{"id":112,"date":"2005-06-21T00:27:27","date_gmt":"2005-06-21T00:27:27","guid":{"rendered":"\/?p=112"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T04:00:00","slug":"cardsystems-appointed-professor-of-identity","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=112","title":{"rendered":"CardSystems appointed Professor of Identity"},"content":{"rendered":"<p dir=ltr>When I presented the Laws of Identity at the DIDW conference, someone asked how we would &#8220;enforce the laws&#8221;.  I tried to explain that the laws are not what Bob Blakley calls &#8220;desiderata&#8221; &#8211; things that we would like to see.  They are the objective characteristics of an enduring identity system at Internet scale.<\/p>\n<p dir=ltr>Timothy Grayson of Recursive Progress has written very <a href=\"http:\/\/timothygrayson.com\/blog\/archives\/000715.html\" class=\"broken_link\">eloquently<\/a> about how CardSystems has served as his teacher in this regard:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>A while back, I <a href=\"http:\/\/timothygrayson.com\/blog\/archives\/000679.html\" class=\"broken_link\"><font color=#003366>took aim<\/font><\/a> at <a href=\"https:\/\/www.identityblog.com\/stories\/2004\/12\/09\/thelaws.html\" class=\"broken_link\"><font color=#003366>The Laws of Identity<\/font><\/a> with a critique that missed the mark, I&#39;m sure, because I opted (well, truly, I had no choice) not to evaluate it with through the lens of a technologist. One of my comments in regard to Law 2: Minimal Disclosure for a Constrained Use was: <\/p>\n<blockquote><p><i>I think that minimal disclosure for a constrained use is essential for privacy and user control, which, presumably, is what drives Law no. 2. The statement, &#8220;There is no longer the possibility of collecting and keeping information &#8216;just in case&#8217; . . .&#8221; [emphasis mine] is, however desirable and logical an outcome of a need-to-know minimal distribution of information, not part of technical mechanics. It is, as everyone doubtlessly knows, a matter of policy and practice. Somewhere I read not all that long ago that two of the non-obvious forces that are driving the creation of massive directories and databases &#8212; about people &#8212; are that (a) thanks to computing capability it&#39;s easy to accumulate rich records over time and (b) thanks to cheap storage there&#39;s no disincentive to keep accumulating information. These together with the underlying belief that &#8220;information is power&#8221; and all the other marketing and security-driven forces for creation of directories may be a little bit more than the principle of minimal disclosure can overcome, methinks.<\/i><\/p><\/blockquote>\n<p>Today, MSNBC (among others) is carrying a story about data mishandling by a credit card processing firm in Atlanta (<a title=\"Processing firm: Credit card data mishandled - Consumer Security - MSNBC.com\" href=\"http:\/\/msnbc.msn.com\/id\/8286132\/\" class=\"broken_link\"><font color=#003366>Processing firm: Credit card data mishandled &#8211; Consumer Security<\/font><\/a>). This situation speaks to digital identity generally, and at least from one angle to Law 2. Here&#39;s the money quote to support my earlier statement: <\/p>\n<blockquote><p><i><br \/>He [John Perry, chief executive of Atlanta-based CardSystems Solutions Inc., which was hacked] said the data was being stored for &#8220;research purposes&#8221; to determine why some transactions had registered as unauthorized or uncompleted. &#8220;We should not have been doing that,&#8221; Perry said in Monday&#39;s editions of The New York Times. <\/p>\n<p>Under rules established by Visa and MasterCard, processors cannot retain cardholder information after handling transactions.<\/p>\n<p>&#8220;CardSystems provides services and is supposed to pass that information on to the banks and not keep it,&#8221; Joshua Peirez, a MasterCard official, told the Times. &#8220;They were keeping it.&#8221;<\/i><\/p>\n<\/blockquote>\n<p>Oops. Broken law. Technology &#8212; architecture or otherwise &#8212; may or may not have been able to avoid it.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>When I presented the Laws of Identity at the DIDW conference, someone asked how we would &#8220;enforce the laws&#8221;. I tried to explain that the laws are not what Bob Blakley calls &#8220;desiderata&#8221; &#8211; things that we would like to see. They are the objective characteristics of an enduring identity system at Internet scale. Timothy &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=112\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CardSystems appointed Professor of Identity<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/112"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=112"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/112\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}