<?xml version="1.0" encoding="utf-8"?>
<!-- name="GENERATOR" content="github.com/mmarkdown/mmark Mmark Markdown Processor - mmark.miek.nl" -->
<rfc version="3" ipr="trust200902" docName="draft-ietf-sml-structured-email-use-cases-01" submissionType="IETF" category="info" xml:lang="en" xmlns:xi="http://www.w3.org/2001/XInclude" indexInclude="true" consensus="true">

<front>
<title>Structured Email: Use cases</title><seriesInfo value="draft-ietf-sml-structured-email-use-cases-01" stream="IETF" status="informational" name="Internet-Draft"></seriesInfo>
<author initials="H.-J." surname="Happel" fullname="Hans-Joerg Happel"><organization>audriga GmbH</organization><address><postal><street></street>
</postal><email>happel@audriga.com</email>
<uri>https://www.audriga.com</uri>
</address></author><date/>
<area>ART</area>
<workgroup>SML</workgroup>

<abstract>
<t>This document collects and discusses use cases for &quot;structured email&quot; [I-D.ietf-sml-structured-email-01].</t>
</abstract>

</front>

<middle>

<section anchor="introduction"><name>Introduction</name>
<t>This document is currently structured in the following sections:</t>

<ul spacing="compact">
<li>Existing use cases, which are already in use by vendors.</li>
<li>Sharing use cases, which relate to sharing functions of other communication tools such as social networks and instant messaging tools.</li>
<li>Transactional use cases, which address (semi-)formal interactions carried out via email messages.</li>
<li>Email-specific use cases that are specfic to the email domain as such.</li>
</ul>
<t>Each use case includes a small informal note about privacy and trust levels.</t>
<t>A final section points to related use cases which are addressed by particular RFCs.</t>
</section>

<section anchor="conventions-used-in-this-document"><name>Conventions Used in This Document</name>
<t>The terms &quot;message&quot; and &quot;email message&quot; refer to &quot;electronic mail messages&quot; or &quot;emails&quot; as specified in <xref target="RFC5322"></xref>. The term &quot;Message User Agent&quot; (MUA) denotes an email client application as per <xref target="RFC5598"></xref>.</t>
<t>The terms &quot;machine-readable data&quot; and &quot;structured data&quot; are used in contrast to &quot;human-readable&quot; messages and denote information expressed &quot;in a structured format (..) which can be consumed by another program using consistent processing logic&quot; <xref target="MachineReadable"></xref>.</t>
<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"></xref> <xref target="RFC8174"></xref> when, and only when, they appear in all capitals, as shown here.</t>
</section>

<section anchor="existing-use-cases"><name>Existing use cases</name>
<t>The following use cases are currently supported by one or more of the email providers which support <xref target="SchemaOrg"></xref> in email (see also <xref target="StructuredEmail"></xref>).</t>

<section anchor="orders-and-invoices"><name>Orders and invoices</name>
<t>Related to the general topic of online shopping, the <xref target="SchemaOrg"></xref> types <tt>Order</tt>, <tt>Invoice</tt>, and <tt>ParcelDelivery</tt> can be used throughout the purchasing lifecycle.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: high (orders and invoices may expose senstivite data; even the mere sender/shop may be sensitive in some cases)</li>
<li>Trust level: high (fake orders or invoices may pose serious threats)</li>
</ul>
</section>

<section anchor="promotions"><name>Promotions</name>
<t>Some vendors support arrays of structured data which are aggregated to show promotional offers to end users.</t>
<t>These arrays contain a set of products (images), a discount or coupon code and vendor information.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: medium (promotions may be personalized based on user's interest or past transactions)</li>
<li>Trust level: low (just normal SPAM)</li>
</ul>
</section>

<section anchor="reservations"><name>Reservations</name>
<t>Various types of reservations can be processed by some email providers and tools. These include types for transport (Bus-, CarRental-, Flight-, and TrainReservation), HotelReservation, RestaurantReservation and a generic EventReservation type.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: high (exposes potential whereabouts of the user)</li>
<li>Trust level: high (fake reservations may pose serious threats)</li>
</ul>
</section>
</section>

<section anchor="sharing-use-cases"><name>Sharing use cases</name>

<section anchor="geolocation"><name>Geolocation</name>
<t>Location sharing is common action supported by many instant messaging tools. The current best practice to share locations in email messages would probably be to share URLs/deep links to online map services.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: high (exposes whereabouts of the user)</li>
<li>Trust level: low (no strong case for abuse?)</li>
</ul>
</section>

<section anchor="media"><name>Media</name>
<t>Media and content such as news articles, books, cooking recipes, films, or music albums are commonly shared by users. Many websites contain corresponding &quot;share buttons&quot;. The particular &quot;share by email&quot; feature either launches an email send form or a MUA using a &quot;mailto:&quot; (<xref target="RFC6068"></xref>) URL.</t>
<t>In both cases, email messages will typically contain a plain website URL pointing to the shared media item. The recipient needs to switch from her MUA to the web browser and find out manually, what kind of content has been shared.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: low-medium (may expose interest in senstive topics as assume by the person sending sharing the content)</li>
<li>Trust level: low (no strong case for abuse?)</li>
</ul>
</section>

<section anchor="newsletters"><name>Newsletters</name>
<t>Newsletters can be considered as a special conduit for sharing information between a newsletter editor and a larger audience.</t>
<t>They often feature media and content or products. Structured data might ease the further sharing or processing of individual pieces of information.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: low (as long as a newsletter is not personalized, the mere content does not convey more than the newsletter sending address; private unsubscribe links might be a side aspect)</li>
<li>Trust level: low (no strong case for abuse?)</li>
</ul>
</section>

<section anchor="products-and-services"><name>Products and services</name>
<t>Similar to media and content, users may share or recommend certain products and services, which may result in a later purchase or reservation (see first section).</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: low-medium (may expose interest in senstive topics as assume by the person sending sharing the content)</li>
<li>Trust level: low (no strong case for abuse?)</li>
</ul>
</section>

<section anchor="public-events"><name>Public events</name>
<t>While (corporate) meeting scheduling is a common use case based on email (see Message Scheduling below), public events are not supported similarly well.</t>
<t>There are efforts to extend the current event data model for this use case (<xref target="RFC9073"></xref>), which allow to embed <xref target="SchemaOrg"></xref> into calendar data. Structured email might complement and improve this use case.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: low-medium (may expose interest in senstive topics as assume by the person sending sharing the content)</li>
<li>Trust level: low (no strong case for abuse?)</li>
</ul>
</section>
</section>

<section anchor="transactional-use-cases"><name>Transactional use cases</name>

<section anchor="formal-interaction"><name>Formal interaction</name>
<t>Email messages are often used for formal requests sent to government organizations or business.</t>
<t>Users may intiate such requests by composing a free-form email message in their MUA or use a so-called &quot;contact form&quot; on a website, which in many cases will generate an email based on the form's content.</t>
<t>Such contact forms are however a major source of email abuse, since the recipient will technically send an email to itself, based on whatever data was entered into the form.</t>
<t>Structured email could provide means which make such formal contact more efficient and trustworthy.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: high (may depend on use case, though)</li>
<li>Trust level: high (due to interaction)</li>
</ul>
</section>

<section anchor="mail-in-apis"><name>Mail-in-APIs</name>
<t>Various tools such as ticket systems or mailinglist management software allow for controled vocabulary (such as &quot;UNSUBSCRIBE&quot;) in reply messages to trigger certain functionality.</t>
<t>Structured email could help to formalize and improve such use cases, so that they allow for easier interaction.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: low (may depend on use case, though)</li>
<li>Trust level: high (due to interaction)</li>
</ul>
</section>

<section anchor="multi-factor-authentication"><name>Multi-factor authentication</name>
<t>Email is often used as an additional &quot;factor&quot; in multi-factor authentication. Services will send a message to the pre-registered address which users will need to confirm in order to complete a log-in process or similar transactions.</t>
<t>Such messages will typically contain a code and/or a link (URL) to a website.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: high (security-related; howerver, typically short-lived)</li>
<li>Trust level: high (inherently security-related)</li>
</ul>
</section>

<section anchor="sign-up-messages"><name>Sign-up messages</name>
<t>Email is a major form of digital communication with third parties and services they offer. The beginning of such interaction is often some form of &quot;sign-up&quot; or &quot;welcome&quot; message.</t>
<t>Structured data could allow MUAs and downstream tools to help users keep track and manage services they have subscribed to.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: high (may expose senstivite data; even the mere sender may be sensitive in some cases)</li>
<li>Trust level: high (starting point of trust relationship)</li>
</ul>
</section>

<section anchor="status-notifications"><name>Status notifications</name>
<t>Various software systems use email message to notify users about certain updates and status changes. In many cases, users may want to respond with a comment, confirmation, or similar actions.</t>
<t>These kind of actions currently involve URLs, which often results in a web browser launched out of the MUA. Structured email could help provide a more seamless and direct user interaction in those cases.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: high (depends on particular use case)</li>
<li>Trust level: high (may be abused for phishing attempts)</li>
</ul>
</section>
</section>

<section anchor="email-specific-use-cases"><name>Email-specific use cases</name>
<t>This section presents a number of use cases which are specfic to the email domain as such and/or relate to core features of MUAs.</t>

<section anchor="mua-configuration"><name>MUA configuration</name>
<t>Mobile devices can allow special messages for over-the-air (OTA) configuration updates. In a similar fashion, structured email could be used for (re-)configuring MUA settings.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: low (rather technical information)</li>
<li>Trust level: high</li>
</ul>
</section>

<section anchor="reactions"><name>Reactions</name>
<t>Social networks and instant messaging tools allow for various forms of low-level instant reactions, such as &quot;liking&quot;, &quot;thumbs up&quot;, &quot;heart&quot;, or &quot;smiley&quot;.</t>
<t>A simple variant for usage in email messages has been proposed in <xref target="RFC9078"></xref>. Some vendors have also implemented similar solutions, which are however mainly designed for usage within the vendor's own platform (<xref target="OutlookReactions"></xref>, <xref target="GmailReactions"></xref>).</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: low (reaction by itself does not carry much information)</li>
<li>Trust level: low</li>
</ul>
</section>

<section anchor="structured-email-signature"><name>Structured email signature</name>
<t>Email signatures are a commonly used feature of MUAs which allow users to append contact details or information about upcoming events to email messages. They may also be a legal obligation in some settings.</t>
<t>There are no standards for such signatures beyond the separator &quot;-- &quot; used in text/plain body parts, which stems from Usenet practice <xref target="RFC3676"></xref>. With a similar intention, some MUAs allow to append vCard (<xref target="RFC6350"></xref>) files to outgoing messages.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: low (considering there is a human-language signature anyway)</li>
<li>Trust level: low (peripheral content only)</li>
</ul>
</section>

<section anchor="structured-vacation-notice"><name>Structured vacation notice</name>
<t>So called &quot;vacation notices&quot; or &quot;out-of-office replies&quot; are automated messages which are sent in response to incoming messages if a recipient is absent or otherwise unable to respond.</t>
<t>Those messages typically include instructions for the sender (when to retry or whom to contact instead). MUAs can currently hardly assist in dealing with such messages, as they are mainly based on human-language.</t>
<t>Indicators:</t>

<ul spacing="compact">
<li>Privacy level: medium (many users chose to widely autoreply vacation notices)</li>
<li>Trust level: medium (some imaginable attack vector)</li>
</ul>
</section>
</section>

<section anchor="use-cases-specified-by-rfcs"><name>Use cases specified by RFCs</name>
<t>Specific structured formats for email messages have been employed for a number of specific use cases in the past. Semantics and interactions of these messages have been captured in individual RFCS</t>

<section anchor="message-scheduling"><name>Message scheduling</name>
<t anchor="MessageScheduling">Message scheduling is probably the most widely use form of interaction with email messages, which is not mainly based on writing text.</t>
<t>Due to the iCalendar Message-Based Interoperability Protocol (iMIP; [RFC6047), certain well-defined messages can be sent between calendaring software in order to deal with meeting invitations.</t>
<t>While mainly focused on private/business meetings, the use case of public events is less well supported in these workflows (see also discussion above).</t>
</section>
</section>

<section anchor="modeling-guidance"><name>Modeling guidance</name>
<t>This (work in progress) section collects general modeling guidance for discussing and drafting new use cases.</t>

<section anchor="reusing-concepts"><name>Reusing concepts</name>
<t>Concepts from existing vocabularies such as [SchemaOrg] should be reused whenever possible. If smaller extension or improvements are required, editors might want to discuss improvements with respective vocabulary maintainers.</t>
</section>

<section anchor="describing-data-not-action"><name>Describing data, not action</name>
<t>Modeling should focus on describing data itself and not prescribe its use unless this is an inherent part of the modeling (such as in the case of a <tt>potentialAction</tt> property.</t>
<t>E.g., codes for multi-factor authentication might be rather shared as a <tt>ConfirmationCode</tt>concept, than `CopyToClipBoard.</t>
</section>

<section anchor="considering-privacy-and-trust"><name>Considering privacy and trust</name>
<t>Modeling should consider privacy and trust implications of sharing underlying data. Such information could guide senders and receivers in taking appropriate action to ensure responsible data processing.</t>
</section>
</section>

<section anchor="security-considerations"><name>Security considerations</name>
<t>Some security considerations are discussed inline.</t>
</section>

<section anchor="privacy-considerations"><name>Privacy considerations</name>
<t>Some privacy considerations are discussed inline.</t>
</section>

<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>This document has no IANA actions at this time.</t>
</section>

</middle>

<back>
<references><name>Informative References</name>
<reference anchor="GmailReactions" target="https://support.google.com/mail/answer/14080429?hl=en">
  <front>
    <title>Reply to emails with emoji reactions</title>
    <author>
      <organization>Google</organization>
    </author>
    <date></date>
  </front>
</reference>
<reference anchor="MachineReadable" target="https://csrc.nist.gov/glossary/term/Machine_Readable">
  <front>
    <title>NIST IR 7511 Rev. 4</title>
    <author>
      <organization>NIST</organization>
    </author>
    <date></date>
  </front>
</reference>
<reference anchor="OutlookReactions" target="https://support.microsoft.com/en-us/office/reactions-in-microsoft-outlook-06315501-a790-4a2a-90c1-fbc89d84c393">
  <front>
    <title>Reactions in Microsoft Outlook</title>
    <author>
      <organization>Microsoft</organization>
    </author>
    <date></date>
  </front>
</reference>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3676.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5322.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5598.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6068.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6350.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9073.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9078.xml"/>
<reference anchor="SchemaOrg" target="https://schema.org/">
  <front>
    <title>Schema.org</title>
    <author>
      <organization>W3C Schema.org Community Group</organization>
    </author>
    <date></date>
  </front>
</reference>
<reference anchor="StructuredEmail" target="https://structured.email/content/related_work/frameworks/schema_org_for_email.html">
  <front>
    <title>Structured.email: Schema.org for Email</title>
    <author>
      <organization>Structured.email</organization>
    </author>
    <date></date>
  </front>
</reference>
</references>

</back>

</rfc>
