SlideShare a Scribd company logo
Digital Credentials
Enabling Mobility
and Verification of
Educational
Achievements
Brandon Muramatsu, MIT
Willem van Valkenburg, Delft University of Technology
Today
● A brief intro to the Digital Credentials
Consortium
● Two case studies
○ GDPR and Digital Credentials, Delft University of
Technology
○ Open Source Learner Credential Wallet, MIT
Digital Credentials Consortium
Our mission is to create a trusted,
distributed, and shared infrastructure
that will become the standard for issuing,
storing, displaying, and verifying
academic credentials, digitally.
DCC Founding Members
Delft University of Technology (The
Netherlands)
Georgia Institute of Technology (USA)
Harvard University (USA)
Hasso Plattner Institute, University of
Potsdam (Germany)
Massachusetts Institute of Technology
(USA)
McMaster University (Canada)
Tecnológico De Monterrey (Mexico)
Technical University of Munich
(Germany)
University of California at Berkeley
(USA)
University of California, Irvine (USA)
University of Milano-Bicocca (Italy)
University of Toronto (Canada)
DCC Guiding Principles
Learners
● Learners retain primary control
over their credentials.
● Learners’ consent is required for
issuance of digital credentials.
● Learners decide to whom they grant
access.
● Barriers to receiving and managing
credentials are minimal to enable
broad participation.
Issuers
● Issuers control to whom they issue
credentials, the particular achievement
that the credential represents, and
which credential options are available
to the learner.
● Issuers can revoke credentials
according to their institution’s policies.
● Barriers to issuing credentials are
minimal to enable broad and diverse
participation.
Trust:
● Everyone is able to review how the infrastructure and processes work.
● Trust in the integrity of the credentials is established cryptographically.
● Credentials can be verified without consulting the original issuer.
How does DCC do its work?
● Consortium of members with alignment to guiding principles,
and each working in similar ways on digital credentials
● DCC does its work through open standards organizations
primarily the W3C Verifiable Credentials for Education
(W3C VC-EDU) Community Group
○ Coordinates with IMS Global on Comprehensive Learner Record
and Open Badges v3 specifications
● Shared technical work through a Technical Working Group
made up of DCC members
● Implementing Verifiable Credentials (VC) and
Decentralized Identifiers (DID) specifications
○ Meet key DCC guiding principles of learner control
Delft University of Technology
General Data
Protection Regulation
and Blockchain
General Data Protection Regulation
(GDPR)
The European Union's General Data Protection Regulation become binding in
May 2018.
Goal of GDPR:
1. to facilitate free movement of personal data between EU members states
2. to establish a framework of fundamental data rights protection.
The legal framework creates a number of obligations resting on data controllers
(entities determining the means and purpose of data processing)
The legal framework creates a number of rights to data subjects (the natural
persons to whom the personal data relates) to be enforced by data controllers.
E.g. Article 16 GDPR – right to rectification, Article 17 GDPR – right to erasure
(‘right to be forgotten’)
Leading principles of GDPR
Lawfulness, fairness
and transparency
organisations need to make sure their data collection practices don’t break the law and that they
aren’t hiding anything from data subjects.
Purpose limitation Organisations should only collect personal data for a specific purpose, clearly state what that
purpose is, and only collect data for as long as necessary to complete that purpose.
Data minimisation Organisations must only process the personal data that they need to achieve its processing
purposes.
Accuracy The accuracy of personal data is integral to data protection. The GDPR states that “every
reasonable step must be taken” to erase or rectify data that is inaccurate or incomplete.
Storage limitation Organisations need to delete personal data when it’s no longer necessary.
Integrity and
confidentiality
(security)
Personal data should be processed in a manner that ensures appropriate security of the
personal data, including protection against unauthorised or unlawful processing and against
accidental loss, destruction or damage, using appropriate technical or organisational measures.
Accountability The controller shall be responsible for, and be able to demonstrate compliance with the above
principles
Source:https://www.bankinghub.eu/banking/finance-risk/gdpr-
deep-dive-implement-right-forgotten
GDPR and Blockchain
The GDPR is based on assumptions that creates tension with blockchain.
GDPR Blockchain
in relation to each personal data point there is at
least one natural or legal person – the data
controller – whom the subjects can address to
enforce their rights under EU Data protection law.
decentralizes to many actors and allocation of
responsibility and accountability is burdensome.
data can be modified or erased where necessary to
comply with the legal requirements of GDPR Article
16 (right to rectification) and 17 (right to erasure
(‘right to be forgotten’)
Modification and erasure of data is made onerous to
ensure data integrity and increase trust in the
network.
Personal data on the Blockchain?
In the pilot we explored the following:
● Is data that is encrypted or hashed/ ‘anonymized’ still
quality as personal data as per the GDPR requirements of
anonymisation?
● How is the right to erasure/right to be forgotten dealt with in
the pilot?
The right to be forgotten is not an absolute
right
● if a learner requests to be forgotten, Accredify
deletes their personal data. The learner is the
one who should contact institutes where they
have personally shared their opencert file
which could be still verified.
● What happens now is that Accredify deletes
personal data from their system which is
GDPR complaint. This is because the right to
be forgotten does not extend to all the
institutes where the learner shared their file.
● If a certificate is revoked and cannot be
verified in the future that doesn’t say much –
so it is good to add an explanation.
Hashing, salt and peppering of personal
data
● As long as the hash relates to something it is not
anonymised.
● This is the current conflict within blockchain and GDPR
and the interpretation of what is considered as
anonymous.
Open Source Learner Wallet
MIT
MIT Team
Brandon Muramatsu
Philipp Schmidt
Gillian Walsh
Dmitri Zagidulin
About the Open Source Learner Wallet Project
● A key missing ingredient in a digital credential infrastructure
○ Prioritizes learner agency
○ Enables trust
○ Supports diverse institutions
● A learner credential wallet specification (May 2021)
● An open source learner wallet mobile app, eduWallet
● A pilot with U.S. institutions:
○ College Unbound, Georgia Tech and San Jose City College
○ MIT xPRO and University of North Texas / Concentric Sky
Details on eduWallet
An Open Source Learner Wallet
● Both Android and iOS versions
○ Going into pilot testing December 2021–January 2022
● Key features
○ Login to secure wallet
○ Add verifiable credentials via deep link (direct and QR Code) and
via QR code
○ Display credentials locally—Issuer, issuer logo, credential name,
issuance date
○ Select and share credentials as JSON-LD via operating system
sharing mechanisms (copy to clipboard, save as file)
○ Delete credentials, backup and restore from file
Demo
● Login to a LMS or student portal
● Prompted to install eduWallet from Apple or
Google Play app stores
● First time setup of eduWallet
● (Simulated) Access credential via LMS / QR Code
/ Deep Link
● (Not demonstrated) Authenticate before
receiving credential
● View credentials (and share them)
Questions?
Brandon Muramatsu
mura@mit.edu
Willem van Valkenburg
w.f.vanvalkenburg@tudelft.nl

More Related Content

What's hot

Smart contracts using web3.js
Smart contracts using web3.jsSmart contracts using web3.js
Smart contracts using web3.js
Felix Crisan
 
Hyperledger fabric architecture
Hyperledger fabric architectureHyperledger fabric architecture
Hyperledger fabric architecture
Celine George
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
Sébastien Tandel
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
Blockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricBlockchain - HyperLedger Fabric
Blockchain - HyperLedger Fabric
Araf Karsh Hamid
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
Torsten Lodderstedt
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
Heather Vescent
 
Permissonless & Permissioned blockchain
Permissonless & Permissioned blockchainPermissonless & Permissioned blockchain
Permissonless & Permissioned blockchain
Vikas Pandey
 
Intro to Web3
Intro to Web3Intro to Web3
Intro to Web3
asasdasd5
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
Romit Bose
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
Zied GUESMI
 
Blockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - ClaventBlockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - Clavent
Araf Karsh Hamid
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin
Jérôme Kehrli
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
Murughan Palaniachari
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
SSIMeetup
 
Attacks on Smart Contracts
Attacks on Smart ContractsAttacks on Smart Contracts
Attacks on Smart Contracts
Marcin Majchrzak
 
Blockchain Introduction Presentation
Blockchain Introduction PresentationBlockchain Introduction Presentation
Blockchain Introduction Presentation
Amr Alaa Yassen
 
Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618
Arnaud Le Hors
 
Quant Overledger - OIX Open Identity Exchange 14th July 2018
Quant Overledger - OIX Open Identity Exchange 14th July 2018Quant Overledger - OIX Open Identity Exchange 14th July 2018
Quant Overledger - OIX Open Identity Exchange 14th July 2018
Gilbert Verdian
 

What's hot (20)

Smart contracts using web3.js
Smart contracts using web3.jsSmart contracts using web3.js
Smart contracts using web3.js
 
Hyperledger fabric architecture
Hyperledger fabric architectureHyperledger fabric architecture
Hyperledger fabric architecture
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Blockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricBlockchain - HyperLedger Fabric
Blockchain - HyperLedger Fabric
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
Permissonless & Permissioned blockchain
Permissonless & Permissioned blockchainPermissonless & Permissioned blockchain
Permissonless & Permissioned blockchain
 
Intro to Web3
Intro to Web3Intro to Web3
Intro to Web3
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Blockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - ClaventBlockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - Clavent
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Attacks on Smart Contracts
Attacks on Smart ContractsAttacks on Smart Contracts
Attacks on Smart Contracts
 
Blockchain Introduction Presentation
Blockchain Introduction PresentationBlockchain Introduction Presentation
Blockchain Introduction Presentation
 
Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618
 
Quant Overledger - OIX Open Identity Exchange 14th July 2018
Quant Overledger - OIX Open Identity Exchange 14th July 2018Quant Overledger - OIX Open Identity Exchange 14th July 2018
Quant Overledger - OIX Open Identity Exchange 14th July 2018
 

Similar to Digital Credentials Enabling Mobility and Verification of Educational Achievements

GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
MicheleNati
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Konstantinos Demertzis
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
eraser Juan José Calderón
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
DEFeND Project
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
Lee Schlenker
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Ulf Mattsson
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
yashapnt
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ulf Mattsson
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
caniceconsulting
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
Capgemini
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
Alain Ducass
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
Ulf Mattsson
 

Similar to Digital Credentials Enabling Mobility and Verification of Educational Achievements (20)

GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 

More from Brandon Muramatsu

Sustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive DiscussionSustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive Discussion
Brandon Muramatsu
 
Bridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college studentsBridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college students
Brandon Muramatsu
 
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education InfrastructureFederations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure
Brandon Muramatsu
 
The Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in India
Brandon Muramatsu
 
The Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in India
Brandon Muramatsu
 
Strategic Education Initiatives , MIT Open Learning
Strategic Education Initiatives, MIT Open LearningStrategic Education Initiatives, MIT Open Learning
Strategic Education Initiatives , MIT Open Learning
Brandon Muramatsu
 
Open Embedded Assessments: Play, Author; Anywhere, Anytime
Open Embedded Assessments:Play, Author; Anywhere, AnytimeOpen Embedded Assessments:Play, Author; Anywhere, Anytime
Open Embedded Assessments: Play, Author; Anywhere, Anytime
Brandon Muramatsu
 
DXtera Enabling Digital Exchange
DXtera Enabling Digital ExchangeDXtera Enabling Digital Exchange
DXtera Enabling Digital Exchange
Brandon Muramatsu
 
Evaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning ResourcesEvaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning Resources
Brandon Muramatsu
 
Online Recitation Sessions
Online Recitation SessionsOnline Recitation Sessions
Online Recitation Sessions
Brandon Muramatsu
 
Connected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at ScaleConnected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at Scale
Brandon Muramatsu
 
CLIx-Connected Learning Intiative
CLIx-Connected Learning IntiativeCLIx-Connected Learning Intiative
CLIx-Connected Learning Intiative
Brandon Muramatsu
 
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of InteractivityThe Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
Brandon Muramatsu
 
Innovative Educational Technology and Educational Infrastructure at MIT
Innovative Educational Technologyand Educational Infrastructureat MITInnovative Educational Technologyand Educational Infrastructureat MIT
Innovative Educational Technology and Educational Infrastructure at MIT
Brandon Muramatsu
 
Strategic Education Initiatives
Strategic Education InitiativesStrategic Education Initiatives
Strategic Education Initiatives
Brandon Muramatsu
 
Workshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPMWorkshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPM
Brandon Muramatsu
 
Workshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx CoursesWorkshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx Courses
Brandon Muramatsu
 
Workshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital CoursesWorkshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital Courses
Brandon Muramatsu
 
Workshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPMWorkshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPM
Brandon Muramatsu
 
Backstage: What's Behind the Curtain
Backstage: What's Behind the CurtainBackstage: What's Behind the Curtain
Backstage: What's Behind the Curtain
Brandon Muramatsu
 

More from Brandon Muramatsu (20)

Sustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive DiscussionSustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive Discussion
 
Bridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college studentsBridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college students
 
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education InfrastructureFederations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure
 
The Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in India
 
The Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in India
 
Strategic Education Initiatives , MIT Open Learning
Strategic Education Initiatives, MIT Open LearningStrategic Education Initiatives, MIT Open Learning
Strategic Education Initiatives , MIT Open Learning
 
Open Embedded Assessments: Play, Author; Anywhere, Anytime
Open Embedded Assessments:Play, Author; Anywhere, AnytimeOpen Embedded Assessments:Play, Author; Anywhere, Anytime
Open Embedded Assessments: Play, Author; Anywhere, Anytime
 
DXtera Enabling Digital Exchange
DXtera Enabling Digital ExchangeDXtera Enabling Digital Exchange
DXtera Enabling Digital Exchange
 
Evaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning ResourcesEvaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning Resources
 
Online Recitation Sessions
Online Recitation SessionsOnline Recitation Sessions
Online Recitation Sessions
 
Connected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at ScaleConnected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at Scale
 
CLIx-Connected Learning Intiative
CLIx-Connected Learning IntiativeCLIx-Connected Learning Intiative
CLIx-Connected Learning Intiative
 
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of InteractivityThe Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
 
Innovative Educational Technology and Educational Infrastructure at MIT
Innovative Educational Technologyand Educational Infrastructureat MITInnovative Educational Technologyand Educational Infrastructureat MIT
Innovative Educational Technology and Educational Infrastructure at MIT
 
Strategic Education Initiatives
Strategic Education InitiativesStrategic Education Initiatives
Strategic Education Initiatives
 
Workshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPMWorkshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPM
 
Workshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx CoursesWorkshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx Courses
 
Workshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital CoursesWorkshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital Courses
 
Workshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPMWorkshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPM
 
Backstage: What's Behind the Curtain
Backstage: What's Behind the CurtainBackstage: What's Behind the Curtain
Backstage: What's Behind the Curtain
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Digital Credentials Enabling Mobility and Verification of Educational Achievements

  • 1. Digital Credentials Enabling Mobility and Verification of Educational Achievements Brandon Muramatsu, MIT Willem van Valkenburg, Delft University of Technology
  • 2. Today ● A brief intro to the Digital Credentials Consortium ● Two case studies ○ GDPR and Digital Credentials, Delft University of Technology ○ Open Source Learner Credential Wallet, MIT
  • 3. Digital Credentials Consortium Our mission is to create a trusted, distributed, and shared infrastructure that will become the standard for issuing, storing, displaying, and verifying academic credentials, digitally.
  • 4. DCC Founding Members Delft University of Technology (The Netherlands) Georgia Institute of Technology (USA) Harvard University (USA) Hasso Plattner Institute, University of Potsdam (Germany) Massachusetts Institute of Technology (USA) McMaster University (Canada) Tecnológico De Monterrey (Mexico) Technical University of Munich (Germany) University of California at Berkeley (USA) University of California, Irvine (USA) University of Milano-Bicocca (Italy) University of Toronto (Canada)
  • 5. DCC Guiding Principles Learners ● Learners retain primary control over their credentials. ● Learners’ consent is required for issuance of digital credentials. ● Learners decide to whom they grant access. ● Barriers to receiving and managing credentials are minimal to enable broad participation. Issuers ● Issuers control to whom they issue credentials, the particular achievement that the credential represents, and which credential options are available to the learner. ● Issuers can revoke credentials according to their institution’s policies. ● Barriers to issuing credentials are minimal to enable broad and diverse participation. Trust: ● Everyone is able to review how the infrastructure and processes work. ● Trust in the integrity of the credentials is established cryptographically. ● Credentials can be verified without consulting the original issuer.
  • 6. How does DCC do its work? ● Consortium of members with alignment to guiding principles, and each working in similar ways on digital credentials ● DCC does its work through open standards organizations primarily the W3C Verifiable Credentials for Education (W3C VC-EDU) Community Group ○ Coordinates with IMS Global on Comprehensive Learner Record and Open Badges v3 specifications ● Shared technical work through a Technical Working Group made up of DCC members ● Implementing Verifiable Credentials (VC) and Decentralized Identifiers (DID) specifications ○ Meet key DCC guiding principles of learner control
  • 7. Delft University of Technology
  • 9. General Data Protection Regulation (GDPR) The European Union's General Data Protection Regulation become binding in May 2018. Goal of GDPR: 1. to facilitate free movement of personal data between EU members states 2. to establish a framework of fundamental data rights protection. The legal framework creates a number of obligations resting on data controllers (entities determining the means and purpose of data processing) The legal framework creates a number of rights to data subjects (the natural persons to whom the personal data relates) to be enforced by data controllers. E.g. Article 16 GDPR – right to rectification, Article 17 GDPR – right to erasure (‘right to be forgotten’)
  • 10. Leading principles of GDPR Lawfulness, fairness and transparency organisations need to make sure their data collection practices don’t break the law and that they aren’t hiding anything from data subjects. Purpose limitation Organisations should only collect personal data for a specific purpose, clearly state what that purpose is, and only collect data for as long as necessary to complete that purpose. Data minimisation Organisations must only process the personal data that they need to achieve its processing purposes. Accuracy The accuracy of personal data is integral to data protection. The GDPR states that “every reasonable step must be taken” to erase or rectify data that is inaccurate or incomplete. Storage limitation Organisations need to delete personal data when it’s no longer necessary. Integrity and confidentiality (security) Personal data should be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures. Accountability The controller shall be responsible for, and be able to demonstrate compliance with the above principles
  • 12. GDPR and Blockchain The GDPR is based on assumptions that creates tension with blockchain. GDPR Blockchain in relation to each personal data point there is at least one natural or legal person – the data controller – whom the subjects can address to enforce their rights under EU Data protection law. decentralizes to many actors and allocation of responsibility and accountability is burdensome. data can be modified or erased where necessary to comply with the legal requirements of GDPR Article 16 (right to rectification) and 17 (right to erasure (‘right to be forgotten’) Modification and erasure of data is made onerous to ensure data integrity and increase trust in the network.
  • 13.
  • 14. Personal data on the Blockchain? In the pilot we explored the following: ● Is data that is encrypted or hashed/ ‘anonymized’ still quality as personal data as per the GDPR requirements of anonymisation? ● How is the right to erasure/right to be forgotten dealt with in the pilot?
  • 15. The right to be forgotten is not an absolute right ● if a learner requests to be forgotten, Accredify deletes their personal data. The learner is the one who should contact institutes where they have personally shared their opencert file which could be still verified. ● What happens now is that Accredify deletes personal data from their system which is GDPR complaint. This is because the right to be forgotten does not extend to all the institutes where the learner shared their file. ● If a certificate is revoked and cannot be verified in the future that doesn’t say much – so it is good to add an explanation.
  • 16. Hashing, salt and peppering of personal data ● As long as the hash relates to something it is not anonymised. ● This is the current conflict within blockchain and GDPR and the interpretation of what is considered as anonymous.
  • 17. Open Source Learner Wallet MIT MIT Team Brandon Muramatsu Philipp Schmidt Gillian Walsh Dmitri Zagidulin
  • 18. About the Open Source Learner Wallet Project ● A key missing ingredient in a digital credential infrastructure ○ Prioritizes learner agency ○ Enables trust ○ Supports diverse institutions ● A learner credential wallet specification (May 2021) ● An open source learner wallet mobile app, eduWallet ● A pilot with U.S. institutions: ○ College Unbound, Georgia Tech and San Jose City College ○ MIT xPRO and University of North Texas / Concentric Sky
  • 19. Details on eduWallet An Open Source Learner Wallet ● Both Android and iOS versions ○ Going into pilot testing December 2021–January 2022 ● Key features ○ Login to secure wallet ○ Add verifiable credentials via deep link (direct and QR Code) and via QR code ○ Display credentials locally—Issuer, issuer logo, credential name, issuance date ○ Select and share credentials as JSON-LD via operating system sharing mechanisms (copy to clipboard, save as file) ○ Delete credentials, backup and restore from file
  • 20. Demo ● Login to a LMS or student portal ● Prompted to install eduWallet from Apple or Google Play app stores ● First time setup of eduWallet ● (Simulated) Access credential via LMS / QR Code / Deep Link ● (Not demonstrated) Authenticate before receiving credential ● View credentials (and share them)
  • 21. Questions? Brandon Muramatsu mura@mit.edu Willem van Valkenburg w.f.vanvalkenburg@tudelft.nl

Editor's Notes

  1. https://docs.google.com/document/d/1Rvnt_wi_pIeX9YXtjXMXHbTow8ZO_J5V/edit#
  2. College Unbound Small IHE serving low-income learners in degree completion programs San Jose City College Provides non-degree courses for high demand tech skills, has previously worked with MIT on their Technest program Georgia Tech Influential in DCC, piloting verifiable with training programs