Posts Archive

Recent posts


KYC\AML and Self Sovereign Identity

traditional KYC/AML practices can give way to a more practical framework, where businesses can remain compliant with regulations and collect data without threatening privacy, data security, and breaching data laws.

Updated: 2023-06-16 2 minute read

Tags:
Compliance
Cryptocurrency
KYC
Real World
eKYC

Healthcare and Self Sovereign Identity

Most healthcare organizations are and should be, focused on their core business pursuits, such as patient care or processing insurance claims. Information security and identity management is not their core business, yet is a critical factor in compliant, secure business operations.

Updated: 2023-06-16 8 minute read

Tags:
Affinidi
DIZME
Dock
Evernym
Gravity Earth
Healthcare
LFPH
Real World
SMART

Education and Self Sovereign Identity

Since most of the educational institutes were facing security crises, new challenges are added to the security system to identify and manage the users’ access to these platforms.The most relevant challenges include but not limited to, legacy identity infrastructure, student lifecycle and users ac...

Updated: 2023-06-16 6 minute read

Tags:
ACE
Azure
DIF
Digitary
Education
Evernym
Fluree
IDRamp
Microsoft
Open Badges
RMIT
Real World
Velocity Network

PICOs: Persistent Compute Objects

every pico is serverless and cloud-native, presenting an API that can be fully customized by developers. Because they’re persistent, picos support databaseless programming with intuitive data isolation. As an actor-model programming system, different picos can operate concurrently without the nee...

Updated: 2023-06-09 3 minute read

Tags:
IOT
PICO

Internet of Things (IOT)

Safety and security rests with all involved in authorizing updates, how and when they are applied as well as the right to repair when Things are no longer officially supported. Shared device lifecycle assurance is the basis for verifiable service histories of Things which give data provenance. Wh...

Updated: 2023-06-17 12 minute read

Tags:
Caution
Digital Twin Consortium
Digital Twins
European Commission
IOT
ITN
LFPH
MOBI
Microsoft
Peaq
Sophie Project
Venafi

Biometrics and Self Sovereign Identity

Instead of putting PII and biometrics in the same database, we need to put them in different places, but prove that there’s a link between the holder of a biometric cred and the holder of other PII.

Updated: 2023-06-09 4 minute read

Tags:
Biometrics

Sidetree Working Group - DIF

Architecturally, Sidetree-based DID Method implementations are overlay networks composed of independent peer nodes (Sidetree nodes) that interact with an underlying decentralized anchoring system (as illustrated under Network Topology) to write, observe, and process replicated DID PKI state opera...

Updated: 2023-06-12 3 minute read

Tags:
DIF
ION
Sidetree

Data Governance Act

EU DATA ACT – MAKING DATA PORTABILITY ACTIONABLE 2022-02-25 MyData

Updated: 2023-06-10 4 minute read

Tags:
Data Governance Act
EU
Europe
MyData
Policy

United Kingdom

The government is committed to realising the benefits of digital identity, without creating ID cards. Earlier this year we published a draft of the UK digital identity and attributes trust framework. This document sets out what rules and standards are needed to protect people’s sensitive identity...

Updated: 2023-06-09 7 minute read

Tags:
Digital Staff Passport
Europe
NHS
Policy
Real World
UK

Switzerland

The preliminary draft of the federal law declared the purpose of the E-ID to be to ensure “secure identification by means of E-ID among private individuals and with authorities”. The protection of the personality and fundamental rights of individuals is to be provided by the following principles

Updated: 2023-06-09 4 minute read

Tags:
Europe
Policy
Switzerland

Digital Identity New Zealand

Our government is embarking on a journey to create A Digital Strategy for Aotearoa that seeks to respond to the social, economic, education and cultural opportunities from digital technology, along with the risks that these technologies can bring.

Updated: 2023-06-07 4 minute read

Tags:
Aotearoa
DINZ
DISTF
New Zealand
Policy

India

Another functional question that needs to be resolved concerns how we communicate the value of data stewardship as an ideal, and relatedly the value of data itself. Given the unequal relationships between technology companies and people, the fact that data is a valuable resource that can be used ...

Updated: 2023-06-07 5 minute read

Tags:
Aadhaar
Hyperledger
India
Orgbook
Policy