All user-centric models of the personal data landscape start with people. They make data as they move through the world. They have shared and personal devices that hold, capture, or help create data. They play multiple roles that affect how they choose to share that data an d present themselves. Those roles, and the contexts we experience at work, at home, and in relation to our goals and other people and institutions, inform what we expect from our personal clouds. Our personal clouds store our information, put it to use, and share it with other services. One type of service is called Personal Data Analysis, providing insights into your behavior, financial health, physical wellbeing, or your relationships using your data.
Personal clouds are also how we share our data and use our personas with organizations we know and trust. You’ll want your personal cloud services to be smart about understanding the way each organizations understands personal data and act accordingly. Same for policies and terms of service an organization commits to related to your data.
It may me useful to share personal data, like your shopping history with market researchers or your driving patterns with a highway traffic analyst. You could partner with a trusted “individual business agent” service. Your agent can negotiate for you with buyers of aggregated personal data, assuring fair terms and your minimum assurances. A market research firm might pay for your anonymous shopping data. Or you might feel civic minded and freely share your transit data.
Data aggregation services take data from many people and offer clean, fresh, normalized sets in data markets. Data vertical services specialize in areas like health records or home ownership paperwork, or professional credentials. Again, your personal cloud is your first point of control and interaction.
Infomediary: A service trusted to have insight into a person’s data and working on their behalf. They have an individual’s personally identifiable information (PII) and protect that data and put it to use. Data Aggregation Services: Services create aggregate data sets from personal data, like music listening habits. Aggregators may compensate people for their data, people may share altruistically, or people may unknowingly share. Vendor Relationship Management: a consumer who bought a product from a producer manages an open channel with the maker of the product they bought and willingly shares information under favorable terms they the user set.
Framework Creators: Organizations that create contractual legal-policy/technology frameworks that govern complex multi-party networks. Individual: A person Devices: Mobile phones, computers, self tracking devices, medical monitoring devices, e- readers. Context: Where a person is (home, school, work). The Role they are playing (parent, coach, spouse, employee, supervisor, athletic team member). Persona they are presenting (video game player, professional, goofy hobby identity). Data: The bits generated explicitly such as photos, tweets, status updates. Frameworks: Contractual mutli-party frameworks connect legal/policy agreements to technical interoperability to protect the individual and enable markets. The Personal Cloud service provider is at the heart of these frameworks, chosen by the end user, and works on their behalf managing their data and its participation in the framework. Personal Data Analytics: Services that help people gain insight into their own personal data. An example being one’s daily health status or a personal annual report. [Trusted Organizations] Product Producer: This is an example of a Vendor Relationship Management connection where a consumer who bought a product from a producer manages an open channel with the maker of the product they bought and willingly share information under favorable terms they the individual set. Infomediary: A service trusted to have insight into a person’s data and working on their behalf. They have an individual’s personally identifiable information (PII), protect that data and put it to use. Data Aggregation Services: Services create aggregate data sets from personal data, like music listening habits. Aggregators may compensate people for their data, people may share altruistically, or people may unknowingly share. Public Services: Governments delivering services to their constituents can enable use of personal data stores for better access and data quality. [The Market] Market Place: This is where an Individual’s business agents with PII meet Vendor agents without PII. Retailers: Companies that sell goods to customers. Service Providers: Companies that provide services to people. Vendor Agents: Companies that help retailers and service providers find good potential leads. They do not have personally identifiable information.
[Governance] How systems are regulated take many forms. Governance starts with laws and regulation but also includes cultural practices, business norms, and, in digital systems, how identifiers are allocated and the code that connects them. CODE: Computer code and how it runs determines what is possible in computer systems. The phrase “Code is Law” was popularized by Lawrence Lessig. Standards Development Organizations: Bruce Sterling said “If code is law then standards are like the Senate.” Standards bodies agree on how code works regardless of the particular language it is written in or system it is running on. For example, the W3C standardizes the HTML specification for presenting web pages.
LEGAL: Government: plays many roles in the systems: Regulator: Governments set baseline rules for how markets work. They provide the court system where contract law is adjudicated. Public Records: Governments record births, marriages, divorces, deaths along with licensing, and property title registries. Public Safety: Policing and law enforcement. Ombudsman: Many states have a data protection commissioner who protects constituents. International Treaty Organizations: They support the coordination of international treaties and provide a meta-international law that hold governments accountable to each other.
IDENTIFIER: Networks run on identifiers for each endpoint. How these are allocated, and the terms and conditions of use in a network, govern the network. Global Identifier Registries: Examples include the phone system, Domain Names, ISBN numbers, RFID. Private Name Spaces: examples include Twitter, Skype, Google, Facebook etc.
PEER: This kind of governance is the most powerful in many ways and helps social systems operate. Peer-to-Peer: People have opinions about each other and also about businesses and services they interact with - like Yelp for small businesses. Professional: Doctors, lawyers, engineers, geologists, and architects are professions that peer regulate. Institutional: Institutions figure out what other peer institutions are - such as banks worldwide in SWIFT.
PurposeThe purpose of Identity Commons is to support,facilitate, and promote the creation of an openidentity layer for the Internet, one that maximizescontrol, convenience, and privacy for the individualwhile encouraging the development of healthy,interoperable communities.PrinciplesSelf-Organization. Enable any working group to self-organize at any time, on any scale, in anyform, around any activity consistent with the Purpose and Principles.Transparency. Fully and transparently disclose the Purpose and Principles of each workinggroup, any requirement of participation, and any license or restriction of usage of its work product.Inclusion. Conduct deliberations and make decisions by bodies and methods that reasonablyrepresent all relevant and affected parties.Empowerment. Vest authority, perform functions, and use resources in the smallest or mostlocal part that includes all relevant and affected parties.Collaboration. Resolve conflict without resort to economic, legal, or other duress.Openness. Conduct, publish, and archive communications in a manner that facilitates open andtrusted interactions within and across all working groups and the public Internet.
?AnonymousVerified Verified Documentation In PersonVerificationBiometricCapture
?AnonymousOne Site Multi-SiteSelf-Asserted VerifiedSociallyValidatedPseudonymous
Identity is social.Identity is subjective.Identity is valuable.Identity is referential.Identity is composite.Identity is consequential.Identity is dynamic.Identity is contextual.Identity is equivocal.OECD Paper At a Crossroads: "Personhood” and the Digital Identity in the Information SocietyProperties of Identity
Internet Identity Workshop#17 is October 22-24 in Mountain View California
Bonus Slides on Market Modelsfor Personal Cloudshttp://hepowerofpull.com/pull/the-persoA good place to start is watching this video byDavid Seigel who paints a visionof a personinteracting with the data in their personal datastore/personal cloud