hope x talk

Post on 17-May-2015

4.694 Views

Category:

Documents

4 Downloads

Preview:

Click to see full reader

TRANSCRIPT

HOPE XUpdates from the

Online Identity BattlefieldJoint Presentation by:

Aestetix @aestetix

Kaliya “Identity Woman” @identitywoman

Our Intentions:

1) Update on the history #nymwars Did we “win” with G+ acquiescing?

2) The Battle continues - at its center are key words & concepts and the struggle for meaning.

3) Share more about one battlefield : NSTIC

Hoped for result some of you choose to “participate” struggling & using this lever to protect psydonymity and anonymity.

Who are we? - contextual intro’s from each of usAestetix - reveiw of talk from Hope 9 Kaliya - Indie Advocate for user-centrism + IIW

How we Connected - NSTIC! Kaliya - What is NSTIC? - rapid historyAestetix - Experience w/ Nym Issues to NSTIC

Words & Concepts on the Battlefield: [Triangles - Circles] Trust Identity Verified Reputation

Paths Forward: Limited Liability Persona BC Government Solution Turtles all the Way Down Writing out what we want!

NSTIC Next Steps “Hacking the Trust Frameworks” + Next Meeting Florida Biometrics Con. How should it work from a freedom civil liberties perspective?

aestetix“is a mononym”

• #nymwars

• HOPE Number Nine

• What is a “real” name?

• NSTIC/IDESG

#nymwars

#nymwars

Eric Schmidt, Executive Chairman at Google:• “The only way to manage this is true transparency and no

anonymity. In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it.” (Techonomy, August 2010)

• “If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place."(CNBC Interview, December 2009)

#nymwars

Mark Zuckerberg, CEO at Facebook:“The days of you having a different image for your work friends or co-workers and for the other people you know are probably coming to an end pretty quickly. Having two identities for yourself is an example of a lack of integrity.” (Interview, October 2011)

#nymwars

Ian Donald Calvin Euclid Zappa

Independent Advocate for the Rights and Dignity of our Digital Selves

Saving the world with User-Centric Identity

I have had my identity woman blog for almost 10 years

Early 2000’s I was working on developing Distributed Social Networks for Transformation

Protocol: How Control Exists after Decentralizationby Alexander R. Galloway

Protocols are Political

They matter! as Snowden said today at HOPEX

We founded IIW in 2005

Internet Identity Workshop

Unconference Format

Hailstorm SAMLv1 & 2

BTOracleSUN

XRIXDI

Passport

Microsoft

FireFly

Liberty Alliance

Kantara Intiative

Planetwork Link Tank

Identity Commons (1)

Identity Gang

Identity Commons (2)

OpenIDv2

OpenID Foundation

Open Identity Exchange

Information Card

Foundation

IMIIdentity Metasystem

Interoperability

Information Card

Standard

VENN OF IDENTITY

HigginsProject

Lots of Companies

Project to be annouced at

IIW

IBM

Project to be annouced at

IIW

Pamela Project

TIM

EInternet Identity Workshop

Loose Affiliations of People

Current Organizations

Organizations (no longer)

Company

Proprietary Service (no longer)

Protocol standardized at OASIS

Protocol standardized at OASIS

earlier version (no longer)

Independent Open Protocol

Independent Open Protocol

(no longer)

Paper:Shared Understanding

Event

Project with Code

Evolution of Identity Community

Broad Base of Participation BIG COMPANY SPONSORSMSFTPingIDSUNFacebookGoogleYahooCiscoPlaxoCommerce NetAdobeBTNovellFacebookAOLPing IdentityPaypal / eBay

NONPROFIT SPONSORSISOCKantara/Liberty AllianceInfo Card FoundationOASIS IDTrustMozillaHiggins ProjectBandit ProjectPlanetworkInternet Society

CORPORATE PARTICIPANTSPaypal Booz Allen Hamilton AppleBurton GroupHewlett PackaredInternational Business MachinesIntuitLexisNexisNippon Telegraph and Telephone CorporationNokia Siemens NetworksNRIOracleOrangeRackspaceRadiant LogicSony EricssonThe MITRE CorporationTucows IncVeriSign, Inc.Vodafone Group R &DAlcatel-LucentAcxiom Identity SolutionsAcxiom ResearchEquifaxLinkedInAmazon

SMALL COMPANYSPONSORSFuGen SolutionsOUNORel-IDPokenVidoopChimpAuthentrusSxipClaimID

IETFW3COASIS

SMALL COMPANY PATICIPANTSÅngströDigg, Inc.PrivoExpensifyFamilySearch.orgFreshBooksGigyaGluuJanrainKynetxNetMesh Inc.ProtivitiSocialtextTriCipher, Inc.Trusted-IDWave SystemsSix Apart

NONPROFIT PARTICIPANTSCenter for Democracy and TechnologyDataPortability ProjectIdM Network NetherlandsOCLCOpen Forum FoundationWorld Economic Forum

UNIVERSITY PARTICIPANTSGoldsmiths, University of LondonNewcastle UniversityStanford University

GOVERNMENT PARTICIPANTSOffice of the Chief Informaiton Office, Province of British Columbia

and more...

Lots of Open Standards

XRI/XDI

SAML

InformationCards

I founded this in 2010

Goal connect starutps around the world building tools for individual collect manage and get value from their personal

data along with fostering ethical data markets.

Privacy: Increasingly Complex as Volumes of Personal Data Grow

27Source: World Economic Forum, “Rethinking Personal Data: Strengthening Trust,” May 2012

The Leola Group

2014 I founded

NSTIC

Where did we meet?

2009

10. Build a cybersecurity-based identity management vision and strategy that addresses privacy and civil liberties interests, leveraging privacy-enhancing technologies for the Nation.

Table 2: NEAR-TERM ACTION PLAN

2009

13. Implement, for high-value activities (e.g., the Smart Grid), an opt-in array of interoperable identity management systems to build trust for online transactions and to enhance privacy.

Table 3: MID-TERM ACTION PLAN

Says w

e must m

aintain

anonym

ity

& pseudonym

ity in cy

berspace

Called for in President’s Cyberspace Policy Review (May 2009): a “cybersecurity focused identity management vision and strategy…that addresses privacy and civil-liberties interests, leveraging privacy-enhancing technologies for the nation.”Guiding Principles

–Privacy-Enhancing and Voluntary–Secure and Resilient–Interoperable–Cost-Effective and Easy To Use

NSTIC calls for an Identity Ecosystem, “an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities.”

36

What is NSTIC?

Where is this / Where are we?

CREEPY NSA (and others) SPYING

CREEPY NSA (and others) SPYING

Rules for Lawful Intercept

Where is this / Where are we?

CREEPY NSA (and others) SPYING

Rules for Lawful Intercept

IN THIS BIG YELLOW BOX

Where is this / Where are we?

CREEPY NSA (and others) SPYING

Rules for Lawful Intercept

NORMATIVE RULES BUSINESS PRACTICES

TECHNOLOGIES

FOR EVERY DAY LIFE

Business - Business

Business - Consumer

Business - Government

Citizen/Person - Gov

Where is this / Where are we?

CREEPY NSA (and others) SPYING

Rules for Lawful Intercept

NORMATIVE RULES BUSINESS PRACTICES

TECHNOLOGIES

FOR EVERY DAY LIFE

Business - Business

Business - Consumer

Business - Government

Citizen/Person - Gov

Where is this / Where are we?

What does the IDESG do:

It is proceeding to define how EVERYONE will be able to express their identity online in the future.  It is to answer questions like: 

* How can people define their own names, gender identity, race, other   identifying information?

* Will we retain the right to use "nicknames"/pseudonyms?

* Will we be able to speak anonymously online?  

The strategy document "says" we should be able to do so but this institution will define HOW the ecosystem actually built. Only if we are there to ensure our freedoms online will they be retained. 

* What are the methods of verification       of enrollment (how you get into the system) what methods of                 authentication (passwords or device ID or biometrics)?

As the White House announcement details below, today [April 2014] marked the release of the Cybersecurity Framework crafted by NIST – with input from many stakeholders – in response to President Obama’s Executive Order on Improving Critical Infrastructure Cybersecurity issued one year ago.  NSTIC is not discussed in the framework itself – but both it and the IDESG figure prominently in the Roadmap that was released as a companion to the Framework.  The Roadmap highlights authentication as the first of nine different, high-priority “areas of improvement” that need to be addressed through future collaboration with particular sectors and standards-developing organizations.  

The inadequacy of passwords for authentication was a key driver behind the 2011 issuance of the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls upon the private sector to collaborate on development of an Identity Ecosystem that raises the level of trust associated with the identities of individuals, organizations, networks, services, and devices online. 

The res

ults o

f this

WILL

BECOME

POLICY

NSTIC is focused on consumer use cases, but the standards and policies that emerge from the privately-led Identity Ecosystem Steering Group (IDESG) established to support the NSTIC – as well as new authentication solutions that emerge from NSTIC pilots – can inform advances in authentication for critical infrastructure as well.

NIST will focus in these areas:·         Continue to support the development of better identity and authentication solutions through NSTIC pilots, as well as an active partnership with the IDESG;

·         Support and participate in identity and authentication standards activities, seeking to advance a more complete set of standards to promote security and interoperability; this will include standards development work to address gaps that may emerge from new approaches in the NSTIC pilots

The res

ults o

f this

WILL

BECOME

POLICY

The BIG IDEA behind NSTIC IS NOT DUMB

+

Multi-FactorAuthentication

Authentication is NOT:Enrollment or

Identity Verification

You need strong multi-factor authentication for pseudonyms too.

The BIG IDEA behind NSTIC IS NOT DUMB

Text

Text

50states

3,144counties

Text

50states

3,144counties

19,355 incorporated places

50states

Lots of Government Entities in the US - who’s job it is to interact with citizens and provide services.

Each Government agency could issue a “strong” mutli-factor ID that included verification on enrollment.

Cost $12-$120 per person - per year to manage ID

This would be a National ID

People get services from the private sector with ID.

People get services from the private sector with ID.

Gov ID for employees, contractors under HSPD12 - 12million

How can they use this ID at their private sector accounts?

A tone of liability& “trust” issues

A tone of liability& “trust” issues

NSTIC

NSTIC

TRUST FRAMEWORKS

“TRUST” Frameworks

TECHNOLOGY

LEGAL/POLICY

TECHNOLOGY LEGAL/POLICY

TECHNOLOGY LEGAL/POLICY

TRUST FRAMEWORK

TRUST FRAMEWORK

We must create Legal/Policy - Tech that will underlies what should

become an Ecosystem..

We need lots of different parties at the table to create them.

We should have an “open” mutli-stakeholder process to figure it out.

Private sector will lead the effort• Not a government-run identity program• Private sector is in the best position to drive technologies and solutions…• …and ensure the Identity Ecosystem offers improved online trust and better customer experiences

Federal government will provide support• Help develop a private-sector led governance model• Facilitate and lead development of interoperable standards• Provide clarity on national policy and legal framework around liability and privacy• Fund pilots to stimulate the marketplace• Act as an early adopter to stimulate demand 70

What does NSTIC call for?

NPO

Jeremy Grant

Program Office Announced

inside: National Institute of Standardsunder: Department of Commerce

Friday, January 7, 2011

NPO Hires a STAFF

David TemoshuckNaomi Lefkovitz

James “Jim” Sheire

Michael “Mike” Garcia

NPO ACTION: Notice of Inquiry.

SUMMARY: The Department of Commerce (Department) is conducting a comprehensive review of governance models for a governance body to administer the processes for policy and standards adoption for the Identity Ecosystem Framework in accordance with the National Strategy for Trusted Identities in Cyberspace (NSTIC or “Strategy”).

The Strategy refers to this governance body as the “steering group.” The Department seeks public comment from all stakeholders, including the commercial, academic and civil society sectors, and consumer and privacy advocates on potential models, in the form of recommendations and key assumptions in the formation and structure of the steering group. The Department seeks to learn and understand approaches for: 1) the structure and functions of a persistent and sustainable private sector-led steering group and 2) the initial establishment of the steering group. This Notice specifically seeks comment on the structures and processes for Identity Ecosystem governance. This Notice does not solicit comments or advice on the policies that will be chosen by the steering group or specific issues such as accreditation or trustmark schemes, which will be considered by the steering group at a later date. Responses to this Notice will serve only as input for a Departmental report of government recommendations for establishing the NSTIC steering group.

NPONPO Workshops

Governance

Privacy

Technology

July 2011

May 2011

with IIW Oct 2011

NPO April 2011 at chamber of commerce

NPO Charter

“Committees” byImmaculate Conception

Bylaws

NPO Charter

“Committees” byImmaculate Conception

Bylaws

The First Plenary meeting was August 2012

NPO a complete 2 year work PLAN!

THE Identity Ecosystem Steering Group STRUCTURE NPO

THE SECRETARIAT

Put out a Bidand then hired

private company to run Secretariat

The Plenary

NPO THE IDESG STRUCTURE

THE SECRETARIAT

Any person and any organization in the world(yes the world) can sign up to be a part of making

the Identity Ecosystem Framework

The Plenary

NPO

THE SECRETARIAT

You pick a stakeholder category• Privacy Advocate• Small Business - Entrepreneur • Regulated Industries• Relying Party • etc...there are 14

The Plenary

NPO

THE SECRETARIAT

Each Stakeholder Group elects a member of the management council.

The Plenary

NPO

THE SECRETARIAT

THATS“Me”

I represent small businessesand entrepreneurs.

The Plenary

Chair Management

Council

Vice-Chair

NPO

THE SECRETARIAT

Chair Management

Council

Vice-Chair Vice-Chair

Plenary Chair

NPO

THE SECRETARIAT

The first multi-day face to face meeting was 18 months after we were first elected.

The management council meets every 2 weeks on the phone.

The Plenary

Chair Management

Council

Vice-ChairVice-Chair

Plenary Chair

PRIVACY

Security Standards

Trust FrameworkTrust Mark

Standards

Int’lPolicy

NPO

THE SECRETARIAT

Committees are where all the work happens.

The NPO defined all the committees BEFORE the

management council ever met.

The Plenary

Chair Management

Council

Vice-ChairVice-Chair

Plenary Chair

PRIVACY

Security Standards

Trust FrameworkTrust Mark

Standards

Int’lPolicy

NPO

THE SECRETARIAT

They meet in a “chairs call” every 2 weeks.

The committees elect chairs

The Plenary

Chair Management

Council

Vice-ChairVice-Chair

Plenary Chair

PRIVACY

Security Standards

Trust FrameworkTrust Mark

Standards

Int’lPolicy

NPO

THE SECRETARIAT

NYM ISSUES?

Aestetix tried to bring Nym Issues Committee forward...its still in limbo.

The Plenary

Chair Management

Council

Vice-ChairVice-Chair

Plenary Chair

NPO

THE SECRETARIAT

ManagementCouncil

Sub-Committees

The Plenary

NPO THE IDESG STRUCTURE

THE SECRETARIAT

Any person and any organization in the world(yes the world) can sign up to be a part of making

the Identity Ecosystem Framework

HOW MANY PEOPLE are active in IDESG? Under 100!

A difference can be made with this institution with not that many people showing up.

The Plenary

NPO THE IDESG STRUCTURE

THE SECRETARIAT

They have Face to Face meetings once a quarter.

+ they are all broadcast live.

NPO

The

Chair

Vice-Vice-

PlePRI

Sec Stan

Trust

Stan

InPol Communications:

30 Mailing listsNo Wiki

Document RepositoryDrupal Site

No clear vision from management council about what we are actually supposed to do.

10+ Committees& Sub-Committees

The

ChVi Vi

PlPRSe St

TrusSt

I P

THE SECRETARIAT

NPO

IDENTITY ECOSYSTEM STEERING GROUP

Year 1 Pilots

Year 2Pilots

Year3Pilots ?

• Daon, Inc.• The American Association of Motor

Vehicle Administrators• Criterion Systems• Resilient Network Systems, Inc.• University Corporation for

Advanced Internet Development

• Transglobal Secure Collaboration Participation

• Georgia Tech Research Institute• Exponent• ID.me, Inc.• Privacy Vaults Online, Inc.

NPO

The

Chair

Vice-Vice-

PlePRI

Sec Stan

Trust

Stan

InPol

BIG ISSUES:

DIVERSITY - INCLUSION

TRUST FRAMEWORK CREATION * NAMING ISSUES

REASONABLE PROCESS for CITIZEN INVOLVEMENT

The Importance of Diversity & Inclusion in theNSTIC

National Strategy for Trusted Identities in Cyberspace

IDESG Identity Ecosystem Steering Group

by Kaliya “Identity Woman” Hamlin Management Council Member for Small Business and Entrepreneur Stakeholder Group

October 18, 2013 - Boston PlenaryPresentation shared remotely in New Business Section

This was at close of plenary and was invited after Kaliya raised the issue of the lack of diverse participants in producing the outcomes of Security Committee was

reviewing. Told it was out of scope of the committee to address the issue and it should be brought to end of day chairs debrief.

63

CensusViewer US 2010 Census Latino Population as a heatmap by census tract.

63

Anti-Racist Organizations in the UShttp://en.wikipedia.org/wiki/Category:

Anti-racist_organizations_in_the_United_States

Ethnic & Racial Minorities in UShttp://en.wikipedia.org/wiki/

Category:Ethnic_groups_in_the_United_States

Asian Americanhttp://en.wikipedia.org/wiki/Category:Asian_American

Lists of US Cities with non-white majority populationshttp://en.wikipedia.org/wiki/Lists_of_U.S._cities_with_non-white_majority_populations

Why James Chartrand

Wears Women’s Underpants

http://www.copyblogger.com/james-chartrand-underpants/ 65

List of Women’s Organizations in the UShttp://en.wikipedia.org/wiki/List_of_women

%27s_organizations#United_States

65

List of Disabled Rights Organizations in the UShttp://en.wikipedia.org/wiki/

List_of_disability_rights_organizations

Alliance for Full Participation http://en.wikipedia.org/wiki/

Alliance_for_Full_Participation

69

in March I did a BLOG POST re: next election to IDESG Management Council

Articulating serious ISSUES

including lack of diversity almost no civil society groups

Uninvited by the NPO to a International ID Conference at White House Conference Center.

The Last Plenary....

Panel with the: NAACPAssociation of the BlindACLU

I was involved in helping design it.

They are Continuing AHEAD.....

NPO

The

Chai

Vic Vic

PlePRISec Sta

Trust Sta

IP

The list of DELIVERABLES

The list of DERIVED REQUIREMENTSCreated not by Plenary but by Deloitte Consultants

NPO

The

Chair

Vice Vice

PlePRISec Sta

Trust Sta

IPo Identity

EcosystemSteeringGroup

The

Chair Vice Vice

PlePRISec Sta

Trust Sta

I Po IDESG INC501(c)3

+ 501(c)6

THE SECRETARIAT

NPO

The

Chair

Vice Vice

PlePRISec Sta

Trust Sta

IPo Identity

EcosystemSteeringGroup

The

Chair Vice Vice

PlePRISec Sta

Trust Sta

I Po IDESG INC501(c)3

+ 501(c)6

THE SECRETARIAT

Now we are Independent

YEAH!

NPO

The

Chair Vice Vice

PlePRISec Sta

Trust Sta

I Po IDESG INC501(c)3

+ 501(c)6

Now we are Independent

YEAH!

Opportunity to “reset” the process+ how we are governed.

The main committee where key work is happening is in

the Trust Framework and Trust Mark Committee

The Nym Online Identity Battlefield

Key Words & Key Concepts

“Trust”

Bond between

parent and child

What is Trust?

(at different scales)

http://www.flickr.com/photos/symphoney/127526363

People trusting themselves: SELF TRUST

http://www.flickr.com/photos/mikebaird/6827018401

People trusting each other: RELATIONSHIP TRUST

http://www.flickr.com/photos/west_point/5570799235

Groups of people working together: ORGANIZATIONAL TRUST

http://www.flickr.com/photos/wordridden/4735329102/

For organizations there is: MARKET TRUST

http://www.flickr.com/photos/nate/29593906

Beyond the business or nonprofits is: SOCIETAL TRUST

http://www.flickr.com/photos/bethscupham/7663247816

Beyond the societal trust is: ECOSYSTEM TRUST

Bonus:TECHNICAL TRUST

“TRUST” Frameworks

TECHNOLOGY

LEGAL/POLICY

TECHNOLOGY LEGAL/POLICY

TECHNOLOGY LEGAL/POLICY

TRUST FRAMEWORK

The Trouble with Trust: and the Case for Accountability Frameworks

On my Identity Woman blog

National StrategyTrustedIdentities

Identity is socially constructed and contextual.

Identity is subjective

Identity is subjective

Pointers to thingswithin particular contexts.

AbrahamicCultural Frame

Relational Cultural Frame

Identity along with all things flows down from GOD.

Identity and all things are present in the world and relate to each other.

What does industry mean by “Trusted Identity”?Here are some headlines + press releases.

“Verified”AirBnB

“Verified”AirBnB

What does this mean to Verified

What does this mean to Verified

What does this mean to be Verified?

Who is qualified to validate or verify.

Who is qualified to certify verifiers.

FCCX - system

with Post Office run by Secure Key

(said: f6)

We didn’t have time to get into this.

?Anonymous

Limited Liability Persona

?Anonymous

?

?

? ?Per-Post Per-Session

Anonymous

Limited Liability Persona

?Anonymous

Limited Liability Persona

?Anonymous

!Verified

?Anonymous

!Verified

! ! !

Verified

! !!

Documentation In PersonVerification

BiometricCapture

?Anonymous

!Verified

?Anonymous

One Site Multi-Site

Self-Asserted VerifiedSociallyValidated

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?!

Verified Anonymity

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?!

Verified Anonymity

Ms.Sue Donna DOB = 1/21/19821823 6th Ave. Alameda, CA

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?!

Verified Anonymity

Ms.Sue Donna DOB = 1/21/19821823 6th Ave. Alameda, CA

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?!

Verified Anonymity

Over 18 yearsWoman Voter

CA Congressional District 9

Ms.Sue Donna DOB = 1/21/19821823 6th Ave. Alameda, CA

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

!!

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

!!

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

!!

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

!

Pseudonymous

!!

Limited Liability Persona

Persona 1 Persona 2

Context 1 Context 2

Persona 1

Persona 2Context

Context 1 Context 2

Persona

Reputation

ReputationKlout scores all the way down…

HoloCosmos.com Turtle Island

Back to Circles and Triangles

We won #nymwars….. right?

In Conclusion: HOPE!

We won #nymwars….. right?

In Conclusion: HOPE!

USING THE BC SERVICES CARD TO ACCESS ONLINE SERVICES

British Columbia Services Card

A Triple Blind System - very good & model to consider.

In Conclusion: HOPE!

Spring 2014 39

The Government set two specific tasks for the Panel:

1. Review the Province’s approach to digital services, recommending actions the Province can take to build citizens’ confidence in the Services Card and in the digital services that take advantage of the opportunities it creates.

2. Recommend principles and priorities for the design and implementa-tion of digital services and the next phase of the provincial identity management program to support the Province’s vision to save citizens’ time in their interaction with government and make it easier to access better quality services.

This was then broken down into five more specific questions:

�Where should the Province focus its efforts in using the Services Card to create new kinds of digital services, and why?

�How can the Province best balance privacy, security, cost effective-ness and convenience in the design of the Ser-vices Card to include key features such as pass code reset and managing transaction history?

�What actions can the Province take to build citizens’ confidence in

the Services Card and in the digital services that take advantage of opportunities it creates?

�How should the Province explore using data created from digital ser-vices to improve policy and services?

�What would it mean for BC’s identity manage-ment service to be used by organizations that aren’t part of government?

An independent chair and facilitator of the panel lead the process and developed the learning curriculum for participants. It involved learning from the govern-ment how the Services Card

worked and their perspec-tives on digital futures. It also included the views of the BC Civil Liberties Association and the BC Privacy Commissioner. As part of their deliberations participants explored dif-ferent possibilities through group discussion and sorting exercises.

The Citizen Panel report was completed and submitted to the government. The Office of Citizen Engagement is now weaving the outcomes of all three streams of engagement into the final report that is to be released this spring.

I asked David Hume the executive director, of Citizen Engagement for the Province

of British Columbia what resources he would recom-mend for those considering citizen engagement within their jurisdiction.

He suggested that the web site, Particiipedia.net, is a great place to explore a variety of case studies. More step-by-step guidance for such processes can be found at the National Coalition for Dialogue and Deliberation (ncdd.org) and the Canadian Coalition for Dialogue and Deliberation (c2d2.org). Additionally, the Environmental Protection Agency has good, broad guidance (epa.gov/oia/public-participation-guide/index.html).

From the White Paper: Designing the Digital Service Consultation

36 random from diversity of provinces met over 2 weekends to determine future policies of how tech should be used.

In Conclusion: HOPE!

Citizen Engagement for the British Columbia Services Card

In Conclusion: HOPE!

Opportunity that is NSTIC!

Protect Anonymity and Pseudonymity

Prevent Defense Industry Running ID

In Conclusion: HOPE!

CREEPY NSA (and others) SPYING

Rules for Lawful Intercept

IN THIS BIG YELLOW BOXWhere is NSTIC ?

Not - SEXY Secrecy

Not Resisting “the Man”

In an Open Government Process - anyone can join. The results will become Tech+ policy and affect EVERYONE!

DEFINING NORMATIVE RULES BUSINESS PRACTICES

TECHNOLOGIES

FOR EVERY DAY LIFE

Citizen/Person - GovBusiness - Consumer

Business - GovernmentBusiness - Business

Share your eMail with us.

Join an NSTIC and VOTEJoin an NSTIC Committee

My blog has details - its a simple 15 step process :)

Join Nym Rights! www.nymrights.org

Come to next Plenary:

Florida at the Biometrics Conference

Sept 17-19

www.idecosystem.org

Come to the next IIWlast week of October :)

Internet Identity Workshop

Questions

+ We posted a resource listidentitywoman.net/hopex

top related