SlideShare une entreprise Scribd logo
1  sur  133
How to prevent the  World Wild Web Identity  Crisis By   idplatform.eu   a non-profit organization  in the process of foundation Presented by Helmer Wieringa Contact details:  [email_address]
Structure of this presentation  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Privacy?!...    I don’t care; I have nothing to hide…
WANTED: YOUR IDENTITY  BY Criminals Government Employers Business Relations Service Providers Family & Friends   TO CONTROL YOU
But first some definitions…  Identity  Personal information   Privacy
There are two sides of the  identity  coin…
idem   identity, meaning an identity based on an arrangement;  the purpose is  persistent identification   Idem identity   Individual
ipse  identity meaning the way you are identified and categorized by your self and others; the purpose is the  construction of the self See summary of  Future of Identity In the information Society FDIS The concept identity  Ricoeur ;  Beller ;  Leerssen   Ipse identity   Individual
What includes  personal information ?
Some Personal Information Facets *) *) Reference: Privacy in the clouds, A. Cavoukian, Office of the Information and Privacy Commissionar, Toronto, Canada – combined with  p3p categories  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Many definitions of  privacy  here follows just one…
An individual's  privacy  is their ability to control the  flow ,  boundary , and persistence  of their personal information*) *) Privacy in the Clouds A. Cavoukian
So, do you want still to be identified  without knowing this and why  and to be  constructed   by others?
I still don’t care    That’s fine but stop listening to  or reading of this presentation
We return now to the daily problems...
Users  hate to register  for services and  are frustrated by  lengthy enquiries  and   often  back off
Users  can’t remember   user names and passwords
…  and have on average  hundreds  of those user/name  password combinations
Users are exposed to the risk of  identity theft The number of US adult victims of identity fraud  8.4 million in 2007.  Total one year fraud  $49.3 billion in 2007 The mean fraud amount per fraud victim $5,720 in 2007.
Users  don’t read  privacy policies and  don’t trust  service providers anyway…
…  and  they are right…   service providers change privacy policies  without notification
Individuals have  no idea  what others  think  to know about them  and why
It is often  impossible to unsubscribe  from e-newsletters
Often impossible to  correct  personal  information  in databases Kowsoleea is een Nederlandse ondernemer van Surinaamse afkomst die ten onrechte bij veel overheids- instanties te boek stond als een  harddrugscrimineel . De reden hiervan was identiteitsfraude: een verslaafde aan  verdovende middelen gaf zich met regelmaat voor hem uit.  De overheid slaagde er niet in om de negatieve en  zeer belastende registraties op naam van meneer Kowsoleea op de juiste naam, namelijk die van de echte dader  te zetten .
Spam  is distributed by the use of   your own  email address
Service providers - even with  “good”  reputation - track your behavior  across websites  by use of  super cookies ...
... only to be removed by special browser add-ons like Better Privacy for Firefox
Privacy legislation is  too complex  and is   an obstacle  for business and innovation; projects with  insufficient privacy  are  rolled back.
Most organizations are not able to  protect confidential  data;  information  breaches  are  daily news
April 30, 2009 State officials  are notifying more than a half-million Virginians  that their Social Security numbers  may have been contained in a prescription drug database that was targeted by  a computer hacker April 30 .  The hacker gained access to the Prescription Monitoring Program computer system, which is designed to deter prescription drug abuse, and  demanded a $10 million ransom .  The hacker has not been identified Virginia patients warned about hacking of state drug Web site  http://hamptonroads.com/2009/06/officials-hacker-may-have-stolen-social-security-numbers
“ Almost  one in five businesses  in the UK has unwittingly breached the Data Protection Act meaning  illegal data transfer  to third party” according to research of the British Standards institute
Enforcement  of privacy  legislation  is practically  impossible
IN SHORT:  IT IS A MESS
We need fundamental change…
To summarize: we should reduce the   cost and effort  for…
…  user  enrollment and participation in a community, by improving  usability  and  transparency  about what is agreed   on
… users  to  cancel  a service  and give them  assurance  that they can….
… leave  without a trace  and  fear of stalking, r esulting in more  trust and openness
users  to correct their personal information, by offering  read/write access  on  their data
… service providers  to effectively engage  prospects and  increase # of registrations , by  rigorous standardization  of procedures
…  users  to receive relevant and effective service and information by  giving them control  to define their needs in a consistent way.
… service providers  to distribute targeted and effective information
… service providers  to comply to data protection legislation
… service providers  to design innovative personalized services by removing  privacy headaches  out of development projects
… service providers  to regain  trust  by their users by  embedding privacy   enhanced  technology
… providing transparency for  users  regarding service providers behavior by  easy to understand  standard notifications  PRIVACY HIGH   PRIVACY MEDIUM   PRIVACY LOW PRIVACY  ASSURED
… governments  to enforce data protection and privacy legislation by embedding  real-time auditability
All these improvements are necessary for  two-way trust  and  effective communication
We have to reduce the cost and effort for:  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],That is quite a lot…  Do you really think that it will sort itself out?  And leave it to some legislation & complying service providers?
[object Object],The struggle to solve the problems
The problems have been  predicted  by  writers, philosophers  but have been  actually addressed  since 1970 in the information technology domain.
Explosion of activities  to solve the problem…
…  of any scope, shape and form driven by  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Many at the table but the  main stakeholder:  the  citizen  is missing
And no surprise:  no consensus  yet
[object Object],Five main learned lessons
[object Object]
… which  is a critical success factor for any digital identity system to be built
…  ignoring  this lesson will result in  projects doomed to fail
[object Object]
… so compliance to legislation should be  embedded  in the technology  without   losing the   freedom  of the current  Internet practice
[object Object]
[object Object]
… service providers should adopt the  just-enough-data-to-do-the job   principle  and work with  partial identity
[object Object]
… and develop a practical and feasible approach  for  semantically interoperability  (shared profile)
[object Object],idplatform.eu solution directions
Introduce the concept Certified Open Identity Provider  which…
…  acts on behalf  of the individual
… is a  trusted custodian  of a  part  of individuals personal information
… can be compared to a  financial bank : protecting  personal information  instead of  money
…  is intermediary for  all  personal data transactions
… should also be able to assure  anonymity  of users
… should  provide personal information  to third parties only with  explicit consent  of the user
… should store the history of personal information transactions, only to show the user  who knows what about me
…  notify me when a service provider is  changing a privacy policy
… should - if desired - send legal request  to delete information  about me, as part of a service cancellation
Service providers  can outsource  a lot of  data protection  and  privacy compliance   headaches  to an Identity Provider
… and focus on their core services
Some rules and principles for identity providers
Everybody  is allowed to act as an Identity Provider…
… but there should be some rules…
… IDPs should be certified by an organization which is installed by government but  independent of it   (like the legal power)
Some criteria for certification…  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],That is quite a lot…  Do really think that it will sort itself out?  And leave it to some legislation & complying service providers?
Users can choose a Identity Provider they trust and should be able to switch/migrate data  to another Identity Provider  if they wish
Expectation: individuals will use 5-10 Identity Providers for special domains  like travel.id; volunteers.id; financial.id;  care.id, ngo.id, governement.id
Still a lot to remember but better than hundreds of passwords
Advantages  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Alice  stumbles upon an access controlled  site  schools4africa.com  which is member of  i2c.com  federation
Alice enters only  i2c.com  in a login field on the site  school4africa.com  and clicks   on the   let me in  button I2C.com  Let me in  Schools4africa is member of i2c learn more>>>
… .meaning: hey schools4africa.com,  you don’t know me yet,  but  let me in quickly   the guys at i2c.com  know some  information about me
School4africa.com notices some knocking on the door,  it is a stranger  which is  claiming  to be  member of  i2c.com
Schools4Africa.com  goes to  i2c.com   verify the identity of the stranger and requests do you know this person?
Two possibilities  A. Alice is  already logged on  at i2c.com B. Alice is  not yet logged on  at i2c.com
If Alice is not logged on at i2c.com,  12c.com just requests to log on in traditional way user name/password
I2C.com does knows Alice’s identifying personal information
Alice’s identifying information at I2C ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
By the way: Alice does trust I2C because they assure privacy  PRIVACY  ASSURED
I2C.com confirms to Schools4Africa:  we know the stranger knocking at your door, what do you want to know about this person?
Schools4africa to i2c.com: that is great, we need only information about the profession and nationality and  the right to contact  Alice.  Can you ask this on our behalf to Alice?
I2C.com to Alice:  For getting access to   Schools4Africa  this site would like to know the following information: Profession = “ school director ”  Nationality = “ Gambia ” and they would like also the  right to contact  you   Alice is that ok with you? … just click OK
I2C.Com to Alice  …and by the way  we don’t provide any further information  to schools4africa other than an  unique, dedicated reference number  only known  to you and schools4africa an us…
Assume this number to be an unique number representing your relationship with schools4africa; by the way  you don’t have to remember this number : i2c does this for you Your relation number at  school4Africa.com  is   http://i2c.com/re6tgw787w9hdh78wggfew555hh6hhh333656
Alice thinks that’s cool  fasttrack registration!  I like those smart guys at Schools4Africa now already.  Of course are they allowed to know my nationality and profession.
So Alice is ok with School4Africa’s requests and confirms with one-click Profession = Schoolteacher Nationality = Gambia  Right to contact = yes  OK Alice if you click ok,  this information is sent to schools4africa.com
Schools4Africa receives just partial information and redirects Alice to the special area about school projects in Gambia
In future sessions between  Schools4Africa and Alice, more information can be requested;  But future personal transactions will all be logged by i2c.com
Schools4Africa does not have Alice’s email address but they have the  right to contact…
… this means that schools4africa can only send messages via the identity provider:  [email_address]
Alice can cancel the account at Schools4Africa and request to delete every data stored about her at Schools4Africa
It is a pity for Schools4Africa but they can easily fulfill this delete request, because every piece of data is stored under the relation number.
School4Africa can’t contact Alice anymore the relation number is canceled, but if would illegally an email, they would get caught by I2C.com and receive a warning or a fine.  The message will not be forwarded to Alice.
[object Object]
Facebook connect a transparent user interface…
Showing the user what is happening
Vidoop smart password management
Only three categories to remember  Keys, Castles, Beverages Q  Y  P   Every day  a different password!
Confirmation of Vidoop registration
[object Object]
Establish an  really  independent organization to become the  Certified Open Identity Provider  as described
1 standard agreement instead of  36 approaches negotiations & contracts  2 1 3 5 6 4 IDP  independent  neutral  governance   
…  and assure interoperability
Sharing partial identity across service providers  2 1 3 5 6 4 IDP  independent  neutral  governance    Individual:  Yes  provider 2 and 3 sharing information  about me is fine
One interoperability example
Interoperability: User attribute verification  I2C.ID GAMBIA.GOV.ID CARE.ID  Schools4Africa re6tgw787 Nationality = Gambia  Federated Services providers I2C.ID has requested  us to confirm  your nationality for an unknown service provider   logged on gambia.gov.id Yes, confirm my nationality   I2C can you confirm  nationality of the individual with #  re6tgw787….  1 2 Gambia.Gov.id  can you confirm  nationality ? 3 4 5 6 Nationality = Gambia  Heath4Africa f45dlnqs9 logged on Government departments
Start simple and implement incremental improvements against a roadmap
[object Object]
An overview of inspiration, relationships and activities of the IdPlatform.eu  Initiative  IdPlatform.eu Developing awareness   Political parties  Public Governments Companies  Non-Profit Funding Gouvernement Commercial  Private Standards Protocols  Semantics  Interoperability  Security  Legal Obligations Enforcement  Liability  Portability Certification  Idcommons.org (mainly focused on developments in the usa) Development Open source Usability Accessibility Project:   European  Digital Identity   Innovation Virtual relation management Privacy enhancement  e-Democracy  includes activities :  inspired by  seeks collaboration with (?) Idealism  Human digital rights organizations  Knowledge Virtual communities  Universities Innovation institutes  Government programmes Standard organizations  Commercial innovation  inspired by: Knowledge management  Conferences wiki.idplatform.eu Workshops DevCamps  includes: Potential Identity Providers & Software vendors   can support  Potential Relying Service Providers invited to contribute
Prototype development  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Roadmap [draft]   Shared  Rules & terminology E-Citizen Rights  Shared approach Enrollment &  password management device independent  Shared  user attribute profile schema  approach Shared  rules & terminology  privacy policy &  privacy assurance Shared  Rules & terminology  identifiers  Select one of more  code sets as starting point  European Privacy Data Protection  Directives  7-Laws of Identity  XDI OpenID/OAuth  PRIME Privacy and  identity management for Europe  Collect usability and accessibility guidelines  Usability review Usability review Usability review Usability review Shared general  architecture & terminology  Shared approach  User Data Exchange Federation rules European Digital Identity month  location? Thursday  Nov 5  Identity debate  Weekend  Nov 6-8  Devcamp  Nov 9-21  Documentation Evaluation  Weekend 23-25  Devcamp  Aug Sept Oct 09 preparation phase
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Proposed prototype extensions  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020Christo W. Meyer
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill Komal Gadia
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS
A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONSA SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS
A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONSIJNSA Journal
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-worldMEDICI
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Robert Bromwich
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Adv Prashant Mali
 

Tendances (20)

Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS
A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONSA SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS
A SURVEY ON FEDERATED IDENTITY MANAGEMENT SYSTEMS LIMITATION AND SOLUTIONS
 
Ss
SsSs
Ss
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-world
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 

Similaire à How To Prevent The World Wild Web Identity Crisis

Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 
9626 chapter 5 e security
9626 chapter 5 e security9626 chapter 5 e security
9626 chapter 5 e securitySixth-form
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackSusan Kennedy
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics PaperGino McCarty
 

Similaire à How To Prevent The World Wild Web Identity Crisis (7)

Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
National Volunteering Forum: May18
National Volunteering Forum: May18National Volunteering Forum: May18
National Volunteering Forum: May18
 
9626 chapter 5 e security
9626 chapter 5 e security9626 chapter 5 e security
9626 chapter 5 e security
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics Paper
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

How To Prevent The World Wild Web Identity Crisis

  • 1. How to prevent the World Wild Web Identity Crisis By idplatform.eu a non-profit organization in the process of foundation Presented by Helmer Wieringa Contact details: [email_address]
  • 2.
  • 3.
  • 4. Privacy?!... I don’t care; I have nothing to hide…
  • 5. WANTED: YOUR IDENTITY BY Criminals Government Employers Business Relations Service Providers Family & Friends TO CONTROL YOU
  • 6. But first some definitions… Identity Personal information Privacy
  • 7. There are two sides of the identity coin…
  • 8. idem identity, meaning an identity based on an arrangement; the purpose is persistent identification Idem identity Individual
  • 9. ipse identity meaning the way you are identified and categorized by your self and others; the purpose is the construction of the self See summary of Future of Identity In the information Society FDIS The concept identity Ricoeur ; Beller ; Leerssen Ipse identity Individual
  • 10. What includes personal information ?
  • 11.
  • 12. Many definitions of privacy here follows just one…
  • 13. An individual's privacy is their ability to control the flow , boundary , and persistence of their personal information*) *) Privacy in the Clouds A. Cavoukian
  • 14. So, do you want still to be identified without knowing this and why and to be constructed by others?
  • 15. I still don’t care That’s fine but stop listening to or reading of this presentation
  • 16. We return now to the daily problems...
  • 17. Users hate to register for services and are frustrated by lengthy enquiries and often back off
  • 18. Users can’t remember user names and passwords
  • 19. … and have on average hundreds of those user/name password combinations
  • 20. Users are exposed to the risk of identity theft The number of US adult victims of identity fraud 8.4 million in 2007. Total one year fraud $49.3 billion in 2007 The mean fraud amount per fraud victim $5,720 in 2007.
  • 21. Users don’t read privacy policies and don’t trust service providers anyway…
  • 22. … and they are right… service providers change privacy policies without notification
  • 23. Individuals have no idea what others think to know about them and why
  • 24. It is often impossible to unsubscribe from e-newsletters
  • 25. Often impossible to correct personal information in databases Kowsoleea is een Nederlandse ondernemer van Surinaamse afkomst die ten onrechte bij veel overheids- instanties te boek stond als een harddrugscrimineel . De reden hiervan was identiteitsfraude: een verslaafde aan verdovende middelen gaf zich met regelmaat voor hem uit. De overheid slaagde er niet in om de negatieve en zeer belastende registraties op naam van meneer Kowsoleea op de juiste naam, namelijk die van de echte dader te zetten .
  • 26. Spam is distributed by the use of your own email address
  • 27. Service providers - even with “good” reputation - track your behavior across websites by use of super cookies ...
  • 28. ... only to be removed by special browser add-ons like Better Privacy for Firefox
  • 29. Privacy legislation is too complex and is an obstacle for business and innovation; projects with insufficient privacy are rolled back.
  • 30. Most organizations are not able to protect confidential data; information breaches are daily news
  • 31. April 30, 2009 State officials are notifying more than a half-million Virginians that their Social Security numbers may have been contained in a prescription drug database that was targeted by a computer hacker April 30 . The hacker gained access to the Prescription Monitoring Program computer system, which is designed to deter prescription drug abuse, and demanded a $10 million ransom . The hacker has not been identified Virginia patients warned about hacking of state drug Web site http://hamptonroads.com/2009/06/officials-hacker-may-have-stolen-social-security-numbers
  • 32. “ Almost one in five businesses in the UK has unwittingly breached the Data Protection Act meaning illegal data transfer to third party” according to research of the British Standards institute
  • 33. Enforcement of privacy legislation is practically impossible
  • 34. IN SHORT: IT IS A MESS
  • 35. We need fundamental change…
  • 36. To summarize: we should reduce the cost and effort for…
  • 37. … user enrollment and participation in a community, by improving usability and transparency about what is agreed on
  • 38. … users to cancel a service and give them assurance that they can….
  • 39. … leave without a trace and fear of stalking, r esulting in more trust and openness
  • 40. users to correct their personal information, by offering read/write access on their data
  • 41. … service providers to effectively engage prospects and increase # of registrations , by rigorous standardization of procedures
  • 42. … users to receive relevant and effective service and information by giving them control to define their needs in a consistent way.
  • 43. … service providers to distribute targeted and effective information
  • 44. … service providers to comply to data protection legislation
  • 45. … service providers to design innovative personalized services by removing privacy headaches out of development projects
  • 46. … service providers to regain trust by their users by embedding privacy enhanced technology
  • 47. … providing transparency for users regarding service providers behavior by easy to understand standard notifications PRIVACY HIGH PRIVACY MEDIUM PRIVACY LOW PRIVACY ASSURED
  • 48. … governments to enforce data protection and privacy legislation by embedding real-time auditability
  • 49. All these improvements are necessary for two-way trust and effective communication
  • 50.
  • 51.
  • 52. The problems have been predicted by writers, philosophers but have been actually addressed since 1970 in the information technology domain.
  • 53. Explosion of activities to solve the problem…
  • 54.
  • 55. And no surprise: no consensus yet
  • 56.
  • 57.
  • 58. … which is a critical success factor for any digital identity system to be built
  • 59. … ignoring this lesson will result in projects doomed to fail
  • 60.
  • 61. … so compliance to legislation should be embedded in the technology without losing the freedom of the current Internet practice
  • 62.
  • 63.
  • 64. … service providers should adopt the just-enough-data-to-do-the job principle and work with partial identity
  • 65.
  • 66. … and develop a practical and feasible approach for semantically interoperability (shared profile)
  • 67.
  • 68. Introduce the concept Certified Open Identity Provider which…
  • 69. … acts on behalf of the individual
  • 70. … is a trusted custodian of a part of individuals personal information
  • 71. … can be compared to a financial bank : protecting personal information instead of money
  • 72. … is intermediary for all personal data transactions
  • 73. … should also be able to assure anonymity of users
  • 74. … should provide personal information to third parties only with explicit consent of the user
  • 75. … should store the history of personal information transactions, only to show the user who knows what about me
  • 76. … notify me when a service provider is changing a privacy policy
  • 77. … should - if desired - send legal request to delete information about me, as part of a service cancellation
  • 78. Service providers can outsource a lot of data protection and privacy compliance headaches to an Identity Provider
  • 79. … and focus on their core services
  • 80. Some rules and principles for identity providers
  • 81. Everybody is allowed to act as an Identity Provider…
  • 82. … but there should be some rules…
  • 83. … IDPs should be certified by an organization which is installed by government but independent of it (like the legal power)
  • 84.
  • 85. Users can choose a Identity Provider they trust and should be able to switch/migrate data to another Identity Provider if they wish
  • 86. Expectation: individuals will use 5-10 Identity Providers for special domains like travel.id; volunteers.id; financial.id; care.id, ngo.id, governement.id
  • 87. Still a lot to remember but better than hundreds of passwords
  • 88.
  • 89.
  • 90. Alice stumbles upon an access controlled site schools4africa.com which is member of i2c.com federation
  • 91. Alice enters only i2c.com in a login field on the site school4africa.com and clicks on the let me in button I2C.com Let me in Schools4africa is member of i2c learn more>>>
  • 92. … .meaning: hey schools4africa.com, you don’t know me yet, but let me in quickly the guys at i2c.com know some information about me
  • 93. School4africa.com notices some knocking on the door, it is a stranger which is claiming to be member of i2c.com
  • 94. Schools4Africa.com goes to i2c.com verify the identity of the stranger and requests do you know this person?
  • 95. Two possibilities A. Alice is already logged on at i2c.com B. Alice is not yet logged on at i2c.com
  • 96. If Alice is not logged on at i2c.com, 12c.com just requests to log on in traditional way user name/password
  • 97. I2C.com does knows Alice’s identifying personal information
  • 98.
  • 99. By the way: Alice does trust I2C because they assure privacy PRIVACY ASSURED
  • 100. I2C.com confirms to Schools4Africa: we know the stranger knocking at your door, what do you want to know about this person?
  • 101. Schools4africa to i2c.com: that is great, we need only information about the profession and nationality and the right to contact Alice. Can you ask this on our behalf to Alice?
  • 102. I2C.com to Alice: For getting access to Schools4Africa this site would like to know the following information: Profession = “ school director ” Nationality = “ Gambia ” and they would like also the right to contact you Alice is that ok with you? … just click OK
  • 103. I2C.Com to Alice …and by the way we don’t provide any further information to schools4africa other than an unique, dedicated reference number only known to you and schools4africa an us…
  • 104. Assume this number to be an unique number representing your relationship with schools4africa; by the way you don’t have to remember this number : i2c does this for you Your relation number at school4Africa.com is http://i2c.com/re6tgw787w9hdh78wggfew555hh6hhh333656
  • 105. Alice thinks that’s cool fasttrack registration! I like those smart guys at Schools4Africa now already. Of course are they allowed to know my nationality and profession.
  • 106. So Alice is ok with School4Africa’s requests and confirms with one-click Profession = Schoolteacher Nationality = Gambia Right to contact = yes OK Alice if you click ok, this information is sent to schools4africa.com
  • 107. Schools4Africa receives just partial information and redirects Alice to the special area about school projects in Gambia
  • 108. In future sessions between Schools4Africa and Alice, more information can be requested; But future personal transactions will all be logged by i2c.com
  • 109. Schools4Africa does not have Alice’s email address but they have the right to contact…
  • 110. … this means that schools4africa can only send messages via the identity provider: [email_address]
  • 111. Alice can cancel the account at Schools4Africa and request to delete every data stored about her at Schools4Africa
  • 112. It is a pity for Schools4Africa but they can easily fulfill this delete request, because every piece of data is stored under the relation number.
  • 113. School4Africa can’t contact Alice anymore the relation number is canceled, but if would illegally an email, they would get caught by I2C.com and receive a warning or a fine. The message will not be forwarded to Alice.
  • 114.
  • 115. Facebook connect a transparent user interface…
  • 116. Showing the user what is happening
  • 117. Vidoop smart password management
  • 118. Only three categories to remember Keys, Castles, Beverages Q Y P Every day a different password!
  • 119. Confirmation of Vidoop registration
  • 120.
  • 121. Establish an really independent organization to become the Certified Open Identity Provider as described
  • 122. 1 standard agreement instead of 36 approaches negotiations & contracts 2 1 3 5 6 4 IDP independent neutral governance 
  • 123. … and assure interoperability
  • 124. Sharing partial identity across service providers 2 1 3 5 6 4 IDP independent neutral governance  Individual: Yes provider 2 and 3 sharing information about me is fine
  • 126. Interoperability: User attribute verification I2C.ID GAMBIA.GOV.ID CARE.ID Schools4Africa re6tgw787 Nationality = Gambia Federated Services providers I2C.ID has requested us to confirm your nationality for an unknown service provider logged on gambia.gov.id Yes, confirm my nationality I2C can you confirm nationality of the individual with # re6tgw787…. 1 2 Gambia.Gov.id can you confirm nationality ? 3 4 5 6 Nationality = Gambia Heath4Africa f45dlnqs9 logged on Government departments
  • 127. Start simple and implement incremental improvements against a roadmap
  • 128.
  • 129. An overview of inspiration, relationships and activities of the IdPlatform.eu Initiative IdPlatform.eu Developing awareness Political parties Public Governments Companies Non-Profit Funding Gouvernement Commercial Private Standards Protocols Semantics Interoperability Security Legal Obligations Enforcement Liability Portability Certification Idcommons.org (mainly focused on developments in the usa) Development Open source Usability Accessibility Project: European Digital Identity Innovation Virtual relation management Privacy enhancement e-Democracy includes activities : inspired by seeks collaboration with (?) Idealism Human digital rights organizations Knowledge Virtual communities Universities Innovation institutes Government programmes Standard organizations Commercial innovation inspired by: Knowledge management Conferences wiki.idplatform.eu Workshops DevCamps includes: Potential Identity Providers & Software vendors can support Potential Relying Service Providers invited to contribute
  • 130.
  • 131. Roadmap [draft] Shared Rules & terminology E-Citizen Rights Shared approach Enrollment & password management device independent Shared user attribute profile schema approach Shared rules & terminology privacy policy & privacy assurance Shared Rules & terminology identifiers Select one of more code sets as starting point European Privacy Data Protection Directives 7-Laws of Identity XDI OpenID/OAuth PRIME Privacy and identity management for Europe Collect usability and accessibility guidelines Usability review Usability review Usability review Usability review Shared general architecture & terminology Shared approach User Data Exchange Federation rules European Digital Identity month location? Thursday Nov 5 Identity debate Weekend Nov 6-8 Devcamp Nov 9-21 Documentation Evaluation Weekend 23-25 Devcamp Aug Sept Oct 09 preparation phase
  • 132.
  • 133.

Notes de l'éditeur

  1. Goedendag, mijn naam is Helmer Wieringa en ik vertegenwoordig een stichting in oprichting met de naam idcomons europa. Doel en functie van die stichting zal hopelijk in de loop van de presentatie duidelijk worden. We hebben geen tijd te verliezen want er dreigt een wereld wijde identitetscrisis. Daar wordt overal ter wereld aangewerkt idcommons wil een bescheiden steentje bijdragen. De presentatietekst is in het Engels, maar ik doe mijn toelichting naar k euze in het Engels of Nederlands.
  2. Hoe zit de presentatie in elkaar? Eerst een overzicht van problemen daarna wat we hebben geleerd tot nu toe. De oplossingsrichting die Idcommons voorstaat. Hoe idcommons wil helpen een deel van de oplossing te realiseren. En aanbevelingen voor Internationale Samenwerkling 2.0
  3. Maaer eerst even een aantal definities van een aantal begrippen
  4. Wat is persoonlijke informatie?
  5. Deze informatie word op dit moment over u verzameld. Samengesteld uit lijstjes en standaards die ik vond op internet. Een van reviewers van de presentatie stelde de term emotional toe te voegen. Terecht: een voorbeeld: Google wil in de nabije toekomst gaan proberen om je stemming te af te leiden vanuit het bewegingspatroon van je mobile telefoon.
  6. Er zijn vele definitie van privacy in omloop. Hier is er een : privacy is vermogen van een indivdu om het wegstromen van, de grenzen van gebruik en bewaartermijn van persoonlijke informatie te kunnen controleren
  7. Gebruikers balen van registrerer en de eindeloze lijsten met vragen die daarmee gepaard gaan en haken daarom vaak af.
  8. Onthouden van gebruikersnamen en wachtwoorden is een probleem
  9. Gemiddeld wel 100 gebruikersnamen en wachtwoorden.
  10. Identiteits diefstal: De omzet die in dit marktsegment is in de USA alleen al ….
  11. Privacy statements bestaan uit lange en meeste burgers onverterbare juridische teksten. Men weinig vetrouwen in dienstverleners op het web.
  12. En men heeft gelijk wat te denken dat dienstverleners zonder dit duidelijk aan te kondigen privacy policies veranderen. Bijvoorbeeld het sociale netwerk Hyves dat dit jaar zonder dit duidelijk mede te delen echte namen van Hyves leden laat indexeren door Google.
  13. De burger heeft zo-wie-zo geen idee wat anderen weten over hem en waarom. Informatie over burger staan opgeslagen in 300 verschillende bestanden bij de Nederlandse overheid Waarom zoveel, is die informatie correct? Electronisch kinddossier kan meer dan 2500 gegevens opslaan per kind, een foutje is snel gemaakt en ouders en kind hebben geen inzage.
  14. Probeer maar eens af te komen van een email nieuwsbrief…
  15. Het is vaak ondoenlijk om informatie gecorrigeerd te krijgen, voorbeeld bureau kredietregistratie en de 13 jaar van terrorisma verdachte nnnn….nnnnn die uiteindelijk failiet is gegaan en nu in een complexe rechtszaak is verwikkeld met de Nederlandse staat.
  16. Ik krijg regelmatig spam met mijzelf als afzender
  17. Yahoo.com,Linkedin.com; Salesforce.com; Google.com; Youtube.com Tripadvisor.com en nog veel meer
  18. Ok je kunt die supercookies wel verwiideren, maar je moet daarvoor eerst een speciale add-on laden die alleem maar voor firefox. Leg dat maar eens uit aan je ouders of kinderen.
  19. Privacy wetgeving is vrij complex; het onderwerp staat op vaak de agenda, de vrees de wet te overtreden vormt een blokkade voor innovatiie. Aktiegroepen zijn succesvol om projecten te laten stoppen. De slimme meter is een (al gemoemd) voorbeeld.
  20. Berichten van data opstraat zijn aan de orde van de dag. State officials are notifying more than a half-million Virginians that their Social Security numbers may have been contained in a prescription drug database that was targeted by a computer hacker April 30. The hacker gained access to the Prescription Monitoring Program computer system, which is designed to deter prescription drug abuse, and demanded a $10 million ransom. The hacker has not been identified. A criminal investigation has not yet determined what, if any, personal information was put at risk in the incident, said Sandra Whitley Ryals, director of the Virginia Department of Health Professions, on Wednesday. Nevertheless, the state is mailing individual notifications to 530,000 people whose prescription records may have contained Social Security numbers, in order to alert them to the potential for identity theft, Ryals said. In addition, 1,400 registered users of the database, mostly doctors and pharmacists, who may have provided Social Security numbers when they registered for the program are being notified. The database contains records of more than 35 million prescriptions dispensed since 2006 for certain federally controlled drugs with a high potential for abuse, such as OxyContin, Vicodin and Xanax. The records include patients' name, address and date of birth, the name and quantity of the drug prescribed, and identifying numbers for the doctor and pharmacist. Each record also includes an optional field for an identifying patient number. All patients identified by a nine-digit number, which could be a Social Security number, are receiving the mailed notifications, said Kathy Siddall, a department spokeswoman. The mailing advises patients to check their bank statements and credit reports for signs of identity theft and report any suspicious activity to their local police department. The prescription database was shut down in the wake of the hacker attack.
  21. Handhaven van de wet is praktische gesproken nauwelijks haalbaar.
  22. Er is dus nogal veel mis.
  23. Hoe moeten de problemen aanpakken? we moeten de kosten en moeite van een aantal aspecten verlagen…
  24. Maak het gebruikersvriendelijker voor gebruikers voor een dienst te registreren
  25. Maak het veel gemakkelijker voor gebruikers om een dienst stop te zetten, en zorg dat de dienstverlener no-trace no-spamgarantie kan afgeven hetgeen uiteidelijk leidt tot meer openheid. Voorbeeld als je staat voor de beslissing om een auto te kopen, wil je wel gespamed worden, is de auto aangeschaft dan niet meer.
  26. Maak het makkelijker om data te corrigeren, geef toegang tot alle verzamelde gegevens
  27. Maak veel gemakkelijker om registratieprocedures te implementeren door vergaande standaardisatie van registratie scenarios.
  28. Verlaag de drempel voor gebruikers om kenbaar te maken wat men wil op consistente manier.
  29. Maak het gemakkelijker voor dienstverleners om doelgerichte informatie te versturen.
  30. Maak het gemakkelijker voor dienstverleners om zich te houden aan de wet
  31. Verwijder privacykopzorg uit projecten waardoor een baaierd aan innovatieve diensten mogelijk wordt
  32. maak het gemakkelijker om standaarrd privacy beschermende technology te implementeren waardoor het vetrouwen bij de consument kan worden terug gewonnen.
  33. Ontwikkel standaard berichten waardoor duidelijkheid wordt geschapen voor gebruikers
  34. Maak het gemakkelijker voor de overheid om de wet te handhaven
  35. Resulterend in een wederzijds vertrouwen en effectieve communicatie tussen gebruikers en dienstverleners
  36. Even een samenvatting van aspecten
  37. Een kort overzicht van de partijen die met het probleem worstelen.
  38. Kafka, Georg Orwell Aldous Huxley om er maar een paar te noemen… In 1970 is er een advocaat in Australie [naam?] die het privacy en data protectie probleem aansnijdt. Informatie technologie is intrinsiek archiverend daar zit o.a. het probleem.
  39. Er zij veel partijen die de problemen proberen op te lossen.
  40. Een paar voorbeelden
  41. Het zal u niet verassen , dat er nog geen consensus is bereikt…
  42. Maar we hebben wel een aantal zaken geleerd sinds 2000
  43. Een zeer belangrijk principe is dat de gebruiker zelfbeschikkingsrecht over in persoonlijke informatie wordt gegegeven.
  44. Dit is een kritische succesfaktor voor identity management systemen
  45. En als een partij dat probeert zal die partij falen.
  46. In het onderhavige domein kunnen we niet volstaan met vage zelf regulerende maatregelen. Klinkt dit u bekend in de oren? We hadden te weinig aandacht voor financiele transacties, hoe zit het dan met transacties met uw persoonlijke gegevens?
  47. Technologie om je te helpen aan de wet te houden moet worden ingebouwd… zonder dat we de vrijheid van Internet gaan beperken
  48. Informationele machtpositie van een of een beperkt aantal partijen wordt domweg niet geaccepteerd,
  49. In het electronisch kind dossier EKD kunnen meer dan 2500 gegevens per kind worden opgeslagen.
  50. Niet wanhopen de oplossing is relatief eenvoudig….