- 1 FILE NOTESNational Strategy for Trusted Identities in CyberspacePrivacy Workshop
- 1.1 June 27-28, 2011 / MIT Media Lab / Boston, Mass.
- 1.2 SPEAKER: Keynote and host -- Sandy Pentland, MIT Media Lab
- 1.3 SPEAKER: Jeremy Grant: Personal data: The emergence of a new asset class
- 1.4 What problems are sought to be solved?
- 1.5 Grant: A few words about privacy
- 1.6 SPEAKER: Naomi Lefkovitz, White House
- 1.7 Q&A session
National Strategy for Trusted Identities in Cyberspace
June 27-28, 2011 / MIT Media Lab / Boston, Mass.
By Bill Densmore
Hash tags: #nstic.mit #nstic
SPEAKER: Keynote and host -- Sandy Pentland, MIT Media Lab
Keynote speaker Alex “Sandy” Pentland, former head of the Media Lab. He is pioneer of the mobile social web:
“Personal data is the new oil of the internet and the new currency of the diital world.” Meglena Kuneva, European Consumer Commissioner.
Telcoms have to collect personal data to make money. “They see this as their way forward. …. Most large media companies see this as their route back to profitability.”
In two years there will be 200 million medicial devices on and inside people, according to executive at Qualcomm.
“All the private data about people coming through one channel . . . that’s the real point of pain here . . . do not be distracted by Facebook or Google.”
SPEAKER: Jeremy Grant: Personal data: The emergence of a new asset class
“The only people you can trust with this data, are the people themselves. People have to have ownership of their data,” he says. So how do you promote ownership of personal data by the people themselves. Key is to think if data as valuable.
“Companies are willing to do this, because if they give you a copy of your data . . . you have the ability to use it in whatever value-producing way you choose.”
- Privacy-enhancing and voluntary -- user choice of providers
- Secure and resilient
- Cost-effective and easy to use
What problems are sought to be solved?
- User names and passwords are broken
- Identity-theft costs are rising – 11.7M victims, $17.3B cost over two years
- Cybercrime is also on the rise
- Goal: By Jan. 1, 2016 – an identity ecosystem that is interoperable.
Grant says government wants to lead a private sector effort but will not develop an infrastructure itself – rather will collaborate and use private solutions. He quotes President Obama as saying the idea is to not force anyone to give up the anonymity they enjoy on the web if they wish to be anonymous.
Grant: “Government will paricipate in this group … but it does not mean we will lead this effort.” Government wants to advocate for and protect individuals. A June 8 notice of inquiry is due July 22, focused on steering group structure, initiation, representation of stakeholders and international considerations.
They hope to get ideas, lessons and input from stakeholders. Submissions are part of the public record and there will be a public report with recommendatiosn fr addressing, at a minimum, questions raised on the four key issues.
Grant: A few words about privacy
- Enhancement of privacy a guiding principle
- Minimum information required to be shared is the idea
- Preserve positive privacy benefits of offline transactions, mitigate bad aspects
A key objective: Developed improved privacy-protection mechanisms
The executive branch will work with private sector to make sure that identity providers:
- Limit collection and retention of data, provide notice, minimize data aggregation and linkages across transactions, allow easy deletion by end-user, accuracy standards, allow transfers, accountability about how information is actually used, and privde effective redress mechanisms.
SPEAKER: Naomi Lefkovitz, White House
Lefkovitz is on the national security staff of the executive office of the president.
“I do want to spend a few minutes talking about why NSTIC puts such an emphasis on privacy.”
Obama has placed emphasis on cybersecurity. It is possible to have privacy and secure identities, she believes. The danger is that we could arrive at a system with unprecedented tracking without control by individuals. If not careful: “We will have set in motion this very thing.” But not being proactive, and building privacy protections in at the early stages, the result could easily by an uncontrolled evolution of such unprecedented tracking.
- What do privacy protections mean? What will be its impact on business? Privacy is a subjective term and concept.
NSTIC not implemented in a vacume. A recognition that we need a comprehensive and integrated approach toward privacy. What NSTIC is calling for is consistent with a larger movement around privacy.
“The administration through NSTIC feels it is possible to have both privacy and more secure online transactions. But it is not inevitable . . . the U.S. government is committed to working with all the stakeholders . . . to making this possible.”
‘’’A person from PayPal wants to know how much is now about the extent to which national office will “certify” an identity provider as accredited for government purposes.’’’ ANSWER: Nothing specific.
‘’’Karen Sollins, MIT: Concern that for it to work, businesses have to understand how to make money in it. That is a huge tension in this space. Until we get a better idea of that it is very hard to talk about governance … why are people going to want to go into it. Why are Google and Facebook, who are already providing their own models … what is going to bring them into the folk?’’’
‘’’Consumers do ease of use: What are you going to do proactively on site you don’t collect information on? Nothing prevents Google from taking and keeping information. Right now that information is not collected by the federal government. How do we make sure it is not collected by anyone else, either.’’’