10.07.2015 Views

Report - Guardian

Report - Guardian

Report - Guardian

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The LSE Identity Project <strong>Report</strong>: June 2005 261- for facts (“attribute values”) to be asserted and trusted without disclosing aspecific identity;- for separate identities to be selectively united, either under the control of theindividual or another party;- for infringement of rules to be penalised by disclosure of identity if and only ifinfringement occurs.Embedded master identifiers can also be blacklisted across multiple segmented activitydomains to ensure that fraudsters in one domain can be denied access to services inother domains, while preserving the privacy of honest individuals. Similarly, serviceproviders would be able to securely share identity assertions across unlinkable activitydomains by directing these assertions in digitally protected form through the ID cards oftheir data subjects in a privacy-friendly manner.There is thus ample scope for designing identity systems for e-government with rulesthat can be specifically tailored to intentionally isolated domains of health entitlementand patient records, taxation and benefit claims, border-control and travel, and interoperationwith private sector systems. The rules of each system would constitute theprocedure for Data Protection compliance, and could allow good governance of datasharingfor legitimate public policy reasons, whilst limiting infringements of privacy tothe minimum necessary as required by ECHR Article 8.Such flexibility does not of itself answer difficult questions about how much datasharingand non-consented identification is justifiable in a democratic societyconformant with human rights. However adopting such a fine-grained system allows theprocesses of democratic legislation and oversight many more options than a monolithicidentity system predicated on a unique and ubiquitously traceable identity for eachindividual. Monolithic systems have much poorer resilience and scaling, and offernugatory privacy, security, and reliability protection in comparison to Federated ID.The practice of illicitly loaning Federated ID credentials to other people is discouragedby the fact that those to whom a credential is loaned can damage the owner’s reputation,incur liabilities in that domain and learn personal information.Nevertheless, biometrics may be necessary for applications requiring a high degree ofidentification (such as travel and border-control). A local-biometric card scheme couldbe devised which checked for duplicate IDs in a compartmentalised way.Simplifying the cryptographic details, the card could present a biometric templateencrypted with a different key specific to the NHS, Asylum/Immigration etc., in such away that duplicate (encrypted) biometric identities could be detected and traced within alimited domain (e.g. an international border-control system), but ad-hoc data-matchingacross domains could not occur unless designed and authorised.Therefore, the oft made observation that the jurisprudence of ECHR plainly allowsnational identity cards, must be reconsidered when contemplating a system based on ageneral purpose central biometric database and a monolithic unique identity facilitatingarbitrary infringement of Article 8. The impact of all previous identity card systems has

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!