{"id":616,"date":"2006-10-18T19:15:48","date_gmt":"2006-10-19T03:15:48","guid":{"rendered":"\/?p=616"},"modified":"2006-10-18T19:33:18","modified_gmt":"2006-10-19T03:33:18","slug":"ontario-privacy-commissioner-supports-and-extends-the-laws-of-identity","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=616","title":{"rendered":"Ontario Privacy Commissioner extends the Laws of Identity"},"content":{"rendered":"<p>Here is a&nbsp;post from the <a href=\"http:\/\/www.theglobeandmail.com\/\">Toronto Globe and Mail&#39;s<\/a> Jack <a href=\"http:\/\/www.theglobeandmail.com\/blogs\/cyberia\" class=\"broken_link\">Kapica<\/a> on a development I&#39;ll be writing about over the next couple of days &#8211;&nbsp;the Ontario Privacy Commissioner&#39;s active support&nbsp;for those of us in the&nbsp;industry building an identity metasystem with &#8220;embedded&#8221; privacy.&nbsp; This is a remarkable turn of events.<\/p>\n<p>Dr.&nbsp;Cavoukian is one of the preeminent voices for privacy world-wide, and her early and active involvement will help ensure&nbsp;we technologists&nbsp;continue to go in the right direction.&nbsp; I&#39;ll be podcasting her press conference and address to the International Association of Privacy Professionals (IAPP) Conference being held this week in Toronto, Canada.&nbsp; She has also agreed to share&nbsp;the remarkable&nbsp;documents she and her colleagues have produced to tease out the privacy implications of the Laws of Identity.<\/p>\n<p>Anne Cavoukian&#39;s&nbsp;work&nbsp;extends&nbsp;the conversation into a whole new milieu.&nbsp; And what could be a more auspicious&nbsp;beginning than the vote of support from Jack Kapica, widely known and respected for his careful vetting of all things technological.<\/p>\n<blockquote><p><a href=\"http:\/\/www.ipc.on.ca\/\" class=\"broken_link\">Ann Cavoukian<\/a>, Ontario\u00e2\u20ac\u2122s clear-eyed Information and Privacy Commissioner, is onto something very big after endorsing the Seven Laws of Identity, developed under an initiative headed by Microsoft, which she did at <a href=\"http:\/\/www.theglobeandmail.com\/servlet\/story\/RTGAM.20061018.gtprivacy18\/BNStory\/Technology\/home\" class=\"broken_link\">a press conference this morning<\/a>. Using a form of Microsoft\u00e2\u20ac\u2122s own strategy, she has embraced and extended those laws in a way that might change tame Internet forever, and maybe even help stop spam.<\/p>\n<p>The <a href=\"https:\/\/www.identityblog.com\/stories\/2004\/12\/09\/thelaws.html\" class=\"broken_link\">seven laws of identity<\/a>&nbsp;were formulated through a global dialogue among security and privacy experts, headed by Kim Cameron, Microsoft\u00e2\u20ac\u2122s Chief Identity Architect. With Cavoukian\u00e2\u20ac\u2122s spin, they describe a system in which a set of digital identity cards would keep personal information distinct from information needed for verification.<\/p>\n<p>And no, the seven laws are not Microsoft\u00e2\u20ac\u2122s property \u00e2\u20ac\u201d anyone can use them. But <a href=\"http:\/\/www.theglobeandmail.com\/servlet\/story\/RTGAM.20061017.gtmsftpriv17\/BNStory\/Technology\/home\" class=\"broken_link\">a form of them will ship with Microsoft\u00e2\u20ac\u2122s Vista<\/a>,&nbsp;its next version of Windows, due for release in January.<\/p>\n<p>Cavoukian and Cameron hint that the system ought to provide the best defence against spam I\u00e2\u20ac\u2122ve yet seen. The idea is that while on-line, users can control their personal information, minimize the amount of identifying data they reveal, minimize the links between different identities and actions and detect fraudulent messages and websites, thereby minimizing the incidence of phishing and pharming.<\/p>\n<p>While Cavoukian\u00e2\u20ac\u2122s proposal, called Seven&nbsp; Laws of Identity: The Case for Privacy-Embedded Laws of Identity in the Digital Age, is primarily intended to protect privacy and make on-line commerce safer, it could also kill e-mail from those villains who sell snake oil and pump penny stocks by sending you e-mail from&nbsp; fraudulent return addresses.<\/p>\n<p>Cavoukian was one of the first non-technologists to grasp the link between on-line identity management and privacy, and has a better understanding of technology than most people do. Kim Cameron, a former Torontonian who has been a personal friend for almost 30 years (he wrote the software that ran the original Globe and Mail books bestseller list), is another great visionary. The combination of the two should make an enormous impact on&nbsp; technology and commerce if the world takes notice.<\/p>\n<p>With uncharacteristic overstatement, Cavoukian says that once a universal method to connect identity systems and ensure user privacy is developed, there will be an \u00e2\u20ac\u0153Identity Big Bang.\u00e2\u20ac\u009d<\/p>\n<p>I wish them both the best of luck.<\/p><\/blockquote>\n<p>Reading&nbsp;Jack&#39;s piece&nbsp;I remember the old days&nbsp;we spent together&nbsp;&#8211; and how hard we worked to make sure the Bestseller List was scrupulously scientific and objective.&nbsp; That&#39;s the kind of guy Jack is.&nbsp; There&#39;s real honor there.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ontario&#39;s Ann Cavoukian has upped the ante this week by asserting not only the need for an identity metasystem &#8211; but for vigilence in ensuring it is &#8220;privacy embedded&#8221;.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,2,8,15,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/616"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=616"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/616\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}