Feeds

US proposes online IDs for Americans

Obama administration moves ahead with plans for adoption of internet IDs

  • alert
  • submit to reddit

Reducing security risks from open source software

The US Government has published plans to create digital identities for Americans.

The US Government wants to create a voluntary system that will allow Americans to access financial services online using one account. It hopes the new system will help protect against fraud and identity theft and reduce the barriers to trade that multiple accounts brings to businesses and consumers, the strategy said.

Under the new plans, users will be able to register for access to a network of government and businesses providing data and ways to pay for things online. The government has called this the Identity Ecosystem, the National Strategy for Trusted Identities in Cyberspace (NSTIC) said.

Users could pay taxes and phone bills by entering only minimal information about themselves in the Ecosystem, such as purely their age, the NSTIC document said.

"The Identity Ecosystem will use privacy-enhancing technology and policies to inhibit the ability of service providers to link an individual's transactions, thus ensuring that no one service provider can gain a complete picture of an individual's life in cyberspace," the NSTIC document said.

The Ecosystem will improve privacy protection and efficiency, it said. "Trustmarks" will be used to help users identify organisations that have met security standards, NSTIC said.

The US Government said that it was up to the private sector to develop technologies that make online identities secure and easy to use, safeguard transactions, and protect anonymity, but said that there are incentives for the industry to produce such a system.

"The private sector will have lower barriers to customer enrollment, increased productivity and decreased costs. The consistency and accuracy of trusted digital identities will improve productivity by ... reducing paper-based processes and the help-desk costs associated with account management and password maintenance. Losses due to fraud and identity theft will also be reduced," the NSTIC strategy said.

The Ecosystem benefits will also extend to individuals, because the current process is "bureaucratic", the NSTIC strategy said.

"Individuals are asked to maintain dozens of different usernames and passwords, one for each website with which they interact. The complexity of this approach is a burden to individuals, and it encourages behaviour – like the re-use of passwords – that makes online fraud and identity theft easier," it said.

Although the system proposed is voluntary, there is concern that some Government departments will adopt it, effectively forcing Americans to create a profile.

"People will not participate in a government-corporate identity project that deviates from their demand for control of identity information, which is an essential part of privacy protection, autonomy, and liberty," Jim Harper, director of information studies at the Cato Institute told CNET news service.

The US government is planning to host workshops to discuss the proposals with industry and the public between June and September to try to finalise details for NSTIC.

See: The US government's National Strategy for Trusted Identities in Cyberspace document (52-page/2.39MB PDF)

Copyright © 2011, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Maximizing your infrastructure through virtualization

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.