Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Registrar - Consent by Default Code of Practice  

  2. Dynamic Security Access Architecture Group 

  3. Digital Privacy Notary - Privacy Policy, Index and Ledger 

Security Architectures Currently use commercial identity management, which is really insecure 

  • Refers to terms that are redefined for technical purpose, which conflict with governance terms, in addition to locking in the requirement for people to provide identifiers and personal attributes to use security in online services  

  • Current risks for children can be seen in our slides  

  •  

  • PII Controller – is an Industry Security solution witch is ISO/IEC 27002- specified, using open to access privacy framework solutions to extend enterprise security architectures for decentralised data governance solutions, 

  • Up until now, digital identity technology has, for the most part, been specified and defined by commercial enterprises,  

  • A famous code is law, article for Lawrence Lessig, who started creative commons, explained how technology is making their own rules and not obeying the rules we think,  

  • This has cause significant issues in governance and delivery of market services,  

  • Thes are now seen in the security and surveillance industries in a number of ways, across many jurisdictions.   

  • In particular the digital identity management industry, and the generic identifier to attribute management standards, which aim to side step the data governance requirements with technical specifications, which are free from governance rules and restrictions,  

  • Security and Privacy issues now a key concern as commerical IDm Digital Trust solutions have made these systms insecure.  

Topics
Governance Authority, sovereign transparency - decentralised and distributed data governance, security and policy for regulators and industry engagement and approval, to enable new knowledge banking industry,   

...