Project Management

Identifiers and Authentication - Smart Credential Choices to Protect Digital Identity

Date Added: Sep 2009
Format: PDF

In a digital age, the reality is that simple identifiers (e.g., e-mail addresses, login names, and identification numbers) are used without any protection and should be considered public information even though they point to a specific individual. In addition to the increase in public exposure of such data, the provisions of ownership of personal identifiers have not been effectively addressed, and there is a lack of legal infrastructure today to ensure the privacy of such information.