{"id":226,"date":"2005-02-14T06:41:00","date_gmt":"2005-02-14T06:41:00","guid":{"rendered":"\/?p=226"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T04:00:00","slug":"back-to-you-william","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=226","title":{"rendered":"Back to you, William"},"content":{"rendered":"<p>William Heath of <a href=\"http:\/\/http:\/\/www.idealgovernment.com\/\" class=\"broken_link\">Ideal Government<\/a> has been thinking and talking with colleagues in the United Kingdom about what we have called the Law of Control:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p><font size=2>Technical identity systems MUST only reveal information identifying a user with the user&#39;s consent.<\/font><\/p>\n<\/blockquote>\n<p dir=ltr><font size=2>He <a href=\"http:\/\/www.idealgovernment.com\/index.php\/weblog\/not_quite_happy_with_law_of_control\/\" class=\"broken_link\">writes<\/a>:<\/font><\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p dir=ltr>Kim&#39;s laws (as well as Liberty Alliance and the state-of-the-art identity debate) take shape in a crucible of US-based entrpreneurial creativity. This is principally and primarily business and consumer focussed. Just like every other aspect of IT it needs a bit of a <strong>stretch and a rethink<\/strong> when we come to apply it to public services.<\/p>\n<p>Imagine we get arrested (for a crime of conscience, eg deliberate trespass on a foreign military base). We don&#39;t control the process as our identity details are taken by the police and passed to court to prison to probation services. Yet we may accept collectively that institutions within a democratically elected government have the right to do this to one of us. In this sense &#8220;collective consent&#8221; (or just &#8220;consent&#8221;) might be a closer expression of what we mean than &#8220;control&#8221;. So I&#39;m not entirely comfortable with it being called the law of control. <\/p>\n<\/blockquote>\n<p dir=ltr>I&#39;m aware of the inevitable limitations of our perspective, although I confess to having many friends and collaborators in the public service.  My limitations make me deeply interested in the perspectives of people like William, so I look forward to reaching a mutual understanding on these issues.<\/p>\n<p dir=ltr>William is discussing the relations between the individual and the institutions of democracy, which operate just as he describes, and owe their endurance to deep collective consent.<\/p>\n<p dir=ltr>I&#39;m not sure what this has to do with the Law of Control, which discusses the relation between the computer user and her technical identity system.<\/p>\n<p dir=ltr>Let&#39;s leave the name aside for a moment, and concentrate on the content of the law itself.  <\/p>\n<p dir=ltr>Would those in the public services rather have it read, &#8220;<font size=2>Technical identity systems MUST only reveal information identifying a user with the user&#39;s consent &#8211; or that of the state&#8221;?  And if not this formulation, what would they like to see expressed?<\/font><\/p>\n<p dir=ltr><font size=2>I think one way to look at it is to say that the individual controls her identity system &#8211; even if under certain circumstances the state may control the individual.<\/font><\/p>\n<p dir=ltr><font size=2>But I am open to the idea that there is more to it than this, and am waiting to hear what William has in mind.<\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>William Heath of Ideal Government has been thinking and talking with colleagues in the United Kingdom about what we have called the Law of Control: Technical identity systems MUST only reveal information identifying a user with the user&#39;s consent. He writes: Kim&#39;s laws (as well as Liberty Alliance and the state-of-the-art identity debate) take shape &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=226\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Back to you, William<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/226"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=226"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/226\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}