Trust in the Digital World 2014 - eIdentity thread
Upcoming SlideShare
Loading in...5
×
 

Trust in the Digital World 2014 - eIdentity thread

on

  • 654 views

Early initiatives pointed to a central role of government itself in the control and provision of public and private digital identities. Some governments choose to seize identity, others to radically ...

Early initiatives pointed to a central role of government itself in the control and provision of public and private digital identities. Some governments choose to seize identity, others to radically defer it to the market, while any scenario has to deal with the citizen's own demand for control, usability and interoperability within Europe.

These slides are from my own commercial SME perspective at the session.

Statistics

Views

Total Views
654
Views on SlideShare
238
Embed Views
416

Actions

Likes
0
Downloads
2
Comments
0

5 Embeds 416

http://www.scoop.it 359
http://dev.jamesvarga.com 41
http://www.jamesvarga.com 12
http://jamesvarga.com 3
http://translate.googleusercontent.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Trust in the Digital World 2014 - eIdentity thread Trust in the Digital World 2014 - eIdentity thread Presentation Transcript

  • THE ONLY WAY TO PROVE YOU ARE WHO YOU SAY YOU ARE PURELY ONLINE eIdentity a commercial perspective Trust in the Digital World by James Varga
  • “Digital identity is the data that uniquely describes a person or a thing and contains information about the subject's relationships.” DIGITAL IDENTITIES aka electronic identity, etc
  • THREE MAIN COMPONENTS Primary SecondaryIDENTITY VERIFICATION + PERSONAL DATA + AUTHENTICATION
  • THREE MAIN COMPONENTS Primary Secondary Verified Self Asserted IDENTITY VERIFICATION + PERSONAL DATA + AUTHENTICATION
  • THREE MAIN COMPONENTS Primary Secondary Verified Self Asserted IDENTITY VERIFICATION + PERSONAL DATA + AUTHENTICATION
  • Retail Banking Consumer Finance Healthcare Pre-Employment Screening Gaming / Gambling, Dating, Social Networking, High Value Commerce, Sharing Economy, etc… INDUSTRY REQUIREMENTS variations in industry, sector, geography, products
  • CONTEXT what you need depends on what your doing
  • CREATING TRUST low trust low value HIGH TRUST HIGH VALUE 1.Convenience 2.Control 3.Security
  • “DATA 2.0 SHIFT” * Alan Mitchell – CTRL-Shift
  • PERSONAL DATA MANAGEMENT * Alan Mitchell – CTRL-Shift
  • Consumer empowerment Accepting sites / businesses Trustmarks Trust Frameworks Catalysts ID Assurance (UK); NSTIC (US); TDL Sprints (EU); Assure UK (UK) ECOSYSTEM COMPONENTS
  • ID ASSURANCE (UK)
  • To find out more visit: www.miiCard.com e: info@miiCard.com Twittter.com/miiCard Facebook.com/miicard Linkedin.com/company/miicard Creating Trust Online Thank you