Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Section
Column
width70%

This DG - National Strategy for Trusted Identities in Cyberspace operates under the Kantara Initiative IPR Policies - Option Creative Commons Attribution-Share Alike

CHARTER | JOIN THE NSTIC DG | SUBSCRIBE | MAILMAN ARCHIVE | GOOGLE ARCHIVE

 

Panel
titleLatest Review Draft:

Latest Draft Work:

Panel

The NSTIC DG has APPROVED the Kantara Initiative NSTIC Discussion Group's response to the Department of Commerce's Notice of Inquiry concerning Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace v2.0.0.

References:

Background:

The US Government through the National Institute of Standards and Technology (NIST) has released the National Strategy for Trusted Identities in Cyberspace (NSTIC) vision, mission and goals. This strategy has a goal to foster a public/private partnership where industry and communities come together to solve the issues identified in the NSTIC to create and identity ecosystem which enables web service interactions to be:

  • Faster: Once you use your credential to start an online session, you would not need to use separate usernames and passwords for each Web site. For example, your computer or cell phone could offer your "trusted ID" to each new site where you want to use the credential. The system would work much like your ATM card works now. By having the card and a PIN you can use your ATM card all over the world. By having a credential and a password you would be able to use your trusted ID at many different sites. This saves you time while enhancing security. No more searching in your drawer for your list of passwords.
  • More convenient: Businesses and the government will be able to put services online that have to be conducted in person today like transferring auto titles or signing mortgage documents.
  • Safer: Your trust credential will foil most commonly used attacks from hackers and criminals, protecting you against theft and fraud, safeguarding your personal information from cyber criminals.
  • Private: This new "identity ecosystem" protects your privacy. Credentials share only the amount of personal information necessary for the transaction. You control what personal information is released, and can ensure that your data is not centralized among service providers.
  • Voluntary: The identity ecosystem is voluntary. You will still be able to surf the Web, write a blog, participate in an online discussion, and post comments to a wiki anonymously or using a pseudonym. You would choose when to use your trusted ID. When you want stronger identity protection, you use your credential, enabling higher levels of trust and security.

The NSTIC program office team from time to time releases a Notice of Inquiry (NOI) and/or comment period where comments are solicited from industry and communities as input to the NSTIC team for consideration.

It is anticipated that this DG will be comprised of stakeholders who represent area segments including: industry, user-centric, consumer, public policy, privacy, governance and international.

Column
width5%
 
Column
width25%
Interim Chair:

Richard Wilsher, Zygma

Secretary:

open

Dial-In:

DAY: TBD

TIME: TBD

Navigate space

Page Tree Search
Page Tree

...