Video of this presentation is available here http://ow.ly/jf3Bz
Mydex Community Interest Company (CIC) is building the personal data services platform for the semantic web and transforming the opportunity for individuals to manage and control their lives.
Transcription coming up soon!
For more information about Mydex, kindly visit http://mydex.org/about/
Or visit the developers site at http://dev.mydex.org
And to become a member of Mydex Personal Data Store, visit http://pds.mydex.org
Also learn more about Mydex-Midata at http://midata.mydex.org
and Mydex-Third Sector at http://thirdsector.mydex.org
Follow Mydex on: -
Twitter: http://www.twitter.com/mydexcic
Facebook: http://www.facebook.com/Mydex.org
Flickr: http://www.flickr.com/photos/mydexcic/
RSS feed: http://feeds.feedburner.com/Mydex
Google Plus: https://plus.google.com/u/1/104992390676431315997/posts
Oix local government mydex platform overview 2nd july 2013Mydex CIC
This document discusses how the Mydex service can help local governments meet key needs and drivers by improving service areas like social care, transportation, education, and community engagement. It outlines how Mydex is different as a UK social enterprise focused on empowering individuals to manage their personal data and identities. Mydex provides a personal data store and digital identity platform that enables secure data sharing between individuals and organizations with user consent. This platform can help streamline processes, reduce costs, and improve services for both organizations and individuals.
Managing identity for the future how everybody can win - david alexander - ...Mydex CIC
The document discusses how the Mydex open platform enables all participants, including individuals, organizations, and application developers, to benefit from secure and consent-based sharing of personal data. The Mydex platform provides personal data stores for individuals, a secure API for data sharing, and identity and attribute services. For organizations, it reduces costs, improves compliance and data quality, and opens opportunities for new services. Application developers benefit from access to richer data sets and an open environment. The platform aims to empower individuals to more effectively manage their personal data and interactions with organizations.
The role of the individual in "digital by default" public servicesMydex CIC
The document discusses how individuals can play a more empowered role in digital public services through personal data stores. It argues that by giving citizens direct access and control over their own personal data, as proposed with services like Mydex, people can more securely and conveniently interact with service providers while driving cost savings and opportunities for new personalized services. However, many local governments have yet to develop digital strategies and leadership to fully realize this vision.
Kantara Initiative is a nonprofit focused on developing frameworks for digital identity, privacy, security and interoperability. It was founded in 2009 and has over 60 organizational members and hundreds of participants from public, private and government sectors. Kantara Initiative develops trust frameworks, assurance programs and technical standards to enable identity credential recognition across industries and jurisdictions. Its frameworks have been approved or accredited at different levels of assurance and its work references international standards organizations.
Learn about the Kantara Consent & Information Sharing WG and their major deliverable the digital Consent Receipt - an Alpha project designed to upgrade the way a person provides consent on-line. This is an open standardization project.
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...Mydex CIC
The document summarizes Mydex CIC, a UK social enterprise that empowers individuals to manage their personal data through secure personal data services. Mydex offers identity services, a digital letterbox to store personal data, and acts as a trust framework to facilitate data sharing between individuals and organizations. However, Mydex claims no ownership over individuals' personal data stored in their personal data services and acts only as a platform to enable this functionality. The document discusses emerging issues around personal data stores and their role in data protection law.
The document discusses digital trust frameworks, which define rules for interactions between organizations handling digital identity, authentication, and authorization. It provides an example of how a trust framework allows a festival organization to easily verify a resident's identity with telco providers to give out free flags. The key benefits of trust frameworks are lowering negotiation burdens between organizations and enabling interoperability by having all parties comply with the framework's protocols, standards, and policies. The document encourages the reader to get involved with the Kantara Initiative, a non-profit focused on developing innovations for trusted online experiences.
Oix local government mydex platform overview 2nd july 2013Mydex CIC
This document discusses how the Mydex service can help local governments meet key needs and drivers by improving service areas like social care, transportation, education, and community engagement. It outlines how Mydex is different as a UK social enterprise focused on empowering individuals to manage their personal data and identities. Mydex provides a personal data store and digital identity platform that enables secure data sharing between individuals and organizations with user consent. This platform can help streamline processes, reduce costs, and improve services for both organizations and individuals.
Managing identity for the future how everybody can win - david alexander - ...Mydex CIC
The document discusses how the Mydex open platform enables all participants, including individuals, organizations, and application developers, to benefit from secure and consent-based sharing of personal data. The Mydex platform provides personal data stores for individuals, a secure API for data sharing, and identity and attribute services. For organizations, it reduces costs, improves compliance and data quality, and opens opportunities for new services. Application developers benefit from access to richer data sets and an open environment. The platform aims to empower individuals to more effectively manage their personal data and interactions with organizations.
The role of the individual in "digital by default" public servicesMydex CIC
The document discusses how individuals can play a more empowered role in digital public services through personal data stores. It argues that by giving citizens direct access and control over their own personal data, as proposed with services like Mydex, people can more securely and conveniently interact with service providers while driving cost savings and opportunities for new personalized services. However, many local governments have yet to develop digital strategies and leadership to fully realize this vision.
Kantara Initiative is a nonprofit focused on developing frameworks for digital identity, privacy, security and interoperability. It was founded in 2009 and has over 60 organizational members and hundreds of participants from public, private and government sectors. Kantara Initiative develops trust frameworks, assurance programs and technical standards to enable identity credential recognition across industries and jurisdictions. Its frameworks have been approved or accredited at different levels of assurance and its work references international standards organizations.
Learn about the Kantara Consent & Information Sharing WG and their major deliverable the digital Consent Receipt - an Alpha project designed to upgrade the way a person provides consent on-line. This is an open standardization project.
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...Mydex CIC
The document summarizes Mydex CIC, a UK social enterprise that empowers individuals to manage their personal data through secure personal data services. Mydex offers identity services, a digital letterbox to store personal data, and acts as a trust framework to facilitate data sharing between individuals and organizations. However, Mydex claims no ownership over individuals' personal data stored in their personal data services and acts only as a platform to enable this functionality. The document discusses emerging issues around personal data stores and their role in data protection law.
The document discusses digital trust frameworks, which define rules for interactions between organizations handling digital identity, authentication, and authorization. It provides an example of how a trust framework allows a festival organization to easily verify a resident's identity with telco providers to give out free flags. The key benefits of trust frameworks are lowering negotiation burdens between organizations and enabling interoperability by having all parties comply with the framework's protocols, standards, and policies. The document encourages the reader to get involved with the Kantara Initiative, a non-profit focused on developing innovations for trusted online experiences.
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
An overview of new and existing approaches for Digital Identity including enterprise and customer identity. New blockchain-oriented techniques and where they fit into the IAM landscape.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
This document discusses self-sovereign identity and decentralized identifiers (DIDs). It provides an overview of identity evolution from centralized to user-centric models. Self-sovereign identity allows individuals to control their digital identities across systems without relying on centralized authorities. DIDs are a new type of identifier that can be registered on a distributed ledger without a centralized registration authority. The document outlines the goals and components of DID specifications and describes how DIDs and verifiable claims work on networks like Sovrin to enable self-sovereign identity.
Blockchain: the trust fabric for next generation digital identity managementEY
This document summarizes an EY presentation on blockchain and identity and access management. It discusses how blockchain can transform IAM by facilitating a decentralized, trust-based model of identity verification and access management. Key benefits include improved user experience, regulatory compliance, risk reduction, and cost savings. The presentation provides examples of blockchain applications today and outlines how it could fit into the next generation of IAM architecture.
Blockchain technology is offering inroads into transforming the healthcare ecosystem by placing the patient at the center of the system. Benefits such as increased security, privacy, and interoperability of health data are on the horizon.
In this slideshare, here's what we explore:
Challenges clouding healthcare operations
Why is it important to secure patient data?
Blockchain: Enabling interoperability
Understanding supply chain integrity
Compliance and regulations
This document discusses open identity for open government initiatives that aim to make government more transparent and easier for citizens to access information. It involves a public-private partnership between government agencies, non-profits, and for-profit companies. The goals are to avoid application-specific credentials, leverage industry credentials for government use, and use open standards and Web 2.0 technologies. Open identity is based on portable internet identities issued by multiple providers to users, along with multiple levels of identity assurance. It involves third-party identity management and a "trust triangle" model. Challenges include developing more high assurance certifiers and credentials, metadata interoperability, and piloting the initiatives.
The document discusses self-sovereign identities and their use in electronic business transactions. It proposes a Self-Sovereign Identity Framework (SSIF) that would support the creation, use, modification and deletion of self-sovereign identities. The SSIF would also support the association and revocation of attestations to identities. The goal of the SSIF infrastructure is to enable individuals to create and control digital identities, and for businesses to specify electronic business transactions that utilize digital identities. Current work is focused on modeling electronic business transactions and the requirements for valid business decisions based on digital identity data and statements.
The document discusses the shift from centralized platforms and services on the internet to decentralized ecosystems enabled by distributed ledger technologies like blockchain. It outlines how centralized platforms currently control user experiences, transactions, and governance but that blockchain allows for decentralized trust and sharing of information. Sovrin is highlighted as a decentralized identity network that can provide verifiable digital identities to people, organizations, and things in a way that is portable, private, and secure without needing to connect to centralized issuer systems. Decentralized identity is presented as the foundational layer that can enable decentralized transactions, assets, logistics and peer-to-peer economies.
Get Rich with Blockchain & Cryptocurrencykeerthi678722
The document discusses the current state of regulation regarding consumer tokens in the United States. It provides context on the growth of decentralized finance and non-fungible tokens. It then outlines the existing securities law framework from the Howey Test that the SEC uses to determine if a digital asset is a security. The document aims to explore what parameters exist for issuing consumer or utility tokens, which are intended for use on a distributed platform and not meant to be securities, in the US given the unclear regulatory framework.
Nick Meyne Enterprise Architect - Capgemini
At Global Architecture Week 2015, we covered ‘Digital Currencies and Cash’ and their relevance to Tax and Welfare Authorities, concluding with the message: “It’s not about Bitcoin, it’s about the Blockchain”. Blockchain technology has the potential to enable a new mutually trusted, transparent way of sharing and transacting. In the UK Public Sector, Sir Mark Walport’s report Distributed Ledger Technology: beyond blockchain encouraged Government to assess its early use and potential. Meanwhile in the private sector, Blockchain FinTech excitement among start-ups and venture capitalists remained strong for a technology promised to be “like a whole new internet for value exchange”. But where are the real world use cases today? What is it that makes a use case more likely to succeed? In this talk, we will share and discuss a number of Capgemini examples.
Blockchain provides a foundation of digital trust in the digital economy by enabling reliability, credibility, transparency, integrity and security. It establishes a shared, immutable ledger through replication across participants to record all transactions across a business network. Smart contracts, privacy protections, and distributed consensus mechanisms allow transactions to be authenticated and appropriate data access while maintaining auditability. Overall, blockchain saves time and costs while reducing risks to increase trust between participants in shared processes and recordkeeping.
Hablando de blockchain en la Uniandes de ColombiaPablo Junco
os comparto mi presentacion de Blockchain y el papel de arquitecto de aplicaciones para los estudiantes de la maestría de arquitectura de tecnología de la Universidad de los Andes en Colombia.
A presentation on Self Sovereign Identify - jointly presented with D&B. The topic explores the concept of SSI and the evolving W3C Community proposals around DID (Digital Identity), DID Doc, DID Auth and Verifiable Credentials. Please email me if you would like more information about SSI or wish to chat with me: mohan@chainyard.com
Presented on the main stage at CVC2019 in Zug, Switzerland. Discusses the shifts in how digital identity, particularly CULedger's self-sovereign identity solution MyCUID is being used to return to a normal approach for relationships. Discusses future application in payments as well.
Blockchain has many applications across different industries such as healthcare, supply chain management, and finance. This has increased the demand for blockchain professionals with specialized skills. The document discusses several blockchain certification programs that provide training in key application areas like digital marketing, human resources, law, supply chain, and finance. The Blockchain Council offers online certification courses to help professionals learn blockchain technologies and implement them in their fields.
This document provides an introduction and overview of blockchain technology. It begins with key concepts, explaining that blockchain allows parties to reach consensus without trusting each other through decentralization, security, and immutability. It then discusses how blockchain works, including the roles of wallets, miners, and consensus algorithms like proof of work. The document reviews the state of the art, including examples of cryptocurrencies, digital assets, identity solutions, smart contracts, decentralized applications, and challenges to adoption. It positions blockchain as a foundational technology that is just beginning to transform how information and value are transferred.
Its origins may be traced all the way back to the blockchain technology. There are decentralized blockchain networks. Blockchain technology is a wonderful innovation of the twenty-first century.
At the 2017 NC Digital Government Summit, I gave a presentation to demystify Blockchain. The presentation explained what is blockchain, compared primitive trade to Burning Man -- and, highlighted the record and public key; then ended with specific use cases.
The Case for Personal Information Empowerment and the rise of personal data s...Mydex CIC
For more information about Mydex, kindly visit http://mydex.org/about/
Or visit the developers site at http://dev.mydex.org
And to become a member of Mydex Personal Data Store, visit http://pds.mydex.org
Also learn more about Mydex-Midata at http://midata.mydex.org
and Mydex-Third Sector at http://thirdsector.mydex.org
Follow Mydex on: -
Twitter: http://www.twitter.com/mydexcic
Facebook: http://www.facebook.com/Mydex.org
Flickr: http://www.flickr.com/photos/mydexcic/
RSS feed: http://feeds.feedburner.com/Mydex
Google Plus: https://plus.google.com/u/1/104992390676431315997/posts
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
An overview of new and existing approaches for Digital Identity including enterprise and customer identity. New blockchain-oriented techniques and where they fit into the IAM landscape.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
This document discusses self-sovereign identity and decentralized identifiers (DIDs). It provides an overview of identity evolution from centralized to user-centric models. Self-sovereign identity allows individuals to control their digital identities across systems without relying on centralized authorities. DIDs are a new type of identifier that can be registered on a distributed ledger without a centralized registration authority. The document outlines the goals and components of DID specifications and describes how DIDs and verifiable claims work on networks like Sovrin to enable self-sovereign identity.
Blockchain: the trust fabric for next generation digital identity managementEY
This document summarizes an EY presentation on blockchain and identity and access management. It discusses how blockchain can transform IAM by facilitating a decentralized, trust-based model of identity verification and access management. Key benefits include improved user experience, regulatory compliance, risk reduction, and cost savings. The presentation provides examples of blockchain applications today and outlines how it could fit into the next generation of IAM architecture.
Blockchain technology is offering inroads into transforming the healthcare ecosystem by placing the patient at the center of the system. Benefits such as increased security, privacy, and interoperability of health data are on the horizon.
In this slideshare, here's what we explore:
Challenges clouding healthcare operations
Why is it important to secure patient data?
Blockchain: Enabling interoperability
Understanding supply chain integrity
Compliance and regulations
This document discusses open identity for open government initiatives that aim to make government more transparent and easier for citizens to access information. It involves a public-private partnership between government agencies, non-profits, and for-profit companies. The goals are to avoid application-specific credentials, leverage industry credentials for government use, and use open standards and Web 2.0 technologies. Open identity is based on portable internet identities issued by multiple providers to users, along with multiple levels of identity assurance. It involves third-party identity management and a "trust triangle" model. Challenges include developing more high assurance certifiers and credentials, metadata interoperability, and piloting the initiatives.
The document discusses self-sovereign identities and their use in electronic business transactions. It proposes a Self-Sovereign Identity Framework (SSIF) that would support the creation, use, modification and deletion of self-sovereign identities. The SSIF would also support the association and revocation of attestations to identities. The goal of the SSIF infrastructure is to enable individuals to create and control digital identities, and for businesses to specify electronic business transactions that utilize digital identities. Current work is focused on modeling electronic business transactions and the requirements for valid business decisions based on digital identity data and statements.
The document discusses the shift from centralized platforms and services on the internet to decentralized ecosystems enabled by distributed ledger technologies like blockchain. It outlines how centralized platforms currently control user experiences, transactions, and governance but that blockchain allows for decentralized trust and sharing of information. Sovrin is highlighted as a decentralized identity network that can provide verifiable digital identities to people, organizations, and things in a way that is portable, private, and secure without needing to connect to centralized issuer systems. Decentralized identity is presented as the foundational layer that can enable decentralized transactions, assets, logistics and peer-to-peer economies.
Get Rich with Blockchain & Cryptocurrencykeerthi678722
The document discusses the current state of regulation regarding consumer tokens in the United States. It provides context on the growth of decentralized finance and non-fungible tokens. It then outlines the existing securities law framework from the Howey Test that the SEC uses to determine if a digital asset is a security. The document aims to explore what parameters exist for issuing consumer or utility tokens, which are intended for use on a distributed platform and not meant to be securities, in the US given the unclear regulatory framework.
Nick Meyne Enterprise Architect - Capgemini
At Global Architecture Week 2015, we covered ‘Digital Currencies and Cash’ and their relevance to Tax and Welfare Authorities, concluding with the message: “It’s not about Bitcoin, it’s about the Blockchain”. Blockchain technology has the potential to enable a new mutually trusted, transparent way of sharing and transacting. In the UK Public Sector, Sir Mark Walport’s report Distributed Ledger Technology: beyond blockchain encouraged Government to assess its early use and potential. Meanwhile in the private sector, Blockchain FinTech excitement among start-ups and venture capitalists remained strong for a technology promised to be “like a whole new internet for value exchange”. But where are the real world use cases today? What is it that makes a use case more likely to succeed? In this talk, we will share and discuss a number of Capgemini examples.
Blockchain provides a foundation of digital trust in the digital economy by enabling reliability, credibility, transparency, integrity and security. It establishes a shared, immutable ledger through replication across participants to record all transactions across a business network. Smart contracts, privacy protections, and distributed consensus mechanisms allow transactions to be authenticated and appropriate data access while maintaining auditability. Overall, blockchain saves time and costs while reducing risks to increase trust between participants in shared processes and recordkeeping.
Hablando de blockchain en la Uniandes de ColombiaPablo Junco
os comparto mi presentacion de Blockchain y el papel de arquitecto de aplicaciones para los estudiantes de la maestría de arquitectura de tecnología de la Universidad de los Andes en Colombia.
A presentation on Self Sovereign Identify - jointly presented with D&B. The topic explores the concept of SSI and the evolving W3C Community proposals around DID (Digital Identity), DID Doc, DID Auth and Verifiable Credentials. Please email me if you would like more information about SSI or wish to chat with me: mohan@chainyard.com
Presented on the main stage at CVC2019 in Zug, Switzerland. Discusses the shifts in how digital identity, particularly CULedger's self-sovereign identity solution MyCUID is being used to return to a normal approach for relationships. Discusses future application in payments as well.
Blockchain has many applications across different industries such as healthcare, supply chain management, and finance. This has increased the demand for blockchain professionals with specialized skills. The document discusses several blockchain certification programs that provide training in key application areas like digital marketing, human resources, law, supply chain, and finance. The Blockchain Council offers online certification courses to help professionals learn blockchain technologies and implement them in their fields.
This document provides an introduction and overview of blockchain technology. It begins with key concepts, explaining that blockchain allows parties to reach consensus without trusting each other through decentralization, security, and immutability. It then discusses how blockchain works, including the roles of wallets, miners, and consensus algorithms like proof of work. The document reviews the state of the art, including examples of cryptocurrencies, digital assets, identity solutions, smart contracts, decentralized applications, and challenges to adoption. It positions blockchain as a foundational technology that is just beginning to transform how information and value are transferred.
Its origins may be traced all the way back to the blockchain technology. There are decentralized blockchain networks. Blockchain technology is a wonderful innovation of the twenty-first century.
At the 2017 NC Digital Government Summit, I gave a presentation to demystify Blockchain. The presentation explained what is blockchain, compared primitive trade to Burning Man -- and, highlighted the record and public key; then ended with specific use cases.
The Case for Personal Information Empowerment and the rise of personal data s...Mydex CIC
For more information about Mydex, kindly visit http://mydex.org/about/
Or visit the developers site at http://dev.mydex.org
And to become a member of Mydex Personal Data Store, visit http://pds.mydex.org
Also learn more about Mydex-Midata at http://midata.mydex.org
and Mydex-Third Sector at http://thirdsector.mydex.org
Follow Mydex on: -
Twitter: http://www.twitter.com/mydexcic
Facebook: http://www.facebook.com/Mydex.org
Flickr: http://www.flickr.com/photos/mydexcic/
RSS feed: http://feeds.feedburner.com/Mydex
Google Plus: https://plus.google.com/u/1/104992390676431315997/posts
How to create people-centric services enabled by personal dataClaro Partners Inc.
From data-centric to people-centric perspective
From privacy discussion to understanding how to deliver trust, transparency, control and benefit
Introduce our toolkit to create people-centric services enabled by personal data
Will Open Banking trigger the API of Me? (Chris Wood)Nordic APIs
This is a session given by Chris Wood at Nordic APIs 2016 Platform Summit on October 26th, in Stockholm Sweden.
Description:
The personal data network, often referred to as the “API of Me” is a concept that has been around for a few years and aims to empower consumers by putting them in control of their data. One of the key data sources to help realise the benefit of the personal data network is bank account data which to date has been notoriously difficult to access without web scraping. However, initiatives such as PSD2 may motivate banks to deliver open APIs that will help unlock consumer. This talk takes a look at how open banking will spur the development of the API of Me and what benefit this might deliver for consumers.
Personal Data: How can your residents help you? by William Heath Mydex CIC
William Heath announces Mydex Community Prototype to UK local government
For more information about Mydex, kindly visit http://mydex.org/about/
Or visit the developers site at http://dev.mydex.org
And to become a member of Mydex Personal Data Store, visit http://pds.mydex.org
Also learn more about Mydex-Midata at http://midata.mydex.org
and Mydex-Third Sector at http://thirdsector.mydex.org
Follow Mydex on: -
Twitter: http://www.twitter.com/mydexcic
Facebook: http://www.facebook.com/Mydex.org
Flickr: http://www.flickr.com/photos/mydexcic/
RSS feed: http://feeds.feedburner.com/Mydex
Google Plus: https://plus.google.com/u/1/104992390676431315997/posts
Asked to outline new relationship between the individual and public services for Jeff's Citizen2013 conference. It focuses on emergence of the UK's new ID assurance model and what else can be done with that infrastructure.
This document discusses identity assurance principles and the potential for a "YES2ID" system in the UK. It outlines 9 draft identity assurance principles from the Government Digital Service, including user control, transparency, and access to personal data. It then lists 8 approved identity assurance providers working with GDS, including Mydex. The document provides information about Mydex, describing it as a personal data store that individuals control and use to store and share identity and other personal information. It acknowledges both risks and benefits to consider but argues the principles and guidance seem sound, while individuals must maintain control. It poses the question of whether it is now safe to say "YES2ID" while keeping eyes open to implementation details and incentives.
Tell Us Once: Personal Data Stores and the road to user-driven servicesMydex CIC
Presentation by William Heath to Tell Us Once
For more information about Mydex, kindly visit http://mydex.org/about/
Or visit the developers site at http://dev.mydex.org
And to become a member of Mydex Personal Data Store, visit http://pds.mydex.org
Also learn more about Mydex-Midata at http://midata.mydex.org
and Mydex-Third Sector at http://thirdsector.mydex.org
Follow Mydex on: -
Twitter: http://www.twitter.com/mydexcic
Facebook: http://www.facebook.com/Mydex.org
Flickr: http://www.flickr.com/photos/mydexcic/
RSS feed: http://feeds.feedburner.com/Mydex
Google Plus: https://plus.google.com/u/1/104992390676431315997/posts
Personal Data Stores: Mydex Open Data Institute Midata Hackathon 17 November ...Mydex CIC
Presentation given by David Alexander Chief Executive Mydex Data Services at first ever midata hackathon organised by the ODI - Innovation around personal data - described by the WEF as the new asset class
For more information about Mydex, kindly visit http://mydex.org/about/
Or visit the developers site at http://dev.mydex.org
And to become a member of Mydex Personal Data Store, visit http://pds.mydex.org
Also learn more about Mydex-Midata at http://midata.mydex.org
and Mydex-Third Sector at http://thirdsector.mydex.org
Follow Mydex on: -
Twitter: http://www.twitter.com/mydexcic
Facebook: http://www.facebook.com/Mydex.org
Flickr: http://www.flickr.com/photos/mydexcic/
RSS feed: http://feeds.feedburner.com/Mydex
Google Plus: https://plus.google.com/u/1/104992390676431315997/posts
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...European Data Forum
Selected Talk by Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, Italy at the European Data Forum 2014, 19 March 2014 in Athens, Greece: Toward Personal Big Data passing through user Transparency, Control and Awareness: a Living-Lab Experience
Big But Personal Data: How Human Behavior Bounds Privacy and What We Can We D...freshdatabos
This document discusses how human behavior and mobility data can be used to uniquely identify individuals, even when names and phone numbers are removed. It shows that as few as four spatiotemporal points are enough to identify 95% of individuals in a dataset of 1.5 million people. Coarsening the data by lowering spatial or temporal resolution does not fully address this issue, as a few more data points would still allow re-identification. The document also discusses how metadata can be used to predict individuals' personalities and how this data could be used to map populations and model disease spread, if handled privately and securely through techniques like anonymization, behavioral indicators instead of raw data, and systems like openPDS that only share answers instead
Paywalls in Germany: Another Brick in the Paywall? Roman Abashin
Analysis of the German newspaper market and their implementation of paywalls. Mechanics and effects of paywalls. A business case for German newspaper «Die Zeit».
Five Misconceptions about Personal Data - Dataconomy Barcelona -Claro Partners Inc.
The vast amounts of personal data that we produce (email, text, search, payments...) has been triumphantly declared a “new asset class” by the WEF and compared to oil as the world’s newest economic resource. This has sparked a frantic race to gather it.
This gold rush obscures the real value of personal data, and forgets a fundamental rule of innovation: start with the person. Why has this basic principle been largely absent from our obsession with big data?
Internet of Things (IoT) y su evolución aplicada a la salud: Internet of Me -...GeneXus
Repasaremos el concepto de Internet of Things, su estado del arte y tendencias. Posteriormente se desarrollará la evolución de este concepto aplicado a la industria de la Salud donde se convierte en Internet of Me. Analizaremos su integración con la Historia Clínica Electrónica y sus perspectivas de aplicación en Uruguay.
This document summarizes a presentation on social physics from a service science perspective. The presentation covered several topics related to social physics including its history from Auguste Comte to modern data science applications. Specific concepts discussed include idea flows within organizations, the role of data in identifying tipping points, and how cognitive systems can augment human expertise. The presentation concluded with a discussion of IBM's Watson platform and how cognitive technologies may transform industries and jobs in the future.
10 trends reshaping digital - updated Q1 2016Beyond
This document summarizes 10 trends that are reshaping the digital industry in 2016. It discusses trends related to non-traditional user interfaces, virtual assistants, open data, the personal information economy, mobile commerce, the sharing economy, and virtual reality. It categorizes the trends as either "Trends to start thinking about", which are emerging ideas to consider, or "Trends to prepare for now", which brands need to actively prepare for in the near future.
E-co-innovation and Living Labs for educational e-servicesNoël Conruyt
This presentation about e-co-innovation for making e-services was made at the IEEE DEST conference on the 25th of July 2013 in Palo Alto, Silicon Valley: http://www.dest2013.digital-ecology.org
The video of the presentation is here:
http://www.youtube.com/watch?v=iCn15ELCm8w
It presents the concept of Living Lab and the instance that we developped in Reunion Island in the domain of education with ICT. The example of instrumental e-learning in music teaching and learning is given to explain our methodology and use of a creativity platform. In this presentation and associated paper, we stress the importance on dealing with know-how rather than knowledge with another method called Sign management for annotating scores with videos. Lastly, we introduce the Semiotic Web as a new paradigm for making education e-services.
Artur Serra, Deputy director i2CAT, presenting The city as a living lab: Barcelona's initiative during the ENoLL fringe session "Open Innovation and Living Labs shaping the cities and regions of the future" at the EC Innovation Convention 2014.
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
The document discusses information and identity protection solutions from Symantec. It covers the risks of data breaches, an information-centric security approach, and Symantec's portfolio of products that provide data loss prevention, encryption, and user authentication capabilities. The integrated suite helps customers gain awareness of sensitive data, protect it across networks and endpoints, and authenticate user identities.
While identity has not been considered a foundation of most security architectures, it is emerging as the key to reducing the risk of a breach. The Identity Defined Security Alliance is working to help organizations succeed in the battle to stay secure through providing community developed and practitioner approved best practices and identity-centric security controls and use cases. IDSA Executive Advisory Board member, Richard Bird, discusses why identity should be shaping the future of security and what the IDSA is doing to help practitioners succeed.
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
The document discusses information and identity protection solutions from Symantec. It outlines the key threats to data security, such as data breaches, non-compliance, and external attacks. It then describes Symantec's information-centric security approach and solutions portfolio, which includes tools for identity management, data awareness, and data protection through encryption and data loss prevention.
From Denver based identity and access management vendor Ping Identity comes this presentation explaining how financial services can benefit from identity management solutions.
Extending security in the cloud network box - v4Valencell, Inc.
This document summarizes a webinar on cloud security presented by representatives from 6fusion and Network Box USA. It discusses common cloud security myths, challenges related to access, protection, segregation and recovery of cloud data, and best practices for cloud security including implementing security by design, active monitoring and having an incident response plan. The webinar concluded by discussing developing a risk-based security framework and taking questions from attendees.
The document discusses identity and access management (IAM) and its relationship to cloud computing. IAM is the process of managing digital identities and access privileges for users, systems, and services. When using cloud computing, an organization relinquishes control over infrastructure but gains flexibility, scalability, and reduced costs. IAM becomes especially important in the cloud to ensure security, privacy, and compliance through features like authentication, authorization, and audit tracking across multiple cloud applications and services.
This document discusses key security considerations when selecting a cloud computing vendor. It outlines several criteria to evaluate including personnel security, legal issues, oversight of third party providers, and network security. Sample questions are provided for each criteria to assess the vendor's security practices, policies, and controls. The document advises going through the vendor selection process step-by-step while carefully evaluating each of the outlined security criteria.
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
1) Traditional identity and access management programs are facing pressures from increasing complexity, focus on the user experience, and new regulations.
2) Smart identity is needed to securely connect every user, API, and device to every application in and outside the enterprise in today's hybrid multicloud world.
3) IBM's identity and access management solutions include adaptive access to balance security and user experience, identity and privileged access management analytics to identify risks, and decentralized identity to enable user-owned digital identities.
We design and develop mobile apps across platforms for various applications including business information access, brand engagement, work processing, ecommerce, search, file sharing, education and entertainment.
An overview of current cyber security concerns and ways to combat them, as well as an introduction to some of the capabilities of Azure Active Directory
The document discusses IBM's Trusted Identity solution for self-sovereign identity. It proposes establishing a decentralized identity network based on principles of user consent, privacy, and interoperability. This network would provide convenience and security for individuals, businesses, and governments by enabling trusted digital identity verification and management across domains. Technical components include decentralized identifiers (DIDs), verifiable credential schemas, and an open-source Sovrin identity framework using distributed ledger technology.
Jan Keil - Identity and access management Facts. Challenges. SolutionTimetogrowup
This document discusses identity and access management. It begins by introducing the author and providing background on blockchain technology. It then discusses challenges with existing identity management systems like centralized servers and human errors. Blockchain is presented as a solution to issues like weak credentialing and data manipulation. The document outlines how blockchain could provide online passports for identification and give users control over their identity data. It also discusses using biometrics and knowing customer processes for identity verification. The role of access management in regulating user access is explained. Case studies on OAuth and Remme.io and how they utilize blockchain and tokens for decentralized identity and access management are presented.
Security Architecture Best Practices for SaaS ApplicationsTechcello
Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).
The document discusses criteria for selecting a virtual data room (VDR) provider. It highlights 7 key criteria: 1) security and confidentiality, 2) hosting and management, 3) service and support, 4) transaction speed, 5) deal communication, 6) document search, and 7) audit history. It then summarizes Merrill DataSite's advantages in each of these areas and positions it as a superior option to competitors by providing more robust features and capabilities.
Navigate provides information protection and privacy advisory services to help organizations manage risk and meet compliance requirements. Their mission is to help clients achieve business objectives through customized services. The company was founded in 2009 by an experienced chief privacy officer. Navigate differentiates itself by bringing seasoned experts with real-world experience to every engagement and focusing on pragmatic solutions rather than voluminous reports.
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
Every chain has its weak link. In any Information Security model it’s us, the users. So how do we strengthen a key area? In this session, we review common challenges and learn the strategies for bridging the gap in a secure but user-friendly way.
Presenter: Reinier van der Drift, Product Manager
Digital Retail Africa 2023 hosted by IT News Africa - Carrie Peter speaks on Balancing User Experience and Security Compliance at Scale at the Digital Retail Africa 2023 conference. #retailtech #ecommerce #customerexperience #onlineshopping #securitycompliance
Similar to Introduction to Mydex CIC Personal Data Stores - 7th March 2013 (20)
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
1. Your data, your way
Next Generation Identity, Digital Channel,
Integration and Application Platform Services
Transforming customer engagement and operating
costs
www.mydex.org - All right reserved
2. Who and What is Mydex about
• We are an asset locked UK social enterprise formed in 2007
• Our mission is to empower individuals to manage their lives more
effectively through convenient, trustworthy access and control of their
personal data and how it is used by them and others
• We will (have to ) reinvest 65% of any profits
• Education to support our social purpose
• Platform Development
• We are a trust framework and open platform
• Trusted Digital Identity and Personal Data Store
• Secure sharing of personal data via RESTful API
• We are live, we are free to Individuals
• We are ISO27001 certified company and service
www.mydex.org - All right reserved
3. The landscape we address are these needs and issues:
Individuals Organisations / Apps
• Cumbersome online access • Identity is a challenge
• Too many identities • Fraud prevention complex
• Time it takes to administer life • Operating costs increasing
• Fragmented information • Trust is eroding with individuals
• Customer churn & cynicism is
• Security threats
increasing / sourcing their own
• Time taken to complete basic solutions
tasks • Data volumes growing
• Lack of control of data exponentially
• Lack of knowledge about data • Analytics and insight incomplete
usage • Privacy laws, consent and data
• Inability to assert rights protection increasing focus
• Constant request for same • Lack of trusted digital channels
information again and again • Complexity of delivering solutions
www.mydex.org - All right reserved
4. Organisations we work with, need and seek:
• Identity Solutions
• Federated Login / Single Sign On
• Verified data attributes
• Certificates to support proofs of claims
• Low cost secure trusted channels
• Improve data quality / reduce sparsity
• Access richer / broader data
• Streamline customer journeys and flows of data
• Improve business process flows
• Applications that bridge traditional applications and organisation
boundaries
• Need to work inside and outside the organisation
• Need to include the citizen / customer
www.mydex.org
5. Application Developers are seeking:
• Reduced Risks and Costs
• Application development and delivery
• Data Storage and Security
• Built Data protection and privacy
• Low cost deployment
• Access to richer datasets and services
• Permissioned consent for use
• Trusted Identity and verified attributes
• Ability to extend schema’s to meet specific needs
• Open Environment with clear documentation
• Easy Integration
• Stable standards based API
• Sandbox to test concepts and ideas
www.mydex.org - All right reserved
6. Individuals want and need
• Convenience and ease of use
• Easy access to data, information and services
• Little or no data entry
• By-product of daily living
• Apps and Tools that
• Save them time
• Provide Insight and understanding
• Keep them safe
• Ability to get basic tasks done easily
• Simplify administration
www.mydex.org - All right reserved
7. Mydex Platform delivers benefits to all
Benefits Individual Organisations App
Developers
Trusted Identity Yes Yes Yes
Cost Savings Yes Yes Yes
Time savings Yes Yes Yes
Reduced risk of fraud, increase in Yes Yes Yes
trust and security
Increased insight and analysis Yes Yes Yes
New income streams Yes Yes Yes
Increased speed in transactions Yes Yes Yes
Increased Convenience and ease of Yes Yes Yes
transacting
www.mydex.org
8. Convenience, Trust, Security = Empowerment for individual
Cost savings, increased transaction speed, reduced risk, improved
insight and engagement = ROI for organisations
THE MYDEX PLATFORM A TRUST FRAMEWORK
www.mydex.org
9. Our ISO27001 Certification describes Mydex in the
following way….
"The provision of secure digital storage
areas to individuals to enable them to
manage their personal data and identity,
which they can send and receive, under
their control, with connecting organisations
and applications they have
authorised accordingly"
www.mydex.org
10. Mydex provides a Trust Framework as a platform
Policymakers
Mydex Charter | Terms for Members | Terms for Connections
Data Sharing Agreement | ISO27001 | tScheme
Relying Parties
Application Attribute Providers
Service Providers Attribute Verifiers
Trust Framework
Provider and platform
Unique Secure Encrypted
Connections
Mydex Members
www.mydex.org Personal Data Services
11. Mydex offers three core services to organisations
anywhere in the world in any language
• Secure consumer digital letterbox / data channel
• Distribution, Synchronisation, Engagement, Verification
• Managing Data Protection & Permissioning requirements
• Identity Services
• Registration, Federated Identity / SSO, Assurance
• Application Platform
• Integration, New Customer Journeys
• In platform / Out platform deployment
www.mydex.org
12. We do not provide any of the services above the line
Our focus is the platform that makes it all possible
BPO / BPM Integration BPR
Applications Consulting Trusted Advisor
The Mydex Platform – it's open, it's simple.
We sell connections to the platform to organisations.
We provide people with a Personal Data Store for free.
We make a % on transactions across the platform.
www.mydex.org
13. Our commercial model is low cost pay as you go, designed
for sustainability and ease of adoption
Individuals Organisations / Apps
• Mydex provides service free • Low cost connection fee to the
• No hidden clauses platform per system + per
• No data rights for Mydex
• No access to their data without
individual connected
permission • Annual support fee 25% of
• Education programme to connection fee
explain personal data, privacy • Small share of any charges
security and how to control and across the platform
manage their personal data • No cost to become a developer
• Community engagement or use sandbox
• Features • Open data schema
• Data attributes • Strong identity and connection
• Education needs verification, certification and
testing of apps and
connections
www.mydex.org
15. We provide individuals with a hyper secure personal
data service and enduring digital identity
www.mydex.org
16. It stores any aspect of an individual's life and can be
organised how they wish
It allows the individual to acquire data,
proofs of claim and verifications about
any aspect of their life and identity and
share with whom they wish in a secure
manner
www.mydex.org
17. There are many dimensions to an individuals personal
data which can be stored, curated and shared under
their control
Preference
Intentions
Status
Rights
Relationships Credentials Evidence
Management
Employment Transaction Consumption
Career Repository Activity
Term
Contracts Social
Views/ opinions
Conditions Stream Likes / dislikes
www.mydex.org
18. A Personal data store connects individuals to all
aspects of their life, interactions and activities
Health
Social
Care
Network Voluntary
Culture & Charity
Art
Education
Professional Homes & White goods / age / spec
Exam Assets Size / rooms /
Expenditure / Income Finance Tax & Benefits
Equipment / Assets Purchases Benefits Entitlement to Low energy tariff
www.mydex.org
19. Integrating data from multiple sources is complex to do
manually. A Mydex personal data store makes it easy.
Benefits to individuals NHS No: / CHI #
• Convenience Culture / Art • Health & Social care
• Security • Museums / Theatre / Galleries • Community pharmacy
• Trust • Music / Video / Film
MydexID
Benefits to Organisations • Registration; Identity;
• Reduce cost Exam boards / SQA #
• Employability • Authentication;
• Improved service • Digital letter box
• Better insight • Qualifications updates
• Personal Directory
• Improved engagement
Property ref #
• Housing & Council Tax benefits
• Housing Association transactions
Outcomes for the citizen • Manage property
DWP NI #
• Empowerment • Universal credit
• Citizen / community HMRC UTR #
• Control / flexibility Networks
• Personalisation Professional Bodies
• BBC Alumni
• Enduring Lifelong repository • Facebook • CPD Records
• Safety / Security • Twitter • Qualifications
• LinkedIn • Charities
Supports policy and reform elements
• Young Scot / NEC / CA • Voluntary support orgs
• Digital first • Sky / C4 /ITV / C5 • SCVO
• Preventative Spending • LTCAS
• Public value (co-production) • Disability rights UK
• Localism ; self directed support • Bank / Credit Union / Building Society • ACEVO
• Personal responsibility • Insurance Policies / Pensions • NCVO
• Digitised UK • Energy / Telco / Retail / Transport
www.mydex.org
21. Our platform delivers a persistent trusted connection between any
organisation and the individual for permissioned two way data and
exchange and interactions
Customer can select the specific
data attributes they wish to share
www.mydex.org on what basis
22. The Mydex Platform works seamlessly within context of the
Cross Government ID Assurance programme objectives
DWP Contract Award Scope
• Identity Assurance 21m people
• Control access to online services
• Pilots April 2013 / Live October 2013
• Framework Contract to offer:-
• Same services to 17 Government
departments
• 56m people in UK
• Business Identity in scope for future
www.mydex.org
23. Platform essentials Built from the start establish trust
between parties within a secure environment
• Scalable Cloud Infrastructure
• IL2 > 3
• ISO 27001
• OIX / tScheme
• Unique identities
• 256 PDS Encryption
• PDS can be stored anywhere
• Multifactor authentication
• PKI
• SAML / OAUTH
• OpenID / Mozilla Persona
• RESTful API json / XML / yaml
• Open Source / Standards
• Totally UK designed, developed
www.mydex.org and operated
24. Platform essentials - any device, any OS, any Language -
Standards based API
ely
uniqu
a l and
dividu idual
PD S is in y the indiv
Each crypted b
en
HTTPS
RESTful API
json/xml/yaml
api key
ConID
UID
www.mydex.org - All right reserved
25. Our platform is hyper secure but open to innovation from
anyone who can verify their identity and intentions
www.mydex.org
26. Open: We have full documentation, API and sandbox for
development and testing of connections and apps
www.mydex.org
27. Clarity about the role of personal data stores is
emerging in many areas
www.mydex.org - All right reserved
29. Return on investment is straightforward and significant for
all organisations
Measures Transactions Impacted
• Cost savings • Billing
• Print and Postage • Collections
• Data management • Transaction history
• Front line service centres • Receipting
• Systems Development / • Forms processing
Integration
• Quotations
• End to end transaction execution • Contract and Tariff Management
• Compliance • Call Centre traffic
• Risk reductions
• Face to Face traffic
• Improved Compliance
• Issue Management
• Improved Data Quality
• Reduced Data sparsity
• Inbound communications
• Improved Customer satisfaction • Outbound communications
• Improved retention • Risk Management
• Verification Services
www.mydex.org
30. Mydex is one of the key solutions to achieving UK
Government strategy
• £20 Billion per annum savings needed in government
• Protect frontline services
• Make services sustainable, flexible, adaptable
• Deliver, simpler, clearer, faster solutions and services
• Redesign transactional services
• Start with needs and centre on the citizen - empower them
• Easy access digital services make digital channel most attractive
• Increased adoption rates
• Accessible for the infrequent user
• Remove barriers, improve decisions
• Increase clarity and understanding of communications
• Export our experience and expertise
• Stimulate innovation and growth
www.mydex.org