SlideShare a Scribd company logo
The Blockchain &
Identity -- Privacy
Issues and the
Implications for
Government Oversight
and Control.
Grant Fondo
Goodwin Procter LLP
gfondo@goodwinlaw.com
Our Current System of Identity
1
• Pretty Awesome right?
• Different passwords for every darn website I use
• Security questions
• Driver’s license
• Photo Id
• Social Security No.
• Ask yourself
• Do you like it that Google knows more about you than your spouse?
• Does a bartender need to know where I live?
• Does Amazon really need to know my mother’s maiden name? My favorite
pet?
• Why do I need a driver’s license, a SS card, and a passport?
• How easy is it to buy a SS#?
The Gov’t Silos Information,
Usually Not By Design
2
Estonia Model
3
• Estonian ID card
• Identity for private uses
• Mortgage information
• Medical information
• Identity for public uses
• Tax information sent for tax returns
• Trains
• Citizens “owns” data, controls access
• Gov’t employee ID needed to access information, logs who
accesses information
U.S. Privacy Laws Protect Types of “Information”
Not You
4
• Health Insurance Portability and Accountability Act – Medical
Records
• Stored Communications Act – email content
• Fair Credit Reporting Act – accuracy of financial information
Government’s Ability To Access Data
5
• We don’t trust government – 4th Amendment
• NSA & Foreign Intelligence Surveillance Act orders
• NSA given a “court order” for an internal NSA search engine to collect
billions of phone and internet records and contains the unfiltered private
information of millions of Americans.
• Riley v. CA (U.S. 2014):
• Historically police could search cell phones without a search warrant
• Smartphone searched – illegal search and seizure?
• S. Ct: SW needed to search a smartphone
• Phone equivalent to a person’s home office & more
• U.S. v. Apple
• All Writs Act
• San Bernardino killer’s IPhone 5c
• Gov’t tried to compel Apple to help it write software to disable a security
function
Government’s Ability To Access Data
6
• Microsoft v. U.S., 14-2985 (2d Cir. 2016)
• Warrant issued for data
• Data stored in Ireland
• U.S. Government had no authority under the Stored Communications Act
(“SCA”) to use a warrant to access data stored overseas.
• Proper nexus for jurisdiction: where the data is stored, rather than the
location of the service provider or the data’s owner.
• U.S. v. Google (EDPA Feb. 2013)
• SCA
• Transferring emails from a foreign server so FBI agents could review them
locally as part of a domestic fraud probe did not qualify as a seizure
• Court: There was "no meaningful interference" with the account holder's
"possessory interest" in the data sought.
• “Though the retrieval of the electronic data by Google from its multiple data
centers abroad has the potential for an invasion of privacy, the actual
infringement of privacy occurs at the time of disclosure in the United States,"
Seriously, Do You Really Want A Digital Identity?
Your
Digital
Identity
CIA
Local
Sheriff
IRS
Depart. Of
Homeland
SecurityFBI
Treasury/
FinCEN
Digital Identity Would Make Things
Easier For You . . . And the Gov’t
8
One-stop
Shopping
for the
Feds
And Hackers?
• Likely harder to breach . . . but
• One-stop shopping for hackers
• Foreign governments
• Criminals
• One mistake = big problem
9
Why Do You Think It Is YourDigital Identity?
10
• U.S. Government owns your passport
• CA owns your driver’s license
• Cannot sell your SS card
Certainly Benefits
• KYC & AML compliance savings
• Less Id to carry
• Blocking transfers to bad guys easier
• Transparency
• Easy to track transaction records
11
12

More Related Content

What's hot

The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
ARDC
 
Lookup public record 2
Lookup public record 2Lookup public record 2
Lookup public record 2
milika8666
 
Consent Management Platform
Consent Management PlatformConsent Management Platform
Consent Management Platform
Martyn Ripley
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Absolute LoJack
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
Deborah Gonzalez, Esq.
 
How to implement GDPR for the public sector, December 2017
How to implement GDPR for the public sector, December 2017How to implement GDPR for the public sector, December 2017
How to implement GDPR for the public sector, December 2017
Browne Jacobson LLP
 
The digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigationsThe digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigations
ICFECI
 
Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - Kloudlearn
KloudLearn
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
pii2011
 
Us action against st lucia may be connected to visa revocation
Us action against st lucia may be connected to visa revocationUs action against st lucia may be connected to visa revocation
Us action against st lucia may be connected to visa revocation
UnitedPac Saint Lucia (Conservative Movement)
 

What's hot (12)

The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
Lookup public record 2
Lookup public record 2Lookup public record 2
Lookup public record 2
 
Consent Management Platform
Consent Management PlatformConsent Management Platform
Consent Management Platform
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
How to implement GDPR for the public sector, December 2017
How to implement GDPR for the public sector, December 2017How to implement GDPR for the public sector, December 2017
How to implement GDPR for the public sector, December 2017
 
The digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigationsThe digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigations
 
Chapter2
Chapter2Chapter2
Chapter2
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - Kloudlearn
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
 
Us action against st lucia may be connected to visa revocation
Us action against st lucia may be connected to visa revocationUs action against st lucia may be connected to visa revocation
Us action against st lucia may be connected to visa revocation
 

Similar to The Blockchain and Identity -- Grant Fondo, Goodwin Proctor

Privacy & Transparency in Digital Life
Privacy & Transparency in Digital LifePrivacy & Transparency in Digital Life
Privacy & Transparency in Digital Life
Susan Price
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
centralohioissa
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anitafin
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
jatharrison
 
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEEDGDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
Joe Orlando
 
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
ForgeRock
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Bradley Buchanan
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
Joshua Johnston
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
Gary Kazmer
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?
Facundo Mauricio
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
Nicole Fucile-Borsian
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
Michael C. Keeling, Esq.
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
raminder12_kaur
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
Quatrro Processing Services (QPS)
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
TechSoup Canada
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
amprivacy
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
fmi_igf
 

Similar to The Blockchain and Identity -- Grant Fondo, Goodwin Proctor (20)

Privacy & Transparency in Digital Life
Privacy & Transparency in Digital LifePrivacy & Transparency in Digital Life
Privacy & Transparency in Digital Life
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEEDGDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
 
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 

Recently uploaded (12)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 

The Blockchain and Identity -- Grant Fondo, Goodwin Proctor

  • 1. The Blockchain & Identity -- Privacy Issues and the Implications for Government Oversight and Control. Grant Fondo Goodwin Procter LLP gfondo@goodwinlaw.com
  • 2. Our Current System of Identity 1 • Pretty Awesome right? • Different passwords for every darn website I use • Security questions • Driver’s license • Photo Id • Social Security No. • Ask yourself • Do you like it that Google knows more about you than your spouse? • Does a bartender need to know where I live? • Does Amazon really need to know my mother’s maiden name? My favorite pet? • Why do I need a driver’s license, a SS card, and a passport? • How easy is it to buy a SS#?
  • 3. The Gov’t Silos Information, Usually Not By Design 2
  • 4. Estonia Model 3 • Estonian ID card • Identity for private uses • Mortgage information • Medical information • Identity for public uses • Tax information sent for tax returns • Trains • Citizens “owns” data, controls access • Gov’t employee ID needed to access information, logs who accesses information
  • 5. U.S. Privacy Laws Protect Types of “Information” Not You 4 • Health Insurance Portability and Accountability Act – Medical Records • Stored Communications Act – email content • Fair Credit Reporting Act – accuracy of financial information
  • 6. Government’s Ability To Access Data 5 • We don’t trust government – 4th Amendment • NSA & Foreign Intelligence Surveillance Act orders • NSA given a “court order” for an internal NSA search engine to collect billions of phone and internet records and contains the unfiltered private information of millions of Americans. • Riley v. CA (U.S. 2014): • Historically police could search cell phones without a search warrant • Smartphone searched – illegal search and seizure? • S. Ct: SW needed to search a smartphone • Phone equivalent to a person’s home office & more • U.S. v. Apple • All Writs Act • San Bernardino killer’s IPhone 5c • Gov’t tried to compel Apple to help it write software to disable a security function
  • 7. Government’s Ability To Access Data 6 • Microsoft v. U.S., 14-2985 (2d Cir. 2016) • Warrant issued for data • Data stored in Ireland • U.S. Government had no authority under the Stored Communications Act (“SCA”) to use a warrant to access data stored overseas. • Proper nexus for jurisdiction: where the data is stored, rather than the location of the service provider or the data’s owner. • U.S. v. Google (EDPA Feb. 2013) • SCA • Transferring emails from a foreign server so FBI agents could review them locally as part of a domestic fraud probe did not qualify as a seizure • Court: There was "no meaningful interference" with the account holder's "possessory interest" in the data sought. • “Though the retrieval of the electronic data by Google from its multiple data centers abroad has the potential for an invasion of privacy, the actual infringement of privacy occurs at the time of disclosure in the United States,"
  • 8. Seriously, Do You Really Want A Digital Identity? Your Digital Identity CIA Local Sheriff IRS Depart. Of Homeland SecurityFBI Treasury/ FinCEN
  • 9. Digital Identity Would Make Things Easier For You . . . And the Gov’t 8 One-stop Shopping for the Feds
  • 10. And Hackers? • Likely harder to breach . . . but • One-stop shopping for hackers • Foreign governments • Criminals • One mistake = big problem 9
  • 11. Why Do You Think It Is YourDigital Identity? 10 • U.S. Government owns your passport • CA owns your driver’s license • Cannot sell your SS card
  • 12. Certainly Benefits • KYC & AML compliance savings • Less Id to carry • Blocking transfers to bad guys easier • Transparency • Easy to track transaction records 11
  • 13. 12