Reiniger LLC.

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
1 FPEG Identity theft & payment fraud point December 2007.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
UNITED NATIONS COMMISION ON INTERNATIONAL TRADE LAW Enhancing legal certainty for electronic signatures and other authentication methods José Angelo Estrella.
The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
TFTM Interim Trust Mark/Listing Approach Paper Discussion Deck TFTM Committee IDESG Plenary Meeting January 14, IDESG TFTM Committee1.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
S.1 Using a Global Validation Service to Unite Communities Jon Shamah EMEA Head of Sales, BBS eSecurity.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
“Limiting electronic fraud through an Information Security Management System (ISMS): An Introduction to ISO 27001" Presented to the ICGFM Annual Conference.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Wildman Harrold | 225 West Wacker Drive | Chicago, IL | (312) | wildman.com Wildman, Harrold, Allen & Dixon LLP Identity Management: The.
1 Brief Overview of Selective Legal and Regulatory Issues in Electronic Commerce United Nations Conference on Trade and Development Geneva, 14 June 2001.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
National Smartcard Project Work Package 8 – Security Issues Report.
Technology and Online Spaces Claro Parlade Director for Software Policy Asia-Pacific.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Digital Catapult Challenges in Sharing proprietary and personal data Dr Robin Daniels, Redpill Group Ltd On behalf of the Digital Catapult. Chirdeep Chhabra.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Legislation and Market Forces: PKI Drivers for the U. S. Mortgage Industry November 27, 2006 R. J. Schlecht Director, Industry Technology – Security &
11/6/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Overview of Selective Legal.
Consumer Authentication for Networked Personal Health Information Redwood Health Information Collaborative March 18, 2008 Josh Lemieux Director, Personal.
International Telecommunication Union Committed to Connecting the World GLOBAL CONNECTIONS: Then, Now and Beyond Eye on Earth Summit Abu Dhabi, 14 December.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
2 PSD2- C HALLENGES AND OPPORTUNITIES Pascale-Marie BRIEN– Senior Policy Adviser.
A policy framework for an open and trusted Internet
Sandy Porter - Strategy Director Avoco Secure
Cross-sector and user-centric AAI
Identity on the Internet
Athina Antoniou and Lilian Mitrou
Higher Education’s Role in the Identity Ecosystem
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
Why eIDAS? eID under eIDAS compliance
presentation to the ICC Commission on the Digital Economy
Privacy and Digital Rights Management
Ethical questions on the use of big data in official statistics
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
UK Access Management Federation
DIGITALIZATION: HOW DOES IT AFFECT THE LAWYERS Alex TALLON
Dashboard eHealth services: actual mockup
Website authentication E-registered delivery
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
The OTENTIK trust network
Lawyers and Notaries Legal Issues Panel
Reiniger LLC.
E-identities (and e-signatures)
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Reiniger LLC

Legal Nature of Digital Identity (Conference 7) Timothy S. Reiniger November 13, 2018 Presentation for Advanced Training in Digital Legal Documents at the University of Houston Houston, TX Reiniger LLC

Discussion Topics 1. Basics 2. Legal Perspective 3. Legal Challenges 4. Current Legal Solutions Reiniger LLC

Drivers of Digital Identity Globalization and connected society Global mobile phone availability and network coverage Increased concerns about use of personal data Growing market of identity service brokers Increased cybersecurity/identity fraud risks Increased dependency between public and private sectors Reiniger LLC

Digital Documents: Proof Requirements 1. Identity 2. Integrity 3. Intent All require capability of proof over time Reiniger LLC

Digital Identity: How Experienced in Law Information Exchange/Sharing Information Privacy Information Security Reiniger LLC

Digital Identity: How Conceptualized in Law Identity in Law Identifiers Legal Identity Reiniger LLC

Identity in Law Reiniger LLC

Sources of Laws/Rules Statutes/Regulations International Codes Lex Informatica Reiniger LLC

Digital Identity Categories Persons Legal Persons Non-Person (Digital) Entities Reiniger LLC

Identity Credential Defined "Identity credential" means the data, or the physical object upon which the data may reside, that an identity credential holder may present to verify or authenticate his identity in a digital or online transaction. Reiniger LLC

Sources of Identity Credentials Public Sector (eID) Private Sector Self-Issued/Certified Reiniger LLC

Digital Identity: How Perceived in Law Context/Relationships Consent Control Reiniger LLC

Consent Reiniger LLC

Legal Challenges Jurisdiction Assigning Responsibility Cross-Border Recognition Third Party Liability Identity Service Providers Reiniger LLC

Federation and third party bridges don’t solve all trust issues… Third Party Liability Federation and third party bridges don’t solve all trust issues… Federating Entity A contract may not exist between all parties or may not address identity federation issues + + SP/IdP Users IdP Users SP Users + User Credentials User Credential Accredited Issuer (Insourced) Accredited Issuer (Outsourced) Bridge CA Reiniger LLC

Legal Solutions: The Maritime Law Model Reiniger LLC

European Union Law - eIDAS eID and Trust Services Cross-Border Recognition/Interoperability Liability Allocation Reiniger LLC

Virginia Digital Identity Law Overview SB 814: http://leg1.state.va.us/cgi-bin/legp504.exe?151+ful+SB814S1 Provides Common Legal Framework for Identity System Participants Creates the Commonwealth Identity Management Standards Advisory Council Provides Limitation of Liability for Identity Providers and Identity Trust Framework Operators Creates Additional Relying Party Incentives Reiniger LLC

Virginia Digital Identity Law: Liability Limitation Identity Service Provider Liable for Issuance of Credentials not in Compliance with State Minimum Standards, Existing Contracts, or Trust Framework Rules. Identity Service Provider not Liable for Improper Use of Credential by Holder or Any Other Person. Reiniger LLC

United Nations (UNCITRAL) Study Effort for Model Law - Principles Functional Equivalence Technology Neutrality Cross-Border Recognition Party Autonomy Liability Allocation Reiniger LLC

Digital Identity Trends Use of mobile phones for citizen authentication Use of biometrics for authentication Availability of analytics for real-time and continuous authentication Internet of things – identification of devices Citizen/user capability for control of personal data Reiniger LLC

Contact Information Timothy S. Reiniger, Director Reiniger, LLC 40 Belfield Road Cape Elizabeth, Maine 04107 tim@reinigerllc.com 804-997-9213 Reiniger LLC