Status: CANDIDATE
Optional comments about the requirement may be entered here
Item | Description |
---|---|
Statement (Single phrase or sentence) | Verifiers must identify themselves |
Description | Verifiers must share a form of identification (e.g. certificate) to a provider during a presentation so that a user can reliably identify the requesting party. The form of identification should be unique to the verifier and challenging to fake, such that the provider should have high confidence in the identity of the verifier. |
Scope (applies to) |
|
Select the Primary Consideration |
|
Other considerations |
|
Select the Identifiers |
|
Reference (Scope_Consideration_Ref #) | |
Related Requirements | |
Explanatory Notes (Text or Link) |
Reference
Privacy Principles
For descriptions see ISO/IEC 29100
# | Abbreviation | Principle |
---|---|---|
1 | CC | Consent and Choice |
2 | PL | Purpose legitimacy and specification |
3 | CL | Collection limitation |
4 | DM | Data minimization |
5 | UR | Use, retention, and disclosure limitation |
6 | AQ | Accuracy and quality |
7 | OT | Openness, transparency, and access |
8 | IA | Individual access & participation |
9 | AC | Accountability |
10 | IS | Information Security |
11 | PS | Privacy compliance |