Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Status: CANDIDATE

Optional comments about the requirement may be entered here

ItemDescription
Statement (Single phrase or sentence)

Verifiers must identify themselves

DescriptionVerifiers must share a form of identification (e.g. certificate) to a provider during a presentation so that a user can reliably identify the requesting party. The form of identification should be unique to the verifier and challenging to fake, such that the provider should have high confidence in the identity of the verifier.
Scope (applies to)
  • Part A: Verifiers
  • Part B: Issuers
  • Part C: Providers
Select the Primary Consideration
  • CC (Consent and Choice)
  • PL (Purpose legitimacy and specification)
  • CL (Collection limitation)
  • DM (Data minimization)
  • UR (Use, retention, and disclosure limitation)
  • AQ (Accuracy and quality)
  • OT (Openness, transparency, and access)
  • IA (Individual access & participation)
  • AC (Accountability)
  • IS (Information Security)
  • PS (Privacy compliance)
Other considerations
  • CC (Consent and Choice)
  • PL (Purpose legitimacy and specification)
  • CL (Collection limitation)
  • DM (Data minimization)
  • UR (Use, retention, and disclosure limitation)
  • AQ (Accuracy and quality)
  • OT (Openness, transparency, and access)
  • IA (Individual access & participation)
  • AC (Accountability)
  • IS (Information Security)
  • PS (Privacy compliance)
Select the Identifiers
  • Direct
  • Indirect
  • Unique
Reference (Scope_Consideration_Ref #)
Related Requirements
Explanatory Notes (Text or Link)

Reference

Privacy Principles

For descriptions see ISO/IEC 29100

#AbbreviationPrinciple
1CCConsent and Choice
2

PL

Purpose legitimacy and specification

3

CL

Collection limitation

4

DM

Data minimization

5

UR

Use, retention, and disclosure limitation

6

AQ

Accuracy and quality

7

OT

Openness, transparency, and access

8

IA

Individual access & participation

9

AC

Accountability

10

IS

Information Security

11

PS

Privacy compliance

  • No labels