Project Management

Identifiers and Authentication - Smart Credential Choices to Protect Digital Identity

Free registration required

Executive Summary

In a digital age, the reality is that simple identifiers (e.g., e-mail addresses, login names, and identification numbers) are used without any protection and should be considered public information even though they point to a specific individual. In addition to the increase in public exposure of such data, the provisions of ownership of personal identifiers have not been effectively addressed, and there is a lack of legal infrastructure today to ensure the privacy of such information.

  • Format: PDF
  • Size: 321.7 KB