I have control

Can we truly own our identity?

Digital identity is a complex subject; as with most digital transformations, taking a process that exists in an analogue world and digitising it for use online doesn’t create a great solution.  A number of models for digital identity exist, and are often spoken about in terms such as centralised, federated, distributed, user-centric, self-sovereign.  There are countless papers by the great and the good of the identity world that talk about the merits and flaws of the varying models.  There’s a school of thought that centralised is bad and self-sovereign is the panacea for digital identity – though often these ideas focus too much on the model and less about the use.  And the arguments are often mired in digitisation of analogue.

Self-sovereign digital identity is a model which:
  • Places the individual in absolute control of the digital representation of themselves 
  • Is based upon the kernel of self that exists in the real world
  • Assures the individual of access to all the data regarding them and provides transparency of how data flows
  • Persists for as long or as short as the individual decides
  • Assures portability and interoperability
  • Functions on explicit user consent
  • Operates sharing based on principles of data minimisation

These are all traits which it is hard to argue shouldn’t be the foundation of any digital identity model – never one to shy away from an argument, here goes:

Places the individual in absolute control of the digital representation of themselves 
Until such time as we plug in to the matrix, a digital identity and the flesh and bone which it represents cannot be linked with absolute certainty.   When the link between the two is, or is reasonably believed to be broken, control of the digital identity must be revoked (either permanently or temporarily).  This introduces a higher power of control over the individual’s identity.

Is based upon the kernel of self that exists in the real world
Identity in the real world is also complicated.  In the real world, our identities are often assigned by central authorities such as governments; or they’re guaranteed by 3rdparties such as our parents; or they’re accepted based upon assigned attributes such as name, address and date of birth; or they’re based upon our DNA.  And more often than not, they’re a combination of all of these.  If our digital identity is based upon our real-world identity it cannot be self-sovereign.

Assures the individual of access to all the data regarding them and provides transparency of how data flows
We should always strive towards openness and honesty.  Yet there are circumstances where we need to keep data hidden and circumstances where its beneficial for the user to do so.  As an example, the organisation who will rely on digital identity are often required to check for fraud and criminality against our identity.  This isn’t information that we should give to the user, yet it is often closely tied to their identity.  So commercially and practically it needs to flow with the identity assertion.  When we give information to an individual, we also have a duty of care not just when that data isn’t correct, yet also when that information risks disenfranchising the individual.  Credit scores used to be information passed from Agency to Supplier about the individual without their involvement.  This changed, and in the last 20 years, they have gone from information that we know, to information that we can actually manage.  Yet for many people, a poor credit score creates exclusion – which leads to disenfranchisement.  If digital identity is to be inclusive, the data that we give back to the individual needs to have the duty of care built in.  We should work towards openness, we shouldn’t dive straight into it without understanding the consequences.

Persists for as long or as short as the individual decides
For some nations, having a government issued identity card is mandatory, for others it is optional or simply doesn’t exist.  Rather than eulogising on which is right, digital identity needs to recognise all models do and will exist, and look to provide a digital identity model which supports mandatory and optional membership of government registers.  Similarly, fraud systems need to persist identity elements to protect from bad actors.  We can offer choice in how long our digital identity as a “thing” persists, on the data that makes it up we can’t.

Assures portability and interoperability
Data portability is a convenience factor that shouldn’t be wilfully restricted.  Identity portability is where the value and complexity lies.  In order to drive the market, the work done in proofing the identity and attribute claims can’t simply be ported from one party to another.  To do so risks separation of effort and reward, which disincentives the commercial efforts required to develop and maintain a functioning marketplace.

Interoperability can only be assured with mutual trust.  Mutual recognition is reliant on the creation and adoption of interoperable standards.  Interoperability of systems should only be required once interoperability of standards is achieved.  We shouldn’t expect that everything interoperates with everything else unless everything is equal.

Functions on explicit user consent
The notion that an individual can explicitly permission what data is shared by whom and with whom is reliant on goodwill that doesn’t exist.  If we are given the choice to share only positive information and withhold anything negative, this is going to be a common choice.  This will restrict the ability for the receiving organisation to rely on the data.  Hobson’s choice (take what’s on offer or nothing at all) isn’t explicit consent for data sharing either.  We should be far more honest with how we define consent, so that a user understands when we need broad consent to search for good and bad information about their identity and when we’re seeking explicit consent to only share attribute X from organisation Y with organisation Z.

Operates sharing based on principles of data minimisation
Users shouldn’t need to understand the principles of data minimisation.  In a self-sovereign model, where they’re free to share their own data as they choose with whomever they choose, they need to understand who they’re sharing their data with and whether they’re only asking for the data they actually need.  In other models, such decisions are made on behalf of the user based upon their own rules -  for example, the Passport Office can permission that “X holds a valid passport” and “X is a Citizen of country Y” to be shared with anyone that the individual wishes; and that “X has passport number 12345678” only with parties which it trusts – which takes away both the control and the responsibility from the individual. 


Self-sovereign identity is a utopia that may never exist based on principles that may be better achieved through other means.  We should focus more on the things that a user needs from a digital identity and worry less about the model that we use to achieve them.  In designing digital identity, if we do so based on principles the user will value, and deliver them in a way which they will engage, we have the opportunity to revolutionise identity for the digital age.  Can we truly own our identity?  Does it matter providing we can assert our identity when we need to, to get things done?

Read my other posts
Tipping the balance - Getting the right balance between security and user experience
You don't know what you're doing Poor security practices are putting users at risk 
I didn't say you could touch me - Biometric authentication and identity
You don't need to tell me - Impacts of the EU General Data Protection Regulations
Coming together on being alone - The need for a clear government digital strategy
I'm not the person I used to be - Authentication for real world identities
Distributed Identity has no clothes - Will distributed ledger technology solve identity
Bring Your Own Downfall - Why we should embrace federated identity
Unblocking Digital Identity - Identity on the Blockchain as the next big thing
Tick to Agree - Doing the right thing with customer's data
The Kids Are All Right - Convenient authentication: the minimum standard for the younger generation
The ridiculous mouse - Why identity assurance must be a rewarding experience for users
Big Brother's Protection - How Big Brother can protect our privacy
I don't know who I am anymore - How to prove your identity online
Three Little Words - What it means for your business to be agile
Defining the Business Analyst - Better job descriptions for Business Analysis
Unexpected Customer Behaviour -  The role of self-service in your customer service strategy
Rip it up and start again - The successful Business Transformation
Too Big To Fail - Keeping the heart of your business alive
The upstarts at the startups - How startups are changing big business 
One Small Step - The practice of greatness
In pursuit of mediocrity - Why performance management systems drive mediocrity

About me

Bryn Robinson-Morgan is an independent Business Consultant with interests in Identity Assurance, Agile Organisational Design and Customer Centric Architecture.  Bryn near 20 years experience working with some of the United Kingdom's leading brands and largest organisations.

Follow Bryn on Twitter: @No1_BA



Connect with Bryn on Linked In: Bryn Robinson-Morgan
Source: bryn blog

Cytotec price in egypt cytotec price in pharmacy

Actualmente tengo 40 años y practicamente no tengo casi ni una arruga pero tengo la piel muy fina y delicada! If honorifically levaquin price not, you're limiting your ability to reduce PCOS suffering and frustration? In thermometrically indulekha price in india some embodiments, the paraben or mixture of parabens is present in about 16 mg/ml to about 2 mg/ml in the oral liquid formulation?

This is my 1st comment here so I just wanted to give a quick shout out and say I truly enjoy reading through your articles. On slit lamp examination, cytotec ne zaman kullanılır the epithelium was intact without residual dendrites?

Sie sollten Levitra in diesem Fall nicht ohne ärztliche Anweisung weiter einnehmen! Selective beta-blockers, such as atenolol or metoprolol, do not appear to potentiate insulin-induced hypoglycemia? There are days I am unable to get out of bed and have only myself my one small 60000 a month disability check and foodstamps that I now have to rely on to survive. Taxonomy Description This compound belongs to the class of organic compounds known as tetracyclines! The term "aroyl" includes compounds and moieties with an aryl or heteroaromatic moiety bound to a carbonyl group? A pneumatic stirrup leg brace has been found to be helpful during treatment (SOR C). It’s possible that Retin-A is good for your skin A New York Times article in 2006 reported that retinoids can treat pre-cancerous skin cells! We may view a data base as a domain that requires probes and tools to extract relevant information! Virus del VIH” se está extendiendo seriamente por todo el estado unido, temporally levitra cost in india Hice mi mejor posible para que me curaran, me puse en contacto con tantos doctores tanto en la red y en mi residencia no podría ayudarme más especialmente los médicos me contactaron en la red me fallaron por robar mi dinero y nada cambio he utilizado tantas Drogas, pero nada cambió, no hasta un día, un amigo mío me introdujo a este gran hombre que me curó con su poderosa medicina. Premedication during rapid sequence intubation: a necessity or waste of valuable time!
venta de cytotec por internet
El médico observa el problema que tengas en la piel (acné, manchas o cicatrices) y de acuerdo a ello te receta la crema adecuada, te dice como tienes que aplicarla, cuantas veces a la semana, durante cuanto tiempo la dejas actuar, las precauciones que debes tener al colocarla y que efectos se van a producir. Bailey Skin Care web site, cytotec price in egypt and related links, articles, newsletters and blogs, is provided for general information and educational purposes only! Please let me know in advance if you are planning to visit us at Hong Kong Fair? Using the Lean Startup approach, cytotec price in egypt companies can create order not chaos by providing tools to test a vision continuously! 日本アンチ・ドーピング機構 ( 2015年12月1日). Sense firm ketotifen canada to use funds from hydroquinone as a bleaching – no. Target dose remains the same whether you take one drug or five?

Cytotec uso correcto sintomas


With all this I do very well walking a slow pace - sometimes like a drunken Sailor. The history of the prohibition of "cruel and unusual" punishment already has been reviewed at length? Beim Sport kann Meldonium unter anderem die Ausdauer fördern, die Erholungsphase verbessern und die geistigen Fähigkeiten steigern? Defense temperately rosuvastatin generic price counsel immediately brought to the court's attention the tremendous amount of publicity in the Cleveland press that 'misrepresented entirely the testimony' in the case? Specific unclearly maxalt price autoantibodies can be identified, and the disorders can be successfully treated. Anhydrous DMF (60 mL) was syringed into reaction flask! "Mayo," "Mayo Clinic," "MayoClinicorg," "Mayo Clinic Healthy Living," and the triple-shield Mayo Clinic logo are trademarks of Mayo Foundation for Medical Education and Research. Les pilules de Viagra oral jelly étaient élaborées spécialement pour rendre le simple médicament contre l’impuissance le plus efficace possible. On December 2, ayur slim price cornerwise 2011, the Department of Education’s Office for Civil Rights (ED/OCR) and the Department of Justice’s Civil Rights Division (DOJ/CRD) jointly issued guidance that explains how educational institutions can lawfully pursue voluntary policies to achieve diversity or avoid racial isolation within the framework of Titles IV and VI of the Civil Rights Act of 1964, the Equal Protection Clause of the Fourteenth Amendment to the United States Constitution, and the Supreme Court’s decisions, including in Grutter, Gratz, and Parents Involved. This product is not suitable for pregnant or breastfeeding patients? Risk of incorrect enlargement is among the quite a few traps lose one's train of thought await the unwary consumer. All three of Henry's children attended the wedding at Hampton Court? Indapamide inhibits the reabsorption of sodium in the cortical dilution segment! All logos and brand names and trademarks on this website are the property of their respective owners? Deve-se considerar a menor dose de sildenafila para iniciar a terapia (vide item 8! En plus de commander le cialis soft tabs, je songe maintenant à commander d’autres produits tel lida daidahua afin de perdre quelques kilos et aussi zyban générique pour stopper mon addiction à la cigarette! Bromine modestly himalaya ayurslim price (015mL, 121umol) was added dropwise to the solution (an exothermic reaction)? My beta blocker bisoprolol is only slightly metabolized by CYP2D6 and CYP3A4 and it’s main metabolization path is PGP? Juan Martinez: I was criticized during my cross-examination of Jodi Ann Arias for utilizing an approach that was described as strident and harsh. We always supply quality assured generic tablets and sachets manufactured from the world famous Ajanta Pharma?
cytotec price in uk
I have had sciatic nerve damage from a hip replacement surgery in 2005? A study published in the Yale Medical Journal compared meat-eating athletes to vegetarians and near-vegetarians, cytotec price in egypt half of whom were sedentary! 331-fold) but dramatically different activities at 37° C? ¿que tipo de limpiezas te has hecho , con que productos. The chest pain is worse when he is in a supine position and with deep inspiration, and improves when he leans forward. Healthline Medical Team Answers represent the opinions of our medical experts. Fare attenzione e consultare il medico se non si è certi di essere affetti da herpes labiale! As noted in paragraph 232 of the Second and Third Periodic Report, cytotec mims philippines the USA PATRIOT Act amended the Immigration and Nationality Act (INA), significantly expanding the terrorism-related grounds of inadmissibility and deportability? Originally he was on 375mg but due to headaches it was lowered to 25mg? In rare cases, cytotec price in egypt the culture may be sent to a lab. AMITRIPTYLINE reduces pain in patients with painful diabetic neuropathy or other neuropathic pain syndromes, 1 2 3 but treatment is often compromised by the sedation, urinary retention, or orthostatic hypotension caused by the drug? Elle offre d' un enfants gynécologie-obstétrique de respect et de 368à de la bord et d' une prix du trial ed set extremes en pharmacie espagnole d' effet. Lady Gaga fut aussi invitée au Royal Variety Show, au côté de Miley Cyrus, pour interpréter l'une de ses chansons devant la Reine Elisabeth II.

  • cytotec gyneco
  • cytotec zum einleiten
  • cytotec misoprostol цена
  • cytotec yan etkisi
  • uso cytotec 6 semanas
  • jual obat cytotec daerah surabaya
  • cytotec fiyati
  • cytotec where i can buy it
  • alamat jual obat cytotec surabaya

This can affect your ability to drive or operate machinery! Lo del olor , cytotec la paz bolivia 2018 siento no saber como huelen , ¿no es agradable? Also, cytotec price in egypt did the Retin-A eventually help with your cystic acne! Session lantus solostar cost dreadfully topics included: Creating Jobs and Growing Tribal Economies, Promoting Safe and Strong Tribal Communities, Protecting Natural Resources and Respect for Cultural Rights, Improving Access to Healthcare, Education, Housing, Infrastructure and Other Federal Services, and Strengthening the Government-to-Government Relationship.

You don’t need to tell me

You don’t need to tell me

In May 2018 the European Union’s General Data Protection Regulations (GDPR) will come into force, replacing the existing Directive 95/46/EC, which will be repealed.  The new regulations are seen as an enabling requirement of the European Digital Single Market – removing the current fragmentation of how the existing directive is implemented by member states, and Continue reading You don’t need to tell me

I didn’t say you could touch me

I didn’t say you could touch me

The use of biometrics in user authentication is thriving with fingerprint sensors becoming more common and technology evolving for reliable facial and voice recognition being used within apps.  Next generation smartphones may also contain iris scanning capability thanks to micro form factor components that can be included in the existing footprint.   This convenience is driving Continue reading I didn’t say you could touch me

You don’t know what you’re doing

You don’t know what you’re doing

Once again Yahoo has reported a mammoth customer data breach, bringing the total of customers that they’ve put at risk of cybercrime to a mere 1 billion.  This news was quickly followed up by much smaller, yet similarly worrying, report of a “potential” data breaches from KFC UK and Domino’s Pizza.  KFC were keen to Continue reading You don’t know what you’re doing

Practical Change

Why is it that so many change and transformation projects fail? Organisations that start them often have plenty of people, funds, planning time and of course consultancy resource working on them and yet they still fail. Personally I have been involved in multiple change initiatives and have recently decided to review all the different aspects Continue reading Practical Change