SlideShare a Scribd company logo
1 of 11
UNCITRAL United Nations Commission on International Trade Law
UNCITRAL draft model law
on IdM and trust services
Luca Castellani
UNCITRAL Secretariat
The views expressed are those of the author and do
not necessarily reflect the views of the United Nations
and of UNCITRAL
UNCITRAL United Nations Commission on International Trade Law
The draft UNCITRAL Model Law on IdM and Trust Services
UNCITRAL WG IV has prepared a model law on the use and cross-
border recognition of IdM and trust services
• Project started in 2017 at the request of certain EU member
States and with a broad scope:
– build on shared principles and terminology to provide a uniform
legal treatment for:
• private and public IdM systems and schemes
• a broad range of trust services
• Respects general principles of commercial and e-commerce law
• Takes into consideration prior UNCITRAL provisions and eIDAS
regulation
UNCITRAL United Nations Commission on International Trade Law
The draft UNCITRAL Model Law on IdM and Trust Services
• All preparatory documents available on UNCITRAL website in all
UN official languages
• Draft provisions and explanatory note are submitted to the
Commission for consideration and possible adoption in July 2022
• Latest version available in document A/CN.9/1112 - Draft Model
Law on the Use and Cross-border Recognition of Identity
Management and Trust Services
UNCITRAL United Nations Commission on International Trade Law
The draft Model Law: scope and general principles
• Focuses on use in commercial activities and trade-related
services
• Does not introduce new requirements to identify or to use a
particular IdM or trust service
• Use of IdM and trust services is voluntary
• Does not affect any other rule of law, including compliance
with regulatory requirements and with data privacy and
protection law
UNCITRAL United Nations Commission on International Trade Law
The draft Model Law: IdM
• Identity is a set of attributes that uniquely distinguishes a
person in a particular context
• IdM systems manage both identity proofing and electronic
identification (a.k.a. “authentication”)
– Identity proofing is “the process of collecting, verifying,
and validating sufficient attributes to define and confirm
the identity of a person within a particular context”
– Electronic identification is “a process used to achieve
sufficient assurance in the binding between a person and
an identity”
– An identity is “a set of attributes that allows a person to
be uniquely distinguished within a particular context”
– A person is a physical or legal person
• Provision on non-discrimination of the result of electronic
identification
UNCITRAL United Nations Commission on International Trade Law
The draft Model Law: IdM
• The method used for electronic identification must be reliable
• Two-tier approach to determine reliability:
– Ex post (after use):
• Open-ended list of relevant circumstances
– Ex ante (before use)
• Possibility of designating reliable IdM systems /
services
UNCITRAL United Nations Commission on International Trade Law
The draft Model Law: IdM
• List of obligations of IdM service providers covering the IdM
lifecycle
• List of obligations of IdM service providers in case of data
breach
• Rules on liability of IdM service providers
– Breach of obligations set in the model law gives rise to
liability
– All other sources of liability remain applicable, but
limitation may be possible
UNCITRAL United Nations Commission on International Trade Law
The draft Model Law: trust services
• A trust service is an electronic service that provides
assurance of certain qualities of a data message
– who, what, when, where, and why of data
– Includes the methods for creating and managing
electronic signatures, electronic seals, electronic time
stamps, website authentication, electronic archiving and
electronic registered delivery services (same as eIDAS)
– List of trust services is open-ended
• Rule on non-discrimination against use of trust services
UNCITRAL United Nations Commission on International Trade Law
The draft Model Law: trust services
• Each trust service (except website authentication) has a
dedicated provision drafted as a functional equivalence rule
referring to the paper-based function
• Same “two tier” approach as for IdM
– ex ante designation + ex post assessment
• List of obligations of trust service providers
• Liability of trust service providers
UNCITRAL United Nations Commission on International Trade Law
The draft Model Law: cross-border aspects
• Geographic-neutral rules on the assessment of reliability of
the method used and on the designation of reliable systems
and services
– Apply to both IdM and trust services
• Dedicated provisions on cross-border recognition and on
international cooperation
– Does not foresee, but is compatible with the
establishment of a centrally-managed mutual recognition
mechanism
• The model law may be used as a template for bilateral and
plurilateral agreements
UNCITRAL United Nations Commission on International Trade Law
Further considerations
• The draft model law has maintained the double structure of
eIDAS based on IdM / trust services
• However, identity information may raise several diverse
issues
– IdM – especially foundational identity – raises privacy
concerns that call for stricter regulation
– Trust services – including those incorporating functional
identity – aim to support dataflows and require an
enabling environment rather than a regulatory one
• Issues for further consideration:
– Use of trust services with respect to object-generated
data

More Related Content

Similar to 06_-_luca_castellani_-_uncitral_castellani_en.pptx

E-Sign Regulations Around The World.pptx
E-Sign Regulations Around The World.pptxE-Sign Regulations Around The World.pptx
E-Sign Regulations Around The World.pptxSuchitaGautam1
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
Internet Regulatory Framework
Internet Regulatory FrameworkInternet Regulatory Framework
Internet Regulatory FrameworkJeril Peter
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
Harmonised rules and network codes: The division of competences between Europ...
Harmonised rules and network codes: The division of competences between Europ...Harmonised rules and network codes: The division of competences between Europ...
Harmonised rules and network codes: The division of competences between Europ...Florence Shool of Regulation
 
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxLaw & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxssuser32bd0c
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Electronic transaction law no 2
Electronic transaction law no 2Electronic transaction law no 2
Electronic transaction law no 2Abbassi Law Office
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Dataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxDataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxMarco Gioanola
 
A16: TFA and SEC | Negotiating contracts and FinTech Laws and Regulations (5 ...
A16: TFA and SEC | Negotiating contracts and FinTech Laws and Regulations (5 ...A16: TFA and SEC | Negotiating contracts and FinTech Laws and Regulations (5 ...
A16: TFA and SEC | Negotiating contracts and FinTech Laws and Regulations (5 ...Kullarat Phongsathaporn
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...Vsevolod Shabad
 
20130911 oid dumortier_draft regulation
20130911 oid dumortier_draft regulation20130911 oid dumortier_draft regulation
20130911 oid dumortier_draft regulationJos Dumortier
 

Similar to 06_-_luca_castellani_-_uncitral_castellani_en.pptx (20)

E-Sign Regulations Around The World.pptx
E-Sign Regulations Around The World.pptxE-Sign Regulations Around The World.pptx
E-Sign Regulations Around The World.pptx
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
PPT, UKR, service delivery webinar 310522
PPT, UKR, service delivery webinar 310522PPT, UKR, service delivery webinar 310522
PPT, UKR, service delivery webinar 310522
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Cyber
CyberCyber
Cyber
 
Internet Regulatory Framework
Internet Regulatory FrameworkInternet Regulatory Framework
Internet Regulatory Framework
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Harmonised rules and network codes: The division of competences between Europ...
Harmonised rules and network codes: The division of competences between Europ...Harmonised rules and network codes: The division of competences between Europ...
Harmonised rules and network codes: The division of competences between Europ...
 
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxLaw & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Electronic transaction law no 2
Electronic transaction law no 2Electronic transaction law no 2
Electronic transaction law no 2
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Dataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptxDataprotectionpackage 2015pptx
Dataprotectionpackage 2015pptx
 
A16: TFA and SEC | Negotiating contracts and FinTech Laws and Regulations (5 ...
A16: TFA and SEC | Negotiating contracts and FinTech Laws and Regulations (5 ...A16: TFA and SEC | Negotiating contracts and FinTech Laws and Regulations (5 ...
A16: TFA and SEC | Negotiating contracts and FinTech Laws and Regulations (5 ...
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
eArchiving
eArchivingeArchiving
eArchiving
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
20130911 oid dumortier_draft regulation
20130911 oid dumortier_draft regulation20130911 oid dumortier_draft regulation
20130911 oid dumortier_draft regulation
 

Recently uploaded

如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 

Recently uploaded (20)

如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 

06_-_luca_castellani_-_uncitral_castellani_en.pptx

  • 1. UNCITRAL United Nations Commission on International Trade Law UNCITRAL draft model law on IdM and trust services Luca Castellani UNCITRAL Secretariat The views expressed are those of the author and do not necessarily reflect the views of the United Nations and of UNCITRAL
  • 2. UNCITRAL United Nations Commission on International Trade Law The draft UNCITRAL Model Law on IdM and Trust Services UNCITRAL WG IV has prepared a model law on the use and cross- border recognition of IdM and trust services • Project started in 2017 at the request of certain EU member States and with a broad scope: – build on shared principles and terminology to provide a uniform legal treatment for: • private and public IdM systems and schemes • a broad range of trust services • Respects general principles of commercial and e-commerce law • Takes into consideration prior UNCITRAL provisions and eIDAS regulation
  • 3. UNCITRAL United Nations Commission on International Trade Law The draft UNCITRAL Model Law on IdM and Trust Services • All preparatory documents available on UNCITRAL website in all UN official languages • Draft provisions and explanatory note are submitted to the Commission for consideration and possible adoption in July 2022 • Latest version available in document A/CN.9/1112 - Draft Model Law on the Use and Cross-border Recognition of Identity Management and Trust Services
  • 4. UNCITRAL United Nations Commission on International Trade Law The draft Model Law: scope and general principles • Focuses on use in commercial activities and trade-related services • Does not introduce new requirements to identify or to use a particular IdM or trust service • Use of IdM and trust services is voluntary • Does not affect any other rule of law, including compliance with regulatory requirements and with data privacy and protection law
  • 5. UNCITRAL United Nations Commission on International Trade Law The draft Model Law: IdM • Identity is a set of attributes that uniquely distinguishes a person in a particular context • IdM systems manage both identity proofing and electronic identification (a.k.a. “authentication”) – Identity proofing is “the process of collecting, verifying, and validating sufficient attributes to define and confirm the identity of a person within a particular context” – Electronic identification is “a process used to achieve sufficient assurance in the binding between a person and an identity” – An identity is “a set of attributes that allows a person to be uniquely distinguished within a particular context” – A person is a physical or legal person • Provision on non-discrimination of the result of electronic identification
  • 6. UNCITRAL United Nations Commission on International Trade Law The draft Model Law: IdM • The method used for electronic identification must be reliable • Two-tier approach to determine reliability: – Ex post (after use): • Open-ended list of relevant circumstances – Ex ante (before use) • Possibility of designating reliable IdM systems / services
  • 7. UNCITRAL United Nations Commission on International Trade Law The draft Model Law: IdM • List of obligations of IdM service providers covering the IdM lifecycle • List of obligations of IdM service providers in case of data breach • Rules on liability of IdM service providers – Breach of obligations set in the model law gives rise to liability – All other sources of liability remain applicable, but limitation may be possible
  • 8. UNCITRAL United Nations Commission on International Trade Law The draft Model Law: trust services • A trust service is an electronic service that provides assurance of certain qualities of a data message – who, what, when, where, and why of data – Includes the methods for creating and managing electronic signatures, electronic seals, electronic time stamps, website authentication, electronic archiving and electronic registered delivery services (same as eIDAS) – List of trust services is open-ended • Rule on non-discrimination against use of trust services
  • 9. UNCITRAL United Nations Commission on International Trade Law The draft Model Law: trust services • Each trust service (except website authentication) has a dedicated provision drafted as a functional equivalence rule referring to the paper-based function • Same “two tier” approach as for IdM – ex ante designation + ex post assessment • List of obligations of trust service providers • Liability of trust service providers
  • 10. UNCITRAL United Nations Commission on International Trade Law The draft Model Law: cross-border aspects • Geographic-neutral rules on the assessment of reliability of the method used and on the designation of reliable systems and services – Apply to both IdM and trust services • Dedicated provisions on cross-border recognition and on international cooperation – Does not foresee, but is compatible with the establishment of a centrally-managed mutual recognition mechanism • The model law may be used as a template for bilateral and plurilateral agreements
  • 11. UNCITRAL United Nations Commission on International Trade Law Further considerations • The draft model law has maintained the double structure of eIDAS based on IdM / trust services • However, identity information may raise several diverse issues – IdM – especially foundational identity – raises privacy concerns that call for stricter regulation – Trust services – including those incorporating functional identity – aim to support dataflows and require an enabling environment rather than a regulatory one • Issues for further consideration: – Use of trust services with respect to object-generated data