The Top 10 Hot Identity Topics: A Smart Card Alliance Identity Council White Paper

An in-depth report on issues affecting identity management and protection


Putting the Individual at the Center of the Identity System

Because it is important for individuals to maintain control over their private identity information, it is necessary to understand where the individual fits in the general identity system structure. There are generally three parties to an identity system:

  1. Identity system providers: Entities that proof information, enroll individuals, and issue identity credentials. For example, governments provide identities to citizens through passports or visas.

  2. Identity system members: The people who must use identity information to obtain privileges. For example, an individual uses the ID badge issued by an employer to enter a secure facility.

  3. Identity system users: Organizations that rely on identities and credentials (banks, law enforcement, retailers). For example, an employer uses a person’s driver’s license or passport as proof of identity for a job application. 

As we can see, the individual is indeed at the center of the identity system – or maybe more aptly put – stuck in the middle. With identity system providers responsible for collecting, verifying, and storing identity information, and identity system users clamoring to get access to this data, it’s no wonder that individuals get nervous about their identity information. So what to do?  Well, some of the main concerns that we all have regarding identity systems can be addressed by incorporating robust and auditable policies, practices and processes into our identity systems. The following are some guidelines to use when creating an identity system:

·         Consent.  Establish identity systems that enforce a policy of consent when transferring identity information. Identity systems should only reveal information identifying a person with the person’s consent. The information should be limited to the information that is necessary to complete the transaction.

·         Transparency. An individual should be able to “see” how identity information is being used. Although individuals may not be authorized to modify transaction information, both they and the entity they are interacting with are best served if the information is visible to them. Visible information creates a higher level of trust between the individual and the entity and also creates a feedback security loop to help individuals police the use of their identity information. (For example, credit card companies allow their customers to access a list of monthly transactions. Fraudulent credit card transactions are often reported by the customer.)

·         Privacy and security.  Incorporate privacy and security features as fundamental and pervasive elements of the identity system.

·         Interoperability. Make the identity system interoperable, so that the individual can use the identity information broadly.

·         Biometrics. Use biometrics as an integral part of the identity system, so that a person is physically associated with the identity information and the identity credential.

·         Ease of use. Adopt ease of use as a primary design principle. The user experience should be simple and consistent. Automating transactions to reduce time and complexity is an important consideration.

Identity Topic #4: Is Technology a Threat to an Individual’s Identity?

Introduction

When our governments consider the hazards and benefits of society’s adoption of a new technology protecting our identities, legislating against its use instead of making illegal its misuse will inevitably “throw the baby out with the bath water,” depriving society of the technology’s benefits.