{"id":627,"date":"2006-10-26T09:08:23","date_gmt":"2006-10-26T17:08:23","guid":{"rendered":"\/?p=627"},"modified":"2006-10-30T10:10:42","modified_gmt":"2006-10-30T18:10:42","slug":"second-law-of-identity","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=627","title":{"rendered":"Second Law of Identity"},"content":{"rendered":"<p><a href=\"\/wp-content\/resources\/7_laws_brochure.pdf\" class=\"broken_link\"><img src=\"\/wp-content\/images\/2006\/10\/law-2.jpg\" \/><\/a><\/p>\n<p>Here is the Second Law of Identity as expressed by Anne Cavoukian, Privacy Commissioner of Ontario. The &#8220;technology&#8221; law is on the left; the &#8220;privacy-embedded&#8221; form is on the right:<\/p>\n<div>\n<div style=\"padding-right: 10px; margin-top: 300px; padding-left: 10px; font-size: 14pt; background: #f0f0f0; float: left; padding-bottom: 10px; margin-left: 30px; width: 250px; line-height: 1.2em; padding-top: 10px; font-family: arial\">MINIMAL DISCLOSURE FOR A CONSTRAINED USE<\/p>\n<p><span style=\"font-size: 12pt\">The identity metasystem must disclose the least identifying information possible, as this is the most stable, long-term solution.&nbsp; <\/span><\/div>\n<div style=\"padding-right: 10px; margin-top: 30px; padding-left: 10px; font-size: 14pt; background: #f0f0f0; float: left; margin-bottom: 0px; padding-bottom: 10px; margin-left: 30px; width: 250px; line-height: 1.2em; padding-top: 10px; font-family: arial; magin-top: 50px\">MINIMAL DISCLOSURE FOR LIMITED USE:<br \/>\nDATA MINIMIZATION<\/p>\n<p><span style=\"font-size: 12pt\">The identity metasystem must disclose the least identifying information possible, as this is the most stable long-term solution. It is also the most privacy protective solution.&nbsp;&nbsp;&nbsp; <\/span><span style=\"font-size: 12pt\">&nbsp;<\/p>\n<p>The concept of placing limitations on the collection, use and disclosure of personal information is at the heart of privacy protection. To achieve these objectives, one must first specify the purpose of the collection and then limit one&#39;s use of the information to that purpose,avoiding disclosure for secondary uses. The concept of data minimization bears directly on these issues, namely, minimizing the collection of personal information in the first instance, thus avoiding the possibility of subsequent misuse through unauthorized secondary uses.<\/p>\n<p><\/span>&nbsp;<\/div>\n<\/div>\n<p>Dr. Cavoukian&#39;s restatement of the First Law&nbsp;is <a href=\"\/?p=622\">here<\/a>.&nbsp; I can&#39;t overstate the importance of her collaboration with the identity community.&nbsp; Nothing is more important to getting identity right than getting privacy right.&nbsp; And there&#39;s no better way to get privacy right than by working side by side with those who, like Dr. Cavourkian, have been studing, writing about and protecting privacy for many years.<\/p>\n<div style=\"margin-left: 0px\">Download the Privacy-Embedded laws as a <a href=\"\/wp-content\/resources\/7_laws_brochure.pdf\" class=\"broken_link\">brochure<\/a> or a <a href=\"\/wp-content\/resources\/7_laws_brochure.pdf\" class=\"broken_link\">whitepaper<\/a>.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Placing limitations on the collection, use and disclosure of personal information is at the heart of privacy protection<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,17,3,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/627"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=627"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/627\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}