10. Purpose
The purpose of Identity Commons is to support,
facilitate, and promote the creation of an open
identity layer for the Internet, one that maximizes
control, convenience, and privacy for the individual
while encouraging the development of healthy,
interoperable communities.
Principles
Self-Organization. Enable any working group to self-organize at any time, on any scale, in any
form, around any activity consistent with the Purpose and Principles.
Transparency. Fully and transparently disclose the Purpose and Principles of each working
group, any requirement of participation, and any license or restriction of usage of its work product.
Inclusion. Conduct deliberations and make decisions by bodies and methods that reasonably
represent all relevant and affected parties.
Empowerment. Vest authority, perform functions, and use resources in the smallest or most
local part that includes all relevant and affected parties.
Collaboration. Resolve conflict without resort to economic, legal, or other duress.
Openness. Conduct, publish, and archive communications in a manner that facilitates open and
trusted interactions within and across all working groups and the public Internet.
18. Identity is social.
Identity is subjective.
Identity is valuable.
Identity is referential.
Identity is composite.
Identity is consequential.
Identity is dynamic.
Identity is contextual.
Identity is equivocal.
OECD Paper At a Crossroads: "Personhood” and the Digital Identity in the Information Society
Properties of Identity
31. I created this mind map of Personal Data Sources and it is in the 2011 WEF report.
It is based on the list in the 2010 WEF drawn from the summer 2010 pre-read document that I contributed to.
36. Directly Linked to
an Individual
Identity
Linkable to
Identity through
combination
Individual
attributes without
link to Identity
Not linked to
Individuals
Identity
Volunteered Observed Inferred
Nature/Source of Data
LinkagetoIndividual
37. Directly Linked to
an Individual
Identity
Linkable to
Identity through
combination
Individual
attributes without
link to Identity
Not linked to
Individuals
Identity
Volunteered Observed Inferred
Nature/Source of Data
LinkagetoIndividual
67. Bonus Slides on Market Models
for Personal Clouds
http://hepowerofpull.com/pull/the-perso
A good place to start is watching this video by
David Seigel who paints a visionof a person
interacting with the data in their personal data
store/personal cloud
78. Lessig’s model of forces articulated in Code & Code 2.0
that shape the world/reality/society we construct.
Editor's Notes
All user-centric models of the personal data landscape start with people. They make data as they move through the world. They have shared and personal devices that hold, capture, or help create data. They play multiple roles that affect how they choose to share that data an d present themselves. Those roles, and the contexts we experience at work, at home, and in relation to our goals and other people and institutions, inform what we expect from our personal clouds. Our personal clouds store our information, put it to use, and share it with other services. One type of service is called Personal Data Analysis, providing insights into your behavior, financial health, physical wellbeing, or your relationships using your data.
Personal clouds are also how we share our data and use our personas with organizations we know and trust. You’ll want your personal cloud services to be smart about understanding the way each organizations understands personal data and act accordingly. Same for policies and terms of service an organization commits to related to your data.
It may me useful to share personal data, like your shopping history with market researchers or your driving patterns with a highway traffic analyst. You could partner with a trusted “individual business agent” service. Your agent can negotiate for you with buyers of aggregated personal data, assuring fair terms and your minimum assurances. A market research firm might pay for your anonymous shopping data. Or you might feel civic minded and freely share your transit data.
Data aggregation services take data from many people and offer clean, fresh, normalized sets in data markets. Data vertical services specialize in areas like health records or home ownership paperwork, or professional credentials. Again, your personal cloud is your first point of control and interaction.
Infomediary: A service trusted to have insight into a person’s data and working on their behalf. They have an individual’s personally identifiable information (PII) and protect that data and put it to use. Data Aggregation Services: Services create aggregate data sets from personal data, like music listening habits. Aggregators may compensate people for their data, people may share altruistically, or people may unknowingly share. Vendor Relationship Management: a consumer who bought a product from a producer manages an open channel with the maker of the product they bought and willingly shares information under favorable terms they the user set.
Framework Creators: Organizations that create contractual legal-policy/technology frameworks that govern complex multi-party networks. Individual: A person Devices: Mobile phones, computers, self tracking devices, medical monitoring devices, e- readers. Context: Where a person is (home, school, work). The Role they are playing (parent, coach, spouse, employee, supervisor, athletic team member). Persona they are presenting (video game player, professional, goofy hobby identity). Data: The bits generated explicitly such as photos, tweets, status updates. Frameworks: Contractual mutli-party frameworks connect legal/policy agreements to technical interoperability to protect the individual and enable markets. The Personal Cloud service provider is at the heart of these frameworks, chosen by the end user, and works on their behalf managing their data and its participation in the framework. Personal Data Analytics: Services that help people gain insight into their own personal data. An example being one’s daily health status or a personal annual report. [Trusted Organizations] Product Producer: This is an example of a Vendor Relationship Management connection where a consumer who bought a product from a producer manages an open channel with the maker of the product they bought and willingly share information under favorable terms they the individual set. Infomediary: A service trusted to have insight into a person’s data and working on their behalf. They have an individual’s personally identifiable information (PII), protect that data and put it to use. Data Aggregation Services: Services create aggregate data sets from personal data, like music listening habits. Aggregators may compensate people for their data, people may share altruistically, or people may unknowingly share. Public Services: Governments delivering services to their constituents can enable use of personal data stores for better access and data quality. [The Market] Market Place: This is where an Individual’s business agents with PII meet Vendor agents without PII. Retailers: Companies that sell goods to customers. Service Providers: Companies that provide services to people. Vendor Agents: Companies that help retailers and service providers find good potential leads. They do not have personally identifiable information.
[Governance] How systems are regulated take many forms. Governance starts with laws and regulation but also includes cultural practices, business norms, and, in digital systems, how identifiers are allocated and the code that connects them. CODE: Computer code and how it runs determines what is possible in computer systems. The phrase “Code is Law” was popularized by Lawrence Lessig. Standards Development Organizations: Bruce Sterling said “If code is law then standards are like the Senate.” Standards bodies agree on how code works regardless of the particular language it is written in or system it is running on. For example, the W3C standardizes the HTML specification for presenting web pages.
LEGAL: Government: plays many roles in the systems: Regulator: Governments set baseline rules for how markets work. They provide the court system where contract law is adjudicated. Public Records: Governments record births, marriages, divorces, deaths along with licensing, and property title registries. Public Safety: Policing and law enforcement. Ombudsman: Many states have a data protection commissioner who protects constituents. International Treaty Organizations: They support the coordination of international treaties and provide a meta-international law that hold governments accountable to each other.
IDENTIFIER: Networks run on identifiers for each endpoint. How these are allocated, and the terms and conditions of use in a network, govern the network. Global Identifier Registries: Examples include the phone system, Domain Names, ISBN numbers, RFID. Private Name Spaces: examples include Twitter, Skype, Google, Facebook etc.
PEER: This kind of governance is the most powerful in many ways and helps social systems operate. Peer-to-Peer: People have opinions about each other and also about businesses and services they interact with - like Yelp for small businesses. Professional: Doctors, lawyers, engineers, geologists, and architects are professions that peer regulate. Institutional: Institutions figure out what other peer institutions are - such as banks worldwide in SWIFT.