Identity management of e-ID, privacy and security in Europe. A human rights view

نویسنده

  • Paul De Hert
چکیده

With privacy enhancing identity management, end users are given better ways for managing their identities for specific contexts. One could easily argue that the need to implement identity management systems that are privacy enhancing follows from the EU data protection regulation. One of the challenges while developing privacy enhancing identity management is getting governments to become genuinely interested, both in their capacity of data processing organisation and legislator or policy maker. Another challenge, this time for the private sector, is to find the right balance between data protection perfection and simplicity or users’ convenience, while developing privacy enhancing identity management systems. After a brief discussion of these challenges we discuss the growing human rights recognition of the value of digital identity and its management. In particular, the German constitutional court seems to pave the way for a basic right to have digital identity protected and secured. a 2008 Elsevier Ltd. All rights reserved. 1. General and a new personality if you wish. Often we do not. In order Privacy is generally associated with the protection of the integrity, autonomy and private life of the individual. Basically, it’s about people’s right to choose how they want to live their life, and what things they want to keep private. Do we have a choice when interacting online? Often we do. The emergence of the Internet has allowed more and more people to discover certain aspects of identity formation hitherto unknown. Online worlds let you create a character, a home agement in e-society’, p ical and Policy Implicatio ship and the Israeli Cent Identity Management’, I identity management for ntität – die europäische P 531–532. er Ltd. All rights reserved to obtain certain goods or services we are required to identify ourselves in ways beyond our control. Identity management (IDM) is commonly referred to as the set of processes and tools that serve to establish the identity of a user (e.g. enrol an employee, customer, contractor) in a system. Today a trend towards user-centricity and privacy enhancing identity management is noticeable, with the EU funding research initiatives such as Prime enabling more user control. User-centricity distinguishes itself from other aper presented at NATO Advanced Research Workshop (ARW) on ns of Automated Systems for Human Identification (Ait) organised er for the Study of Bioterrorism in Jerusalem, September 2–4, 2006 PTS reports, 2002, vol. 67 (http://www.jrc.es/home/report/english/ everyone,’ ACM, 2005, p. 20–27. For a more comprehensive overerspektive. Übersicht über aktuelle EU-Projekte’, DuD – Datenschutz

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure & privacy-preserving eID systems with Attribute-based credentials

National electronic identification (eID) systems aim to provide universal, unique and reliable identification and authentication mechanisms to the citizens. Many countries in Europe have already introduced or are about to introduce electronic ID cards to their citizens. The increasing number of eID infrastructures and initiatives have been taken to scale the eID systems to support both eGovernm...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Security and Privacy Perceptions of E- ID: A Grounded Research

This paper reports on research in progress that explores the perceptions of security and privacy of UK citizens regarding electronic identity cards. In the wake of the UK National Identity Scheme proposals and with the introduction of electronic identity cards in the coming years, it is important to understand the perspectives of UK citizens. The Scheme sparked furious public debate, but as yet...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Macroeconomics of Privacy and Security for Identity Management and Surveillance

Purpose – The purpose of this paper is to develop an approach for investigating the impact of surveillance technologies used to facilitate security and its effect upon privacy. Design/methodology/approach – The authors develop a methodology by drawing on an isomorphy of concepts from the discipline of Macroeconomics. This proposal is achieved by considering security and privacy as economic good...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sec. Techn. Report

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2008