-15-minute-privacy-revolution/comments"><span>Leave a comment</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Why vCons and SCITT Create an Unprecedented Win-Win for Business and Consumer Privacy]]></title><description><![CDATA[How Two Emerging Technologies Transform Privacy from a Business Barrier into a Competitive Advantage]]></description><link>https://www.theconserver.com/p/why-vcons-and-scitt-create-an-unprecedented</link><guid isPermaLink="false">https://www.theconserver.com/p/why-vcons-and-scitt-create-an-unprecedented</guid><dc:creator><![CDATA[Thomas McCarthy-Howe]]></dc:creator><pubDate>Wed, 20 Aug 2025 14:34:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ekqh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ekqh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ekqh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic 424w, https://substackcdn.com/image/fetch/$s_!Ekqh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic 848w, https://substackcdn.com/image/fetch/$s_!Ekqh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic 1272w, https://substackcdn.com/image/fetch/$s_!Ekqh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ekqh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic" width="1456" height="2187" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2187,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:336168,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.theconserver.com/i/171402841?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ekqh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic 424w, https://substackcdn.com/image/fetch/$s_!Ekqh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic 848w, https://substackcdn.com/image/fetch/$s_!Ekqh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic 1272w, https://substackcdn.com/image/fetch/$s_!Ekqh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1058bc-323a-4c9e-be0f-76bde7c6f23e_1851x2780.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h6><em>Photo Credit: Alvan Nee on <a href="https://unsplash.com/@alvannee">Unsplash</a></em></h6><p></p><p><em>This is part 2 of a 6-part series on revolutionizing conversational data privacy. In &#8220;<a href="https://www.theconserver.com/p/building-trust-in-the-age-of-ai-how">Building Trust in the Age of AI</a>,&#8221; I introduced the complete framework of vCons and SCITT. Today, I will explore why this creates an unprecedented win-win scenario.</em></p><p>Remember the comprehensive framework I introduced? The one that promises to let us use conversational AI responsibly while protecting privacy? You now understand how <strong>vCons package conversations with their permissions</strong>, and how <strong>SCITT creates an immutable audit trail</strong>. But I haven&#8217;t told you the most crucial part, why this makes a historic alignment between business needs and consumer rights.</p><p>Today, I want to share a conversation that crystallized exactly why this approach is so powerful, and why it&#8217;s inevitable.</p><h2><strong>The Question That Changed Everything</strong></h2><p>Last time, I walked you through how vCons package conversations with their permissions, and how SCITT creates an unbreakable audit trail. <strong>Quick reminder:</strong> vCons are standardized containers that keep conversations and their consent permissions together, while SCITT provides cryptographic proof of every action taken with that data. But I didn&#8217;t tell you about the most important conversation I&#8217;ve had about this technology.</p><h5><em>For a technical deep dive into SCITT (Supply Chain Integrity, Transparency and Trust), see <a href="https://www.conserver.io/deep-dives/scitt-supply-chain-integrity-transparency-and-trust">Draft-Post-2.pdf</a>.</em></h5><p>I was meeting with the Chief Compliance Officer of a primary communications service provider, someone who&#8217;d spent decades wrestling with privacy regulations across dozens of countries. This wasn&#8217;t a casual chat; he&#8217;d blocked out an hour to understand our approach. He grilled me about the technical details, implementation challenges, and legal implications.</p><p>Finally, he leaned back in his chair and said, &#8220;Wow. I can understand why businesses want this. But why would consumers?&#8221;</p><p>My answer was simple: <strong>&#8220;Because they can express all of their digital rights, and the business can prove they honored each request.&#8221;</strong></p><p>His eyes lit up. For the first time in his career, he was looking at a system where consumer protection and business efficiency pointed in the same direction. Let me explain why this matters so much.</p><h2><strong>Breaking the Zero-Sum Game</strong></h2><p>For decades, <strong>privacy has been treated as a zero-sum game</strong>. Businesses wanted to use data; consumers tried to protect it. Every regulation seemed to take something away from businesses. Every new data use felt like it took something away from consumers. We&#8217;ve been locked in this adversarial dance, with trust eroding on both sides.</p><p>What that compliance officer understood in that moment, sitting across from me in his conference room, was that <strong>vCons and SCITT break this dynamic entirely</strong>. They create what economists call a positive-sum game, where both parties can win simultaneously. Here&#8217;s how.</p><h2><strong>What Businesses Get</strong></h2><p>In my last article, I explained the technical framework. But let&#8217;s talk about what this means in <strong>practical business terms</strong>. When you implement vCons and SCITT, you&#8217;re not just getting a compliance system. You&#8217;re getting &#8212;</p><p><strong>Legal Confidence:</strong> Your legal team transforms from the &#8220;department of no&#8221; to the &#8220;department of yes, and here&#8217;s how.&#8221; They can approve data initiatives because they have <strong>cryptographic proof of compliance</strong>; no more killing innovation in the name of risk management.</p><p><strong>Operational Efficiency:</strong> In a typical organization, compliance staff spend hours processing a single deletion request, tracking down vendors, sending emails, following up, documenting responses. With vCons and SCITT, <strong>it&#8217;s automated</strong>. Click, verify, done. Those hours can be spent on strategic initiatives instead of spreadsheet management.</p><p><strong>Competitive Intelligence:</strong> Right now, most companies are sitting on conversational goldmines they can&#8217;t touch. Your competitors are using vCons and SCITT to <strong>train better AI models</strong>, understand customer needs more deeply, and predict market trends more accurately. They&#8217;re not more intelligent than you; they have better tools.</p><p><strong>Audit Readiness:</strong> When regulators come calling (and they will), you can <strong>generate a complete compliance report in minutes</strong>, not weeks. Every conversation, every consent, every deletion; all documented with cryptographic proof. Audits become demonstrations of competence, not investigations of potential wrongdoing.</p><h2><strong>What Consumers Get</strong></h2><p>But here&#8217;s where it gets interesting. <strong>Consumers aren&#8217;t just tolerating this system</strong>, they&#8217;re benefiting from it in ways that current privacy approaches can&#8217;t match &#8212; </p><p><strong>Real Control, Not Theater:</strong> Today&#8217;s privacy notices are theater. Click &#8220;accept&#8221; or don&#8217;t use the service. With vCons, consumers can give <strong>granular consent</strong>. &#8220;Yes to customer service training, no to AI development.&#8221; And these preferences are enforced automatically, not just promised in a policy document.</p><p><strong>Verification, Not Trust:</strong> &#8220;Trust us, we deleted your data&#8221; becomes &#8220;<strong>Here&#8217;s cryptographic proof</strong> we deleted your data, and here&#8217;s proof that our three vendors deleted it too.&#8221; Consumers don&#8217;t have to trust anymore; they can verify.</p><p><strong>Dynamic Consent:</strong> Changed your mind about how your conversations can be used? With current systems, good luck. With vCons and SCITT, you can <strong>revoke specific permissions at any time</strong>, and those revocations cascade through the entire ecosystem automatically.</p><p><strong>Innovation Without Fear:</strong> When consumers know their rights are cryptographically protected, they&#8217;re <strong>more willing to engage</strong> with new services. They can try that new AI assistant without worrying that their conversations will be misused. Innovation accelerates when fear decreases.</p><h2><strong>Real-World Magic: Where This Gets Exciting</strong></h2><p>Let me paint you a picture of how this <strong>transforms business operations</strong> &#8212; </p><p><strong>Financial Services:</strong> A bank can now safely use customer service calls to train AI that detects fraud patterns. Why? Because every conversation explicitly states what it can be used for. When consent expires or is revoked, the bank has <strong>mathematical proof of compliance</strong>. They get the insights while customers get iron-clad privacy protection.</p><p><strong>Healthcare:</strong> A hospital network can share patient conversations with specialists for better diagnosis while maintaining <strong>HIPAA compliance</strong>. Each specialist sees only what they&#8217;re authorized to see, and there&#8217;s an immutable record of who accessed what and when.</p><p><strong>Retail:</strong> That clothing company using chat logs to improve customer experience? They can now <strong>prove they&#8217;re only using conversations</strong> from customers who explicitly consented to service improvement. When someone opts out, deletion cascades through every system automatically.</p><h2><strong>The Network Effect: Why This Changes Everything</strong></h2><p>The beauty of this system is that it <strong>gets more potent</strong> as more organizations adopt it. It&#8217;s like email; the more people who have it, the more useful it becomes.</p><p>When your transcription vendor supports vCons and SCITT, you don&#8217;t need a custom integration. When your AI analytics partner joins the network, <strong>consent management happens automatically</strong>. When regulators can verify compliance cryptographically, audits become less invasive and more trustworthy.</p><p>We&#8217;re not talking about some distant future. <strong>Major vendors are already implementing vCon support</strong>. Standards bodies are finalizing the protocols. Forward-thinking companies are running pilots. The question isn&#8217;t whether this will become the standard; it&#8217;s how fast you can get on board.</p><h2><strong>The Competitive Edge Hidden in Plain Sight</strong></h2><p>Here&#8217;s what most people miss: This isn&#8217;t just about avoiding fines or satisfying regulators. <strong>It&#8217;s about unlocking the value trapped in your conversational data</strong>.</p><p>Right now, your legal team probably says &#8220;no&#8221; to most data initiatives. Too risky. Too complex. With vCons and SCITT, <strong>legal becomes your innovation partner</strong>. They can say &#8220;yes&#8221; because they can prove compliance. Your data scientists can build better models. Your customer experience team can derive more profound insights. Your AI initiatives can move from pilot to production.</p><p>Companies that adopt this approach won&#8217;t just avoid privacy penalties; they&#8217;ll <strong>leap ahead of competitors</strong> still managing consent with spreadsheets and emails.</p><h2><strong>The Privacy Paradox, Solved</strong></h2><p>Remember the paradox from my last article? Companies caught between the value of conversational data and the complexity of compliance? <strong>vCons and SCITT dissolve this tension</strong>. They make privacy protection and data utilization two sides of the same coin.</p><p>This isn&#8217;t just a technical evolution; it&#8217;s a <strong>fundamental shift</strong> in how we think about privacy. Instead of privacy as a barrier, it becomes an enabler. Instead of compliance as a cost center, it becomes a competitive advantage.</p><p><strong>The tools exist. The standards are ready.</strong> The only question is: <em>Will you lead this transformation in your organization, or will you watch competitors pull ahead while you&#8217;re still drowning in spreadsheets?</em></p><h2><strong>What&#8217;s Next</strong></h2><p>In my next article, &#8220;Building Trust in the Age of AI,&#8221; I&#8217;ll take you on a complete journey through this framework. We&#8217;ll explore exactly how vCons and SCITT create an <strong>unbreakable chain of trust</strong>, walk through real implementation scenarios, and I&#8217;ll share practical steps you can take to get started. You&#8217;ll see how this isn&#8217;t just about solving today&#8217;s privacy challenges; it&#8217;s about building the foundation for responsible conversational AI that consumers can trust.</p><p>But don&#8217;t wait until next week to start thinking about this. <strong>The conversations happening in your business right now</strong> are more than just data; they&#8217;re opportunities to build trust at scale. And in the age of AI, trust isn&#8217;t just nice to have. It&#8217;s everything.</p><p><em>Want to get started now? Check out the IETF vCon working group and the SCITT protocol specifications. Or better yet, reach out to discuss how this could transform your organization&#8217;s approach to conversational data. The next deep dive will give you everything you need to build your implementation roadmap.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/p/why-vcons-and-scitt-create-an-unprecedented?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.theconserver.com/p/why-vcons-and-scitt-create-an-unprecedented?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><p><strong>About the Author</strong></p><p>Thomas McCarthy-Howe is the Chief Technology Officer at <a href="http://strolid.ai">Strolid, Inc.</a>, where he leads the development of next-generation automotive business development solutions. With over 30 years of experience in communications technology, Thomas is a co-author of the IETF vCon draft specification and holds 15 patents in telecommunications and data management. His work focuses on building scalable, privacy-first systems that unlock business value from conversational data.</p><p><em>Ed: What questions do you have about implementing responsible AI in your organization? Share your thoughts in the comments. We&#8217;d love to discuss the challenges you&#8217;re facing.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/p/why-vcons-and-scitt-create-an-unprecedented/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.theconserver.com/p/why-vcons-and-scitt-create-an-unprecedented/comments"><span>Leave a comment</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading <em>The Conserver</em>! Subscribe to receive new posts in your email and on the Substack app.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Building Trust in the Age of AI: How We Can Finally Use Conversations Responsibly]]></title><description><![CDATA[How vCons and SCITT solve the privacy-innovation dilemma]]></description><link>https://www.theconserver.com/p/building-trust-in-the-age-of-ai-how</link><guid isPermaLink="false">https://www.theconserver.com/p/building-trust-in-the-age-of-ai-how</guid><dc:creator><![CDATA[Thomas McCarthy-Howe]]></dc:creator><pubDate>Mon, 18 Aug 2025 19:41:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Kr5a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Kr5a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Kr5a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic 424w, https://substackcdn.com/image/fetch/$s_!Kr5a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic 848w, https://substackcdn.com/image/fetch/$s_!Kr5a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic 1272w, https://substackcdn.com/image/fetch/$s_!Kr5a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Kr5a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic" width="1456" height="2184" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2184,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:532074,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.theconserver.com/i/171303462?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Kr5a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic 424w, https://substackcdn.com/image/fetch/$s_!Kr5a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic 848w, https://substackcdn.com/image/fetch/$s_!Kr5a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic 1272w, https://substackcdn.com/image/fetch/$s_!Kr5a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ae69371-9eec-4dfa-a8cc-0d10143d440a_3107x4660.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h6><em>Photo Credit: <a href="https://www.fabiangieske.com">Fabian Gieske</a> on <a href="https://unsplash.com/@fbngsk">Unsplash</a></em></h6><p></p><p>Let me share something that&#8217;s been keeping me up at night. We&#8217;re sitting on an incredible opportunity with conversational AI, but we&#8217;re also walking a tightrope. <strong>Every conversation your business has contains insights that could transform how you operate.</strong> Yet each of those conversations also carries the weight of someone&#8217;s trust. How do we balance these two realities?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading <em>The Conserver</em>! Subscribe to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Think about the last time you called customer service. You probably heard that familiar message about your call being recorded for quality and training purposes. What<strong> if I told you that the recording might later be used to train an AI system?</strong> Would you feel comfortable with that? More importantly, how would the company even keep track of what you consented to, especially if you change your mind later?</p><p>This is the puzzle I&#8217;ve been working to solve, and I want to walk you through <strong>a framework that could change everything about how businesses handle conversational data.</strong></p><h2><strong>Understanding the Real Challenge</strong></h2><p>Before we dive into solutions, let&#8217;s make sure we&#8217;re on the same page about the problem. Imagine you&#8217;re running a business that handles thousands of customer interactions daily. These conversations happen across phone calls, video meetings, chat systems, and support tickets. <strong>Each one is a goldmine of information</strong> about what your customers need, what frustrates them, and how you could serve them better.</p><p>But here&#8217;s where it gets complex. These conversations don&#8217;t just contain business insights. <strong>They include personal stories, private information, and human moments that deserve protection.</strong> In Europe, GDPR treats voice recordings as biometric data requiring special protection. In California, CCPA gives consumers the right to know what you&#8217;re doing with their data and to request its deletion. And these regulations are just the beginning.</p><p>The traditional approach has been to err on the side of caution, which often means not using this data at all. But that&#8217;s like having a library full of books you&#8217;re not allowed to read. <strong>There has to be a better way, and that&#8217;s precisely what vCons and SCITT provide.</strong></p><h2><strong>Introducing vCons: A Container Built for Conversations</strong></h2><p>Let me introduce you to the first piece of the puzzle. A vCon, which stands for <strong>Virtualized Conversation</strong>, is a specialized container explicitly designed for conversational data. To understand why this matters, let&#8217;s think about how conversations are typically stored today.</p><p>In most organizations, a single customer interaction might be scattered across multiple systems. The audio recording sits in one database, the transcript in another, the metadata about who participated lives in a CRM system, and any notes or analysis might be in yet another application. <strong>It&#8217;s like having the pages of a book scattered across different rooms of a house.</strong></p><p>A vCon brings all these pieces together into a single, standardized package. But it does something even more critical. <strong>It includes a special section for consent and privacy preferences.</strong> This means that wherever the conversation goes, the permissions travel with it. Think of it like a passport that travels with a person, clearly stating where they&#8217;re allowed to go and what they&#8217;re allowed to do.</p><p>The beauty of this approach becomes clear when you consider what happens when you need to share conversational data. You may want to send a customer service call to a transcription service or share it with an AI vendor for analysis. <strong>With a vCon, you&#8217;re not just sharing raw data. You&#8217;re sharing a complete package that includes clear instructions about what can and cannot be done with that data.</strong></p><h2><strong>SCITT: Creating an Unbreakable Chain of Trust</strong></h2><p>Now, packaging conversations properly is only half the solution. The second piece is SCITT, which stands for <strong>Supply Chain Integrity, Transparency, and Trust</strong>. I know that&#8217;s a mouthful, but stay with me because this is where things get interesting.</p><p>Think about how we handle essential documents in the physical world. When you buy a house, every significant document gets notarized. That notary stamp creates a permanent record that the document existed at a particular time and was acknowledged by specific parties. <strong>SCITT does the same thing for digital conversations, but with a crucial difference: the record it creates cannot be altered or deleted.</strong></p><p>Here&#8217;s how it works in practice. Every time something significant happens to a vCon, that event gets recorded in SCITT. When a customer gives consent, that&#8217;s recorded. When the conversation is shared with a third party, that&#8217;s recorded. If analysis is performed, that&#8217;s recorded too. <strong>And if the customer later revokes consent or requests deletion, those actions are also permanently documented.</strong></p><p>What makes this powerful is that it creates accountability across entire ecosystems. Let&#8217;s say you share a conversation with three different service providers for transcription, sentiment analysis, and AI training. Each of these providers must record their receipt of the data in SCITT. <strong>If a customer later requests deletion, you can use these records to ensure everyone who received the data correctly deletes it.</strong></p><h2><strong>Bringing It All Together: A New Model for Trust</strong></h2><p>Now let me show you how vCons and SCITT work together to create something transformative. Imagine a customer service call that unfolds like this:</p><p>When the call begins, the system creates a vCon that will contain the recording. The customer hears the standard message about call recording and agrees to proceed. But here&#8217;s where things diverge from the traditional approach. <strong>The system can now present specific consent options.</strong> Would the customer allow the recording to be used for quality assurance? What about AI training to improve service? Each permission is recorded in the vCon and logged in SCITT with a timestamp and cryptographic proof.</p><p>As the call progresses and eventually ends, the complete conversation is packaged in the vCon along with all the consent information. <strong>When the business wants to use this conversation, they don&#8217;t have to wonder what was allowed.</strong> The permissions are right there in the package, and the SCITT record proves when and how consent was obtained.</p><p>But here&#8217;s where it gets even more interesting. Let&#8217;s say six months later, the customer decides they&#8217;re not comfortable with their conversation being used for AI training anymore. In the traditional model, this would be a nightmare. How do you find every copy of the recording? How do you prove you&#8217;ve deleted it from all AI training datasets?</p><p><strong>With vCons and SCITT, this becomes manageable.</strong> The revocation of consent is recorded in SCITT, creating a permanent record of the customer&#8217;s wishes. The SCITT ledger shows everyone who received the conversation, so you know exactly who needs to be notified. And when deletion is complete, that too is recorded, providing proof of compliance.</p><h2><strong>Why This Matters More Than Ever</strong></h2><p>You might be wondering why we need such an elaborate system. Let&#8217;s be careful with data and trust that everyone will do the right thing. The answer lies in understanding three converging trends that make this framework essential.</p><p><strong>First, conversational AI is becoming incredibly powerful.</strong> The insights we can extract from conversations today would have seemed like science fiction just a few years ago. AI can detect customer sentiment, identify emerging issues, predict churn, and even suggest personalized solutions. But with great power comes great responsibility, and we need frameworks that ensure this power is used ethically.</p><p><strong>Second, privacy regulations are becoming stricter and more widespread.</strong> What started with GDPR in Europe has inspired similar laws worldwide. California&#8217;s CCPA, Brazil&#8217;s LGPD, and many others share common themes around consent, transparency, and user control. Businesses need systems that can adapt to this evolving regulatory landscape.</p><p><strong>Third, and perhaps most importantly, consumer expectations are changing.</strong> People are becoming more aware of how their data is used and more selective about who they trust. Companies that can demonstrate responsible data handling won&#8217;t just avoid penalties - they&#8217;ll earn customer loyalty and competitive advantage.</p><h2><strong>Taking the First Steps</strong></h2><p>If you&#8217;re convinced that this approach makes sense for your business, you might be wondering how to get started. <strong>The good news is that you don&#8217;t need to transform everything overnight.</strong></p><p>Start by understanding your current conversation landscape. What types of conversations does your business have? Which ones contain the most valuable insights? Which ones carry the highest privacy risks?</p><p>Next, examine your current consent processes. How do you obtain consent today? How is it recorded? What happens when someone wants to revoke consent? <strong>Understanding your current state will help you identify where vCons and SCITT can provide the most immediate value.</strong></p><p>Consider starting with a pilot program focused on a specific type of conversation. Customer service calls are often a good starting point because they typically already have consent processes and clear business value. As you gain experience with the framework, you can expand to other conversation types.</p><p><strong>Remember that this isn&#8217;t just a technology implementation. It&#8217;s a new way of thinking about conversational data. </strong>Involve your legal, privacy, and compliance teams early in the process. Help them understand how vCons and SCITT can make their jobs easier by providing clear documentation and audit trails.</p><h2><strong>A Personal Reflection on Why This Matters</strong></h2><p>I&#8217;ve spent years working at the intersection of technology and privacy, and I&#8217;ve seen how the tension between innovation and protection can paralyze organizations. We&#8217;ve created a false choice between using data to improve our businesses and respecting people&#8217;s privacy. <strong>This framework proves we can do both.</strong></p><p>What excites me most about vCons and SCITT is that they&#8217;re not just solving today&#8217;s problems. They&#8217;re creating infrastructure for a future where conversational AI is ubiquitous but still trustworthy. <strong>They&#8217;re laying the groundwork for businesses to innovate responsibly and for consumers to share their thoughts and experiences without fear.</strong></p><p>The conversations happening in your business right now are more than just data. They&#8217;re moments of human connection, opportunities to solve problems, and chances to build relationships. By treating them with the respect they deserve while still extracting their valuable insights, we can build businesses that are both more intelligent and more trustworthy.</p><p><strong>The path forward isn&#8217;t always easy, but it&#8217;s clear.</strong> We need to move beyond hoping we&#8217;re handling conversational data responsibly to proving it. We need to shift from avoiding the use of conversational insights to embracing them within a framework of transparency and consent. And we need to recognize that in the age of AI, trust isn&#8217;t just nice to have. It&#8217;s a business imperative.</p><p>Are you ready to take the first step? <strong>The future of responsible conversational AI is being built right now, and your business can be part of shaping it.</strong> The only question is whether you&#8217;ll lead the change or follow it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/p/building-trust-in-the-age-of-ai-how?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.theconserver.com/p/building-trust-in-the-age-of-ai-how?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div><hr></div><h2><strong>About the Author</strong></h2><p><strong>Thomas McCarthy-Howe</strong> is the Chief Technology Officer at <a href="http://strolid.ai">Strolid Inc.</a>, where he leads the development of next-generation automotive business development solutions. With over 30 years of experience in communications technology, Thomas is a co-author of the IETF vCon draft specification and holds 15 patents in telecommunications and data management. His work focuses on building scalable, privacy-first systems that unlock business value from conversational data.</p><p><em>Ed: What questions do you have about implementing responsible AI in your organization? Share your thoughts in the comments; we&#8217;d love to discuss the challenges you&#8217;re facing.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/p/building-trust-in-the-age-of-ai-how/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.theconserver.com/p/building-trust-in-the-age-of-ai-how/comments"><span>Leave a comment</span></a></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.theconserver.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Conserver! Subscribe to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>