Monthly Archives: June 2007

The Role of Data in Identity Proofing

I read an interesting commentary on by Bruce Schneier about data reuse. He had some very valid points that coincide nicely with one of the key points we emphasize in our value at IDology – promoting the responsible use of data. After reading this article, I realized I haven’t blogged on this topic yet.

Obviously an important part of our identity proofing process involves accessing and using data, and the data industry is definitely under fire from several organizations due to the privacy issues surrounding data capture and use. The problems (loss of control and error rates) associated with data reuse that Bruce points out in his commentary play a big factor for everyone – individuals, businesses, and the government. And I agree with him, there are beneficial uses of data that cannot be protected by technology alone. Legislation and legal protection are fundamental for making sure that data is not misused and our privacy is protected.

As a service provider of one of these beneficial uses of data, I would like to explain what “responsible use of data” is for us:

For starters, we don’t require any sensitive information from the consumer when proofing an identity or age. And we do not reuse data. In fact, our use of data is strictly limited to the proofing process. We are not capturing data for any other purpose except to validate an identity claim. These factors work together to improve consumer confidence and address the unwillingness consumers have to providing personal data.

We also do not reveal the data that we use during the proofing process which means the consumer is protected from their data files being shared throughout an Enterprise. This helps protect both consumers and businesses from identity theft. Really we see our process as a neutral party between the Enterprise and the data so that consumer privacy is protected and commerce is uninterrupted.

So how does this all relate back to the article? Well, Bruce actually sums it up nicely for me when he describes how and why he believes technology is still vital:

“We need to build systems with privacy-enhancing technologies that limit data collection wherever possible.”


Leave a comment

Filed under consumer privacy, data reuse, identity, identity proofing, identity theft, Identity verification

Identity Theft: A “Monster”ous Crime

Identity theft is no laughing matter but I couldn’t help but chuckle today when I heard the latest news about Herman Munster’s identity being stolen. If you remember The Munsters, you’ll know that it was a TV show about the family life of a typical suburban family who happened to be monsters but didn’t realize they were any different than their neighbors.

Does anyone else see the irony?

Leave a comment

Filed under herman munster, identity theft, television shows

Media Spotlights’ On Identity

A few posts back I mentioned our partner Identity Rehab…well they’ve changed their name and are now called ID Watchdog.  Check out today’s story in USA Today by Byron Acohido and Jon Swartz which features a scary case of identity theft and just how complicated it can be when your data is compromised and your identity is stolen.

And while you are in the news reading mood, InformationWeek’s cover article this week is titled “Web Credibility:  Hard Earned, Harder to Prove.”  It’s a must read for those interested in the issues driving Identity 2.0


Filed under Digital identity, fraud, identity, Identity 2.0, identity proofing, identity theft, Identity verification