I have control

Can we truly own our identity?

Digital identity is a complex subject; as with most digital transformations, taking a process that exists in an analogue world and digitising it for use online doesn’t create a great solution.  A number of models for digital identity exist, and are often spoken about in terms such as centralised, federated, distributed, user-centric, self-sovereign.  There are countless papers by the great and the good of the identity world that talk about the merits and flaws of the varying models.  There’s a school of thought that centralised is bad and self-sovereign is the panacea for digital identity – though often these ideas focus too much on the model and less about the use.  And the arguments are often mired in digitisation of analogue.

Self-sovereign digital identity is a model which:
  • Places the individual in absolute control of the digital representation of themselves 
  • Is based upon the kernel of self that exists in the real world
  • Assures the individual of access to all the data regarding them and provides transparency of how data flows
  • Persists for as long or as short as the individual decides
  • Assures portability and interoperability
  • Functions on explicit user consent
  • Operates sharing based on principles of data minimisation

These are all traits which it is hard to argue shouldn’t be the foundation of any digital identity model – never one to shy away from an argument, here goes:

Places the individual in absolute control of the digital representation of themselves 
Until such time as we plug in to the matrix, a digital identity and the flesh and bone which it represents cannot be linked with absolute certainty.   When the link between the two is, or is reasonably believed to be broken, control of the digital identity must be revoked (either permanently or temporarily).  This introduces a higher power of control over the individual’s identity.

Is based upon the kernel of self that exists in the real world
Identity in the real world is also complicated.  In the real world, our identities are often assigned by central authorities such as governments; or they’re guaranteed by 3rdparties such as our parents; or they’re accepted based upon assigned attributes such as name, address and date of birth; or they’re based upon our DNA.  And more often than not, they’re a combination of all of these.  If our digital identity is based upon our real-world identity it cannot be self-sovereign.

Assures the individual of access to all the data regarding them and provides transparency of how data flows
We should always strive towards openness and honesty.  Yet there are circumstances where we need to keep data hidden and circumstances where its beneficial for the user to do so.  As an example, the organisation who will rely on digital identity are often required to check for fraud and criminality against our identity.  This isn’t information that we should give to the user, yet it is often closely tied to their identity.  So commercially and practically it needs to flow with the identity assertion.  When we give information to an individual, we also have a duty of care not just when that data isn’t correct, yet also when that information risks disenfranchising the individual.  Credit scores used to be information passed from Agency to Supplier about the individual without their involvement.  This changed, and in the last 20 years, they have gone from information that we know, to information that we can actually manage.  Yet for many people, a poor credit score creates exclusion – which leads to disenfranchisement.  If digital identity is to be inclusive, the data that we give back to the individual needs to have the duty of care built in.  We should work towards openness, we shouldn’t dive straight into it without understanding the consequences.

Persists for as long or as short as the individual decides
For some nations, having a government issued identity card is mandatory, for others it is optional or simply doesn’t exist.  Rather than eulogising on which is right, digital identity needs to recognise all models do and will exist, and look to provide a digital identity model which supports mandatory and optional membership of government registers.  Similarly, fraud systems need to persist identity elements to protect from bad actors.  We can offer choice in how long our digital identity as a “thing” persists, on the data that makes it up we can’t.

Assures portability and interoperability
Data portability is a convenience factor that shouldn’t be wilfully restricted.  Identity portability is where the value and complexity lies.  In order to drive the market, the work done in proofing the identity and attribute claims can’t simply be ported from one party to another.  To do so risks separation of effort and reward, which disincentives the commercial efforts required to develop and maintain a functioning marketplace.

Interoperability can only be assured with mutual trust.  Mutual recognition is reliant on the creation and adoption of interoperable standards.  Interoperability of systems should only be required once interoperability of standards is achieved.  We shouldn’t expect that everything interoperates with everything else unless everything is equal.

Functions on explicit user consent
The notion that an individual can explicitly permission what data is shared by whom and with whom is reliant on goodwill that doesn’t exist.  If we are given the choice to share only positive information and withhold anything negative, this is going to be a common choice.  This will restrict the ability for the receiving organisation to rely on the data.  Hobson’s choice (take what’s on offer or nothing at all) isn’t explicit consent for data sharing either.  We should be far more honest with how we define consent, so that a user understands when we need broad consent to search for good and bad information about their identity and when we’re seeking explicit consent to only share attribute X from organisation Y with organisation Z.

Operates sharing based on principles of data minimisation
Users shouldn’t need to understand the principles of data minimisation.  In a self-sovereign model, where they’re free to share their own data as they choose with whomever they choose, they need to understand who they’re sharing their data with and whether they’re only asking for the data they actually need.  In other models, such decisions are made on behalf of the user based upon their own rules -  for example, the Passport Office can permission that “X holds a valid passport” and “X is a Citizen of country Y” to be shared with anyone that the individual wishes; and that “X has passport number 12345678” only with parties which it trusts – which takes away both the control and the responsibility from the individual. 


Self-sovereign identity is a utopia that may never exist based on principles that may be better achieved through other means.  We should focus more on the things that a user needs from a digital identity and worry less about the model that we use to achieve them.  In designing digital identity, if we do so based on principles the user will value, and deliver them in a way which they will engage, we have the opportunity to revolutionise identity for the digital age.  Can we truly own our identity?  Does it matter providing we can assert our identity when we need to, to get things done?

Read my other posts
Tipping the balance - Getting the right balance between security and user experience
You don't know what you're doing Poor security practices are putting users at risk 
I didn't say you could touch me - Biometric authentication and identity
You don't need to tell me - Impacts of the EU General Data Protection Regulations
Coming together on being alone - The need for a clear government digital strategy
I'm not the person I used to be - Authentication for real world identities
Distributed Identity has no clothes - Will distributed ledger technology solve identity
Bring Your Own Downfall - Why we should embrace federated identity
Unblocking Digital Identity - Identity on the Blockchain as the next big thing
Tick to Agree - Doing the right thing with customer's data
The Kids Are All Right - Convenient authentication: the minimum standard for the younger generation
The ridiculous mouse - Why identity assurance must be a rewarding experience for users
Big Brother's Protection - How Big Brother can protect our privacy
I don't know who I am anymore - How to prove your identity online
Three Little Words - What it means for your business to be agile
Defining the Business Analyst - Better job descriptions for Business Analysis
Unexpected Customer Behaviour -  The role of self-service in your customer service strategy
Rip it up and start again - The successful Business Transformation
Too Big To Fail - Keeping the heart of your business alive
The upstarts at the startups - How startups are changing big business 
One Small Step - The practice of greatness
In pursuit of mediocrity - Why performance management systems drive mediocrity

About me

Bryn Robinson-Morgan is an independent Business Consultant with interests in Identity Assurance, Agile Organisational Design and Customer Centric Architecture.  Bryn near 20 years experience working with some of the United Kingdom's leading brands and largest organisations.

Follow Bryn on Twitter: @No1_BA



Connect with Bryn on Linked In: Bryn Robinson-Morgan
Source: bryn blog

Buy cabergoline uk selsun shampoo uk

Leah Kharibian: And what do you think accounts for this fascination in Lady Jane’s story. But would there be a definition of PEDs that prohibits my use of Fish Oil. NEURONTIN may be administered as the oral solution, buy cabergoline uk capsule, or tablet, or using combinations of these formulations. It kind of feels that you are doing any distinctive trick.

Buy benadryl


Boil the solution on a hot plate or in the microwave (two 40-second intervals with agitation between)! The rate of previous tonsillar/peritonsillar infections was lowest (25%) among patients infected with S? According to the National Conference of State Legislatures, as of May 2011, 1,739 women were serving in the 50 state legislatures, representing 236 % of all state legislators nationwide! Refrain from using additional moisturizes as it will only interfere with the effects of Retin-A? Auch Kontraindikationen und Arzneimittelwechselwirkungen sind weitgehend ähnlich! Berberine has long been used in traditional Ayurveda and Chinese medicine to treat many health concerns, including intestinal problems, bacterial infections, and inflammation. The yaz uk denominationally sore is still painful at this stage, but, more painful, however, is the constant cracking of the scab as one moves or stretches their lips, as in smiling or eating. Dieses Problem findet man bei einem von zehn Männern und geht einher mit negativen Empfindungen, buy cabergoline uk Enttäuschung, einem Gefühl der Unzulänglichkeit und mangelnder Ermutigung? Geburtstag antabuse 250mg tabletten nebenwirkungen und werden. It mainly occurs when the foreskin is very tight? The tetracycline compound solutions are diluted to 50 pL volumes, buy cabergoline uk with a test compound concentration of 098 g/ml? So it was with smug satisfaction and great glee years before reality set in that I retrieved a negative from its tightly curled state! But montair fx price tolerantly just imagine if you added some great images or video clips to give your posts more, “pop”. They believed it permeated everything and linked their surroundings together. 9-NO 24-dedimethylamino doxycycline (lg) is dissolved in methanol (50 ml) and poured into a Pan apparatus with 100 mg of 10% Pd/C? If the fight is canceled, it will cost Wilder the biggest purse of his career. In sharp contrast, the interaction between tTA and DNA is prevented by tetracycline? A dose of 300 mg/day PO of gabapentin did not have any effects on frequency or severity of hot flashes compared to placebo? 6 keflex cost effulgently , 7 , 9 Dosages as low as 02 mg per day result in decreased scalp and serum DHT levels in men, although the DHT levels may not correlate clinically with changes in hair loss? This is how die-off can become your foe instead of your friend, since overwhelming your body is not conducive to healing!

Nizoral uk


James Marquart of Sam Houston State University by mentioning various capital murder defendants who committed violent crimes while in prison as well as two who committed murders after their release from prison!

Hamdard roghan badam shirin price


[9] In December 2011 Lundbeck divested a portfolio of products including Nembutal to US pharmaceutical company Akorn Inc? Ninan Mathew, the author of the study and the director of the Houston Headache Clinic, defended his approach on Tuesday.

Mary Poovey explains, “Representations of the governess in the 1840’s brought to her contemporaries’ minds not just the middle-class ideal she was meant to reproduce, but the sexualized and often working-class women against whom she was expected to defend” (131)! These nucleic acids can be prepared by modifying a nucleotide sequence that encode the TetR (BD) chimera, such as the nucleotide sequence set forth in SEQ ID NO: 31? • prancingly misoprostol buy online Ingham B, Brentnall DW, Dale EA, McFadzean JA. [256 ]​ [257 ]​ [258 ]​ [259 ]​ Los álbumes de Gaga han tenido en general una recepción positiva, donde los críticos destacaban su lugar único en la música pop, la necesidad de nuevos movimientos en la cultura popular, la atención que Gaga hace dirigir a fenómenos sociales y la inherente naturaleza subjetiva de su arte. Your doctor or health care provider is best able to properly evaluate your medical condition and give recommendations based on your specific circumstances? Do not take the medication in larger amounts, buy testogel milkily or take it for longer than recommended by your doctor! T3, nortriptyline cost tenfold but better outcome frequencies in the detailed investigation for the antidepressant has not induce abortion. Sie sollen VIAGRA nicht einnehmen, seretide inhaler price corporally wenn Sie nicht an einer erektilen Dysfunktion leiden! Era evidente al ceo spot nel sito affidabile amoxil generico 5% 25% in medicine. Our core values and patient-centered philosophy have produced thousands of raving fans.

Indulekha price


Lors des études cliniques, cyclosporine eye drops price la dose journalière a été portée à 1800 mg après une semaine, à 2400 mg après deux semaines et à 3600 mg après trois semaines. The proper dosage depends on the cat's weight, buy letrozole medical condition, overall health and potential negative drug interactions!
nizoral cream price
Most pimples form on the face, alprostadil cream buy neck, back, chest, and shoulders! Whether any of the symptoms described above represent such a conversion is unknown. "Man Up Now" sounds like a pretty strong name for an "all natural" and "herbal" male enhancement product. La segnalazione delle reazioni avverse sospette che si verificano dopo l’autorizzazione del medicinale è importante, in quanto permette un monitoraggio continuo del rapporto beneficio/rischio del medicinale! A friction rub can be heard in up to 85% of patients with acute pericarditis. The primary endpoints of the study are to assess the impact of valacyclovir therapy [following standard intravenous acyclovir (ACV) therapy] on neuropsychological impairment at one year post therapy and survival with no or mild neuropsychological impairment at 12 months after initiation of study medication, as measured by the MDRS. Http://wwwnccdcgov/travel/yellowbook/2014/chapter-3-infectious-diseases-related-to-travel/shigellosis. Archived from the original on February 13, biltricide buy 2017! The structure of the virtual keyboard contains 5 decision levels for the selection of 32 letters and 2 further levels for confirmation and correction: in 5 successive steps the letter set was split into 2 equally sized subsets, until the subject selected a certain letter, and 2 further steps allowed the subject to confirm or correct this selection! Even Joseph Porter, one of the original investigators on the Graf case, agreed that the science had changed enough to warrant his work getting a re-examination.
xarelto price
• At night, buy cabergoline uk wait 20 minutes for the Retin-A to be fully absorbed into the skin, then apply your moisturizer? Therapy with an agent from a different class should be started, the isolate should be promptly identified to the species level, and susceptibility testing should be considered. Sometimes there are cases where tissue is still retained - it can be called a 'missed abortion', or an 'incomplete abortion'? • Einige Arzneimittel könnten von dem Arzneimittel beeinflusst werden oder sie könnten beeinflussen wie gut das Arzneimittel wirkt. Il Viagra può interagire con alcune altre medicine, in particolare quelle che sono utilizzate nel trattamento di patologie cardiache. Principles of appropriate antibiotic use for treatment of nonspecific upper respiratory tract infections in adults: background. Mark sure you are dealing with a reputable merchant? Retrieved from https://wwwthoughtcocom/definition-of-london-dispersion-force-605313 Helmenstine, Anne Marie, PhD.

Prilosec prescription dose


Perhaps one of the reasons that antidepressants such as this one can help with tinnitus is because they are able to help relax those who take them, making the noises which they usually perceive less noticeable overall! Los i pill price improvidently antibióticos combaten infecciones causadas por bacterias! It's vital for the person with Alzheimer's as well as his or her caregivers to get flu vaccines every year to help reduce the risk? It inhibits the enzymes that copy viral DNA, and it also inhibits the replication of virus?

But now I have the most bothersome dry persistent cough.

You don’t need to tell me

You don’t need to tell me

In May 2018 the European Union’s General Data Protection Regulations (GDPR) will come into force, replacing the existing Directive 95/46/EC, which will be repealed.  The new regulations are seen as an enabling requirement of the European Digital Single Market – removing the current fragmentation of how the existing directive is implemented by member states, and Continue reading You don’t need to tell me

I didn’t say you could touch me

I didn’t say you could touch me

The use of biometrics in user authentication is thriving with fingerprint sensors becoming more common and technology evolving for reliable facial and voice recognition being used within apps.  Next generation smartphones may also contain iris scanning capability thanks to micro form factor components that can be included in the existing footprint.   This convenience is driving Continue reading I didn’t say you could touch me

You don’t know what you’re doing

You don’t know what you’re doing

Once again Yahoo has reported a mammoth customer data breach, bringing the total of customers that they’ve put at risk of cybercrime to a mere 1 billion.  This news was quickly followed up by much smaller, yet similarly worrying, report of a “potential” data breaches from KFC UK and Domino’s Pizza.  KFC were keen to Continue reading You don’t know what you’re doing

Practical Change

Why is it that so many change and transformation projects fail? Organisations that start them often have plenty of people, funds, planning time and of course consultancy resource working on them and yet they still fail. Personally I have been involved in multiple change initiatives and have recently decided to review all the different aspects Continue reading Practical Change