The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception that will cumulatively erode public trust in the Internet.

We have undertaken a project to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Taken together, these laws define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.  They also provide a way for people new to the identity discussion to understand its central issues.  This lets them actively join in, rather than everyone having to restart the whole discussion from scratch.

Those of us who work on or with identity systems need to obey the Laws of Identity.  Otherwise, we create a wake of reinforcing side-effects that eventually undermine all resulting technology.  The result is similar to what would happen if civil engineers were to flaunt the law of gravity. By following them we can build a unifying identity metasystem that is widely accepted and enduring.

The Laws of Identity are available in five formats:

Browser versionPrintable PDF.  WordDIDW powerpointThe laws in point form.

The ideas presented here were refined here in the Blogosphere in a wide-ranging conversation that crossed many of the conventional faultlines of the computer industry, as well as in various private communications. In particular I would like to thank Arun Nanda, Andre Durand, Bill Barnes, Carl Ellison, Caspar Bowden, Craig Burton, Dan Blum, Dave Kearns, Dave Winer, Dick Hardt, Doc Searls, Drummond Reed, Ellen McDermott, Eric Norlin, Esther Dyson, Fen Labalme, Identity Woman Kaliya, JC Cannon, James Kobielus, James Governor, Jamie Lewis, John Shewchuk, Luke Razzell, Marc Canter, Mark Wahl, Martin Taylor, Mike Jones, Phil Becker, Radovan Janocek, Ravi Pandya, Robert Scoble, Scott C. Lemon, Simon Davies, Stefan Brands, Stuart Kwan and William Heath.

The discussion of the laws continues and our documents will be updated periodically to reflect this.



  1. Pingback: Kim Cameron’s Identity Weblog » OPINITY ADOPTING INFOCARD

  2. Pingback: Kim Cameron’s Identity Weblog » SPECTER OF THE SEVENTH LAW

  3. Pingback: Sjors Timmer - blog - » Identity summary

  4. Pingback: Sjors Timmer - blog - » Identity (Virtual and Technical)

  5. Pingback: Sjors Timmer - blog - » Categories of virtual Identity II

  6. Pingback: Kim Cameron’s Identity Weblog » IIW 2006 WAS A SUPEREVENT

  7. Pingback: Kim Cameron’s Identity Weblog » WHAT’S 20 MILLION SSN’S BETWEEN FRIENDS?

  8. Pingback: » Top 5 Identity Fallacies: #3 Centralized Management Means Centralized Data | Digital ID World |

  9. Pingback: Kim Cameron’s Identity Weblog » IDENTITY FALLACIES

  10. Pingback: » Rowley on user-centric identity

  11. Pingback: Kim Cameron’s Identity Weblog » PEOPLE IN THE PROTOCOL

  12. Pingback: » Passion, common vision drove Higgins to success. Not big vendor agendas. | Between the Lines |

  13. Pingback: Kim Cameron’s Identity Weblog » Some recent podcasts

  14. Pingback: Pete Rowley » People in the protocol

  15. Pingback: Kim Cameron’s Identity Weblog » Will industry rescue the identity card?

  16. Pingback: What is identity? « Karma - Identity, Trust and Reputation on the Web

  17. Pingback: Marc’s Voice » Blog Archive » My friend Kim Cameron

  18. Pingback: Kim Cameron’s Identity Weblog » My friend Marc Canter

  19. Pingback: Kim Cameron’s Identity Weblog » First Law of Identity

  20. Pingback: youKarma Blog » Blog Archive » What is identity?

  21. Pingback: onya » Blog Archive » The Full Service Web

  22. Pingback: Kim Cameron’s Identity Weblog » Identity Crisis Podcast

  23. Pingback: EconoMeta » Blog Archive » The Laws of Identity: string theory for the web universe?

  24. Pingback: Papierloos informatie over digitale identiteit elektronische handtekening en betrouwbare uitwisseling » Blog Archive » OpenID voor website authenticatie

  25. Pingback: Kim Cameron’s Identity Weblog » Make sure children are calm

  26. Pingback: The Mailowl Scrolls » Social Networking and the Laws of Identity

  27. Pingback: The Mailowl Scrolls » Talk on CardSpace and The Laws of Identity

  28. Pingback: On Identity and Argumentative Indians and a few other things | confused of calcutta

  29. Pingback: Nazul# : Presentación y Demo - Windows CardSpace

  30. Pingback: Links » CardSpace and the Seven Laws (again)

  31. Pingback: Popular WebLogs » Blog Archive » Nick Shelness on CardSpace

  32. Pingback: Welcome to The Metaverse : The Chicken and the Egg

  33. Pingback: Tim Anderson’s ITWriting - Tech writing blog » Facebook, Comet, FireEagle at Future of Web Apps

  34. Pingback: IdentityBlog - Digital Identity, Privacy, and the Internet's Missing Identity Layer

Comments are closed.