SlideShare uma empresa Scribd logo
1 de 26
AGE VERIFICATION:
REACHING A TIPPING POINT
SSSSS RACHEL O’CONNELL
Dr.

ISSE CONFERENCE, 2013.
BACKGROUND
• Research Consultant
• Oxford Internet Institute:
– Effective Age Verification Techniques: Lessons to be Learnt from the Online Gambling
Industry

• Ctrl_Shift
–

A market analyst and consulting business

• Member of OIX and the GSMA’s UK Assured legal working group
• Led the UK Council for Child Internet Safety (UKCCIS) project group on age
verification and report back to minsters on an annual basis.
• Advisor to commercial organisations on both the policy requirements and
business opportunities associated with identity management and age
verification
• Co-founder of GroovyFuture.com.
AREAS COVERED
• The 2008 perspective and the artificial divide
• Catalysts and Tipping Points: Pit stop in 2013 and a 2020 horizon scan
• Emergence of a data driven economy:
–
–
–
–
–
–

Trust Frameworks
Electronic ID – NSTIC – Minors Trust Framework ($1.6m)
Mobile ID – alpha projects, introduction of age verification into payment protocols
Digital economy – disruption in the payments sector, sub-accounts
Internet of Things –
Personal Data Empowerment Tools and Services – Quantified self

• E-ID ecosystem, IDAAS, IDPs, Attribute Exchanges
– Business use cases: ROI
– Sources of attributes
– Opportunities and challenges
2008 View of Age Verification
•
•
•
•
•

Burdensome compliance cost
Little or no elevation in assurance
Open to repudiation
Privacy concerns
No viable commercial or liability
models
• Not scalable, absence of standards
• Not an effective means to mitigate
risks
• Barrier to innovation
Artificial Divide
• ID and age verification – lessons from the evolution of data bureaus and
CRA’s to meet specific business sector needs
• Lack of access to datasets not only about children and young people but
also the unbanked – thin files.
• Assumption that under 18’s had limited purchasing power
• Data sources: Government, schools, banks
• COPPA requirements: Permissioned access – sites excluded young people
aged 12 and below (to difficult box)
• Struggle to identify business cases with a clear ROI – not seen as a
business enabler
CATALYSTS AND TIPPING
POINTS
NASCENT INTEROPERABLE ECOSYSTEMS

I
ELECTRONIC ID
•
•

•

Electronic identity ecosystems are a key enabler of the
“digital economy”
NSTIC aims to enable “Individuals and organizations [to]
utilize secure, efficient, easy-to-use, and interoperable
identity solutions to access online services in a manner that
promotes confidence, privacy, choice, and innovation.”

•

Provide scalable, privacy preserving, commercially viable,
privacy preserving permissioned use of attributes.
STORK

•

Proposed regulation

•

Alpha project – retailers

•

Reducing the barriers to permissioned use of age
attributes
MINOR’S TRUST FRAMEWORK
MOBILE ID
•
•
•
•

Mobile ID – GSMA/ OIX Commercial Trust Framework
SIM-based digital authentication solution
Embedded SIM/MIM – Machine Identification Modules
With the huge market potential and demand stimulated by immense
traffic from trillions of connected devices, the Internet of Things provides
operators with the means to expand their service portfolios and increase
revenues.
ASSURED UK

 Assured UK is a collaborative forum established to develop a
personal data and identity attribute exchange marketplace

 It encompasses the whole ecosystem
 Banking
 Retailers
 Mobile Network Operators
 Identity experts
 Government

12
VISION
Establish a secure and trusted marketplace that enables consumers to
control, share and benefit from their digital identities and personal
information

PRINCIPLES
1. The consumers interests are uppermost and at all times the individual controls
storage and exchange of data
2. We will seek to reuse existing standards work where ever possible and align with
the work of UK government.
3. We will seek to enable the maximum product and business model diversity,
consistent with inter-working between participants.
OBJECTIVES
 Define an end-2-end framework and pilot use case by
year end
a) Architect standards for identity attribute verification and
authentication
b) Define a permissions system for the exchange of those attributes
c) Develop a legal framework that will facilitate the interoperability
between different players in the ecosystem, while ensuring users’
data protection and privacy, encompassing:
i.
ii.
iii.
iv.

Risk & Liability flows
Auditing framework
Privacy
Regulatory compliance

d) Establish and prove a commercial model for identity attribute
exchange
e) Pilot and demonstrate efficient marketplace for digital identity and
attributes
TRUST FRAMEWORKS
• Trust is central to the operation of a data driven economy.
• Trust is crucial in the context of delivery and consumption of electronic
interactions between parties including consumers, governments and the
private sector.

• In order to both provide and benefit from digital services, companies,
public administrations and consumers need to distinguish between
trusted and non-trusted counterparts online; they also need to be
recognised as trusted parties themselves.
• A trust framework can reduce the need to negotiate a multitude of
individual commercial contracts.
TRUST FRAMEWORKS: E-ID, COMMERICIAL
(MOBILE ID),INTERNET of THINGS, PDETS
INTERNET OF THINGS
• Education
• Assert trusted credentials (LoA)
• Recognise trusted intermediaries
(accreditation)
• Quantified self - Databetes
• Convenience, security
• Active participants
IoT INFORSEC AND TRUST
• Inofsec properties of the IoT are often
difficult to understand for its users, because
they are hidden in pervasive systems and
small devices manufactured by a large
number of vendors.
• Trustworthiness, security functions and
privacy implications are vast, and must be
assessable to users and consumers.
• uTRUSTit enables system manufacturers and
system integrators to express the underlying
security concepts to users in a
comprehensible way, allowing them to make
valid judgments on the trustworthiness of
such systems.
PDETS TRUST FRAMEWORKS
• Forging new social contracts
• The Respect Trust Framework is designed to give
individuals control over the sharing of their
personal data on the Internet.
• Mydex, the personal data store and trusted
identity provider, has also had its “Mydex Trust
Framework” listed by the Open Identity Exchange.
• Connet.me has had its Trust Model and Business
Model for Personal Data listed by OIX
• The Personal Network: A New Trust Model and
Business Model for Personal Data
• Access to data that companies make available and
authoritative personal data sources – university
exam results
GOVERNANCE AS A SOFTWARE SERVICE
• ID³ believes, governance principles should be expressed as software that is
then able to evolve to incorporate advances in technology and to support
changing market and societal requirements.
• Using these tools, people will be able to ensure the privacy of their
personal information, leverage the power of networked data, and create
new forms of online coordination, exchange and self-governance.
• They will be able to forge new “social contracts” and participate in new
types of legal and regulatory systems for managing organizations, markets
and their social and civic lives. These systems will conform to both
international legal standards and to the specific social norms and priorities
of its members.
NASCENT ECOSYSTEMS: Sources and Consumers of
Verified and Permissioned Identities and Attributes

I
DATA SOURCES:
Permissioned Attributes
Pit stop 2014 -2015
•
•
•
•
•
•
•
•
•
•

E-ID e.g. Spain, NEM ID
WAYF, SAML
Mobile operators - International student card
Banks
Government issued ID docs – Secure key
Digital Life Data – Trulioo
Personal Data Empowerment Tools and Services
Biometrics
OCR
Traditional data bureaus and CRA’s
BUSINESS NEEDS:
• COPPA 2.0 – email Plus
• 20-40% of email+ emails end up in
Spam folders
• Freemium model
• Permission dashboard – set spending
limits –
• Enable self-regulatory measures –
• ROI
•
•
•
•

Omni-channel retailers
Payment providers
Alcohol
Advertising industry - broadcast
versus engagement
BENEFITS
• Permissioned use of attributes (includ. age)
– Higher levels of customer acquisition
– Trust elevation – LOA’s
• Remote on-boarding

– Differing levels of assurance

• Tailored to meet business rules
–
–
–
–
–
–

Low integration costs
Modular, highly configurable
Scalable, viable low cost
Reusable tokens
UX
Reputation, foster brand loyalty
LOOKING TO THE FUTURE
•
•
•
•
•
•
•
•
•
•
•
•

A greater variety of data sources will be accessible and permissioned, these can be
cross checked and an assurance level/ risk profile calculated to meet specific business
rules.
Granularity with respect to permissions (e.g. time stamped - miicard) and user centric
controls
Artificial barriers removed – young people will be enabled to become active
participants in the digital economy, internet of things, manage their personal data
New social contracts will be forged
Business development and ROI opportunities
Many other benefits..
Challenges
Information security
Threat vectors – bad actors, untrustworthy intermediaries
Scale of potential unintended consequences
Roles and responsibilities of regulators
Managing the processes of accreditation, oversight, redress
THANK YOU FOR LISTENING
HAPPY TO ANSWER ANY QUESTIONS?
rachel@technologist.com
Twitter: @racheloconnell
www.GroovyFuture.com

Mais conteúdo relacionado

Mais procurados

E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingIJERA Editor
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content RegulationEndcode_org
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Secure Identity Alliance
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsNaveed Zahoor
 
Electronic and mobile commerce
Electronic and mobile commerceElectronic and mobile commerce
Electronic and mobile commerceyham manansala
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018Dan Storbaek
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-BusinessEyad Almasri
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesPalani Kumar
 

Mais procurados (19)

E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and Prototyping
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content Regulation
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 
5362098
53620985362098
5362098
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systems
 
Electronic and mobile commerce
Electronic and mobile commerceElectronic and mobile commerce
Electronic and mobile commerce
 
E-Commerce: Digital Markets, Digital Goods
E-Commerce: Digital Markets, Digital GoodsE-Commerce: Digital Markets, Digital Goods
E-Commerce: Digital Markets, Digital Goods
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerce
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
 
Iti
ItiIti
Iti
 
Fintech.
Fintech.Fintech.
Fintech.
 

Semelhante a Age Verification: Reaching a Tipping Point

Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Trust exchange webinar nov 2020
Trust exchange webinar nov 2020Trust exchange webinar nov 2020
Trust exchange webinar nov 2020Trust Exchange
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Digital Catapult
 
Introduction to Digital e-marketing management
Introduction to Digital e-marketing managementIntroduction to Digital e-marketing management
Introduction to Digital e-marketing managementVIRUPAKSHA GOUD
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
 
ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)scomes
 
Lecture_2_Competing_with_Information_and_Communication_Technology.pdf
Lecture_2_Competing_with_Information_and_Communication_Technology.pdfLecture_2_Competing_with_Information_and_Communication_Technology.pdf
Lecture_2_Competing_with_Information_and_Communication_Technology.pdfDebelaTekabe
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity managementshivan82
 
Using the Cloud to Attract, Engage & Retain Your Customers
Using the Cloud to Attract, Engage & Retain Your CustomersUsing the Cloud to Attract, Engage & Retain Your Customers
Using the Cloud to Attract, Engage & Retain Your CustomersWainhouse Research
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...FinTechLabs.io
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyGoutama Bachtiar
 

Semelhante a Age Verification: Reaching a Tipping Point (20)

Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Trust exchange webinar nov 2020
Trust exchange webinar nov 2020Trust exchange webinar nov 2020
Trust exchange webinar nov 2020
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Project 13 #COMIT2018
Project 13 #COMIT2018Project 13 #COMIT2018
Project 13 #COMIT2018
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Smac Technology
Smac TechnologySmac Technology
Smac Technology
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
Introduction to Digital e-marketing management
Introduction to Digital e-marketing managementIntroduction to Digital e-marketing management
Introduction to Digital e-marketing management
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)
 
Lecture_2_Competing_with_Information_and_Communication_Technology.pdf
Lecture_2_Competing_with_Information_and_Communication_Technology.pdfLecture_2_Competing_with_Information_and_Communication_Technology.pdf
Lecture_2_Competing_with_Information_and_Communication_Technology.pdf
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management
 
Using the Cloud to Attract, Engage & Retain Your Customers
Using the Cloud to Attract, Engage & Retain Your CustomersUsing the Cloud to Attract, Engage & Retain Your Customers
Using the Cloud to Attract, Engage & Retain Your Customers
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Age Verification: Reaching a Tipping Point

  • 1. AGE VERIFICATION: REACHING A TIPPING POINT SSSSS RACHEL O’CONNELL Dr. ISSE CONFERENCE, 2013.
  • 2. BACKGROUND • Research Consultant • Oxford Internet Institute: – Effective Age Verification Techniques: Lessons to be Learnt from the Online Gambling Industry • Ctrl_Shift – A market analyst and consulting business • Member of OIX and the GSMA’s UK Assured legal working group • Led the UK Council for Child Internet Safety (UKCCIS) project group on age verification and report back to minsters on an annual basis. • Advisor to commercial organisations on both the policy requirements and business opportunities associated with identity management and age verification • Co-founder of GroovyFuture.com.
  • 3. AREAS COVERED • The 2008 perspective and the artificial divide • Catalysts and Tipping Points: Pit stop in 2013 and a 2020 horizon scan • Emergence of a data driven economy: – – – – – – Trust Frameworks Electronic ID – NSTIC – Minors Trust Framework ($1.6m) Mobile ID – alpha projects, introduction of age verification into payment protocols Digital economy – disruption in the payments sector, sub-accounts Internet of Things – Personal Data Empowerment Tools and Services – Quantified self • E-ID ecosystem, IDAAS, IDPs, Attribute Exchanges – Business use cases: ROI – Sources of attributes – Opportunities and challenges
  • 4. 2008 View of Age Verification • • • • • Burdensome compliance cost Little or no elevation in assurance Open to repudiation Privacy concerns No viable commercial or liability models • Not scalable, absence of standards • Not an effective means to mitigate risks • Barrier to innovation
  • 5. Artificial Divide • ID and age verification – lessons from the evolution of data bureaus and CRA’s to meet specific business sector needs • Lack of access to datasets not only about children and young people but also the unbanked – thin files. • Assumption that under 18’s had limited purchasing power • Data sources: Government, schools, banks • COPPA requirements: Permissioned access – sites excluded young people aged 12 and below (to difficult box) • Struggle to identify business cases with a clear ROI – not seen as a business enabler
  • 6.
  • 9. ELECTRONIC ID • • • Electronic identity ecosystems are a key enabler of the “digital economy” NSTIC aims to enable “Individuals and organizations [to] utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.” • Provide scalable, privacy preserving, commercially viable, privacy preserving permissioned use of attributes. STORK • Proposed regulation • Alpha project – retailers • Reducing the barriers to permissioned use of age attributes
  • 11. MOBILE ID • • • • Mobile ID – GSMA/ OIX Commercial Trust Framework SIM-based digital authentication solution Embedded SIM/MIM – Machine Identification Modules With the huge market potential and demand stimulated by immense traffic from trillions of connected devices, the Internet of Things provides operators with the means to expand their service portfolios and increase revenues.
  • 12. ASSURED UK  Assured UK is a collaborative forum established to develop a personal data and identity attribute exchange marketplace  It encompasses the whole ecosystem  Banking  Retailers  Mobile Network Operators  Identity experts  Government 12
  • 13. VISION Establish a secure and trusted marketplace that enables consumers to control, share and benefit from their digital identities and personal information PRINCIPLES 1. The consumers interests are uppermost and at all times the individual controls storage and exchange of data 2. We will seek to reuse existing standards work where ever possible and align with the work of UK government. 3. We will seek to enable the maximum product and business model diversity, consistent with inter-working between participants.
  • 14. OBJECTIVES  Define an end-2-end framework and pilot use case by year end a) Architect standards for identity attribute verification and authentication b) Define a permissions system for the exchange of those attributes c) Develop a legal framework that will facilitate the interoperability between different players in the ecosystem, while ensuring users’ data protection and privacy, encompassing: i. ii. iii. iv. Risk & Liability flows Auditing framework Privacy Regulatory compliance d) Establish and prove a commercial model for identity attribute exchange e) Pilot and demonstrate efficient marketplace for digital identity and attributes
  • 15. TRUST FRAMEWORKS • Trust is central to the operation of a data driven economy. • Trust is crucial in the context of delivery and consumption of electronic interactions between parties including consumers, governments and the private sector. • In order to both provide and benefit from digital services, companies, public administrations and consumers need to distinguish between trusted and non-trusted counterparts online; they also need to be recognised as trusted parties themselves. • A trust framework can reduce the need to negotiate a multitude of individual commercial contracts.
  • 16. TRUST FRAMEWORKS: E-ID, COMMERICIAL (MOBILE ID),INTERNET of THINGS, PDETS
  • 17. INTERNET OF THINGS • Education • Assert trusted credentials (LoA) • Recognise trusted intermediaries (accreditation) • Quantified self - Databetes • Convenience, security • Active participants
  • 18. IoT INFORSEC AND TRUST • Inofsec properties of the IoT are often difficult to understand for its users, because they are hidden in pervasive systems and small devices manufactured by a large number of vendors. • Trustworthiness, security functions and privacy implications are vast, and must be assessable to users and consumers. • uTRUSTit enables system manufacturers and system integrators to express the underlying security concepts to users in a comprehensible way, allowing them to make valid judgments on the trustworthiness of such systems.
  • 19. PDETS TRUST FRAMEWORKS • Forging new social contracts • The Respect Trust Framework is designed to give individuals control over the sharing of their personal data on the Internet. • Mydex, the personal data store and trusted identity provider, has also had its “Mydex Trust Framework” listed by the Open Identity Exchange. • Connet.me has had its Trust Model and Business Model for Personal Data listed by OIX • The Personal Network: A New Trust Model and Business Model for Personal Data • Access to data that companies make available and authoritative personal data sources – university exam results
  • 20. GOVERNANCE AS A SOFTWARE SERVICE • ID³ believes, governance principles should be expressed as software that is then able to evolve to incorporate advances in technology and to support changing market and societal requirements. • Using these tools, people will be able to ensure the privacy of their personal information, leverage the power of networked data, and create new forms of online coordination, exchange and self-governance. • They will be able to forge new “social contracts” and participate in new types of legal and regulatory systems for managing organizations, markets and their social and civic lives. These systems will conform to both international legal standards and to the specific social norms and priorities of its members.
  • 21. NASCENT ECOSYSTEMS: Sources and Consumers of Verified and Permissioned Identities and Attributes I
  • 22. DATA SOURCES: Permissioned Attributes Pit stop 2014 -2015 • • • • • • • • • • E-ID e.g. Spain, NEM ID WAYF, SAML Mobile operators - International student card Banks Government issued ID docs – Secure key Digital Life Data – Trulioo Personal Data Empowerment Tools and Services Biometrics OCR Traditional data bureaus and CRA’s
  • 23. BUSINESS NEEDS: • COPPA 2.0 – email Plus • 20-40% of email+ emails end up in Spam folders • Freemium model • Permission dashboard – set spending limits – • Enable self-regulatory measures – • ROI • • • • Omni-channel retailers Payment providers Alcohol Advertising industry - broadcast versus engagement
  • 24. BENEFITS • Permissioned use of attributes (includ. age) – Higher levels of customer acquisition – Trust elevation – LOA’s • Remote on-boarding – Differing levels of assurance • Tailored to meet business rules – – – – – – Low integration costs Modular, highly configurable Scalable, viable low cost Reusable tokens UX Reputation, foster brand loyalty
  • 25. LOOKING TO THE FUTURE • • • • • • • • • • • • A greater variety of data sources will be accessible and permissioned, these can be cross checked and an assurance level/ risk profile calculated to meet specific business rules. Granularity with respect to permissions (e.g. time stamped - miicard) and user centric controls Artificial barriers removed – young people will be enabled to become active participants in the digital economy, internet of things, manage their personal data New social contracts will be forged Business development and ROI opportunities Many other benefits.. Challenges Information security Threat vectors – bad actors, untrustworthy intermediaries Scale of potential unintended consequences Roles and responsibilities of regulators Managing the processes of accreditation, oversight, redress
  • 26. THANK YOU FOR LISTENING HAPPY TO ANSWER ANY QUESTIONS? rachel@technologist.com Twitter: @racheloconnell www.GroovyFuture.com

Notas do Editor

  1. Trulioo Internet Life Verification utilizes “digital life data” - social network interactions, crowd sourcing, Internet information repositories and behavioral data – to perform identity vetting and information verification.