SlideShare ist ein Scribd-Unternehmen logo
1 von 26
AGE VERIFICATION:
REACHING A TIPPING POINT
SSSSS RACHEL O’CONNELL
Dr.

ISSE CONFERENCE, 2013.
BACKGROUND
• Research Consultant
• Oxford Internet Institute:
– Effective Age Verification Techniques: Lessons to be Learnt from the Online Gambling
Industry

• Ctrl_Shift
–

A market analyst and consulting business

• Member of OIX and the GSMA’s UK Assured legal working group
• Led the UK Council for Child Internet Safety (UKCCIS) project group on age
verification and report back to minsters on an annual basis.
• Advisor to commercial organisations on both the policy requirements and
business opportunities associated with identity management and age
verification
• Co-founder of GroovyFuture.com.
AREAS COVERED
• The 2008 perspective and the artificial divide
• Catalysts and Tipping Points: Pit stop in 2013 and a 2020 horizon scan
• Emergence of a data driven economy:
–
–
–
–
–
–

Trust Frameworks
Electronic ID – NSTIC – Minors Trust Framework ($1.6m)
Mobile ID – alpha projects, introduction of age verification into payment protocols
Digital economy – disruption in the payments sector, sub-accounts
Internet of Things –
Personal Data Empowerment Tools and Services – Quantified self

• E-ID ecosystem, IDAAS, IDPs, Attribute Exchanges
– Business use cases: ROI
– Sources of attributes
– Opportunities and challenges
2008 View of Age Verification
•
•
•
•
•

Burdensome compliance cost
Little or no elevation in assurance
Open to repudiation
Privacy concerns
No viable commercial or liability
models
• Not scalable, absence of standards
• Not an effective means to mitigate
risks
• Barrier to innovation
Artificial Divide
• ID and age verification – lessons from the evolution of data bureaus and
CRA’s to meet specific business sector needs
• Lack of access to datasets not only about children and young people but
also the unbanked – thin files.
• Assumption that under 18’s had limited purchasing power
• Data sources: Government, schools, banks
• COPPA requirements: Permissioned access – sites excluded young people
aged 12 and below (to difficult box)
• Struggle to identify business cases with a clear ROI – not seen as a
business enabler
CATALYSTS AND TIPPING
POINTS
NASCENT INTEROPERABLE ECOSYSTEMS

I
ELECTRONIC ID
•
•

•

Electronic identity ecosystems are a key enabler of the
“digital economy”
NSTIC aims to enable “Individuals and organizations [to]
utilize secure, efficient, easy-to-use, and interoperable
identity solutions to access online services in a manner that
promotes confidence, privacy, choice, and innovation.”

•

Provide scalable, privacy preserving, commercially viable,
privacy preserving permissioned use of attributes.
STORK

•

Proposed regulation

•

Alpha project – retailers

•

Reducing the barriers to permissioned use of age
attributes
MINOR’S TRUST FRAMEWORK
MOBILE ID
•
•
•
•

Mobile ID – GSMA/ OIX Commercial Trust Framework
SIM-based digital authentication solution
Embedded SIM/MIM – Machine Identification Modules
With the huge market potential and demand stimulated by immense
traffic from trillions of connected devices, the Internet of Things provides
operators with the means to expand their service portfolios and increase
revenues.
ASSURED UK

 Assured UK is a collaborative forum established to develop a
personal data and identity attribute exchange marketplace

 It encompasses the whole ecosystem
 Banking
 Retailers
 Mobile Network Operators
 Identity experts
 Government

12
VISION
Establish a secure and trusted marketplace that enables consumers to
control, share and benefit from their digital identities and personal
information

PRINCIPLES
1. The consumers interests are uppermost and at all times the individual controls
storage and exchange of data
2. We will seek to reuse existing standards work where ever possible and align with
the work of UK government.
3. We will seek to enable the maximum product and business model diversity,
consistent with inter-working between participants.
OBJECTIVES
 Define an end-2-end framework and pilot use case by
year end
a) Architect standards for identity attribute verification and
authentication
b) Define a permissions system for the exchange of those attributes
c) Develop a legal framework that will facilitate the interoperability
between different players in the ecosystem, while ensuring users’
data protection and privacy, encompassing:
i.
ii.
iii.
iv.

Risk & Liability flows
Auditing framework
Privacy
Regulatory compliance

d) Establish and prove a commercial model for identity attribute
exchange
e) Pilot and demonstrate efficient marketplace for digital identity and
attributes
TRUST FRAMEWORKS
• Trust is central to the operation of a data driven economy.
• Trust is crucial in the context of delivery and consumption of electronic
interactions between parties including consumers, governments and the
private sector.

• In order to both provide and benefit from digital services, companies,
public administrations and consumers need to distinguish between
trusted and non-trusted counterparts online; they also need to be
recognised as trusted parties themselves.
• A trust framework can reduce the need to negotiate a multitude of
individual commercial contracts.
TRUST FRAMEWORKS: E-ID, COMMERICIAL
(MOBILE ID),INTERNET of THINGS, PDETS
INTERNET OF THINGS
• Education
• Assert trusted credentials (LoA)
• Recognise trusted intermediaries
(accreditation)
• Quantified self - Databetes
• Convenience, security
• Active participants
IoT INFORSEC AND TRUST
• Inofsec properties of the IoT are often
difficult to understand for its users, because
they are hidden in pervasive systems and
small devices manufactured by a large
number of vendors.
• Trustworthiness, security functions and
privacy implications are vast, and must be
assessable to users and consumers.
• uTRUSTit enables system manufacturers and
system integrators to express the underlying
security concepts to users in a
comprehensible way, allowing them to make
valid judgments on the trustworthiness of
such systems.
PDETS TRUST FRAMEWORKS
• Forging new social contracts
• The Respect Trust Framework is designed to give
individuals control over the sharing of their
personal data on the Internet.
• Mydex, the personal data store and trusted
identity provider, has also had its “Mydex Trust
Framework” listed by the Open Identity Exchange.
• Connet.me has had its Trust Model and Business
Model for Personal Data listed by OIX
• The Personal Network: A New Trust Model and
Business Model for Personal Data
• Access to data that companies make available and
authoritative personal data sources – university
exam results
GOVERNANCE AS A SOFTWARE SERVICE
• ID³ believes, governance principles should be expressed as software that is
then able to evolve to incorporate advances in technology and to support
changing market and societal requirements.
• Using these tools, people will be able to ensure the privacy of their
personal information, leverage the power of networked data, and create
new forms of online coordination, exchange and self-governance.
• They will be able to forge new “social contracts” and participate in new
types of legal and regulatory systems for managing organizations, markets
and their social and civic lives. These systems will conform to both
international legal standards and to the specific social norms and priorities
of its members.
NASCENT ECOSYSTEMS: Sources and Consumers of
Verified and Permissioned Identities and Attributes

I
DATA SOURCES:
Permissioned Attributes
Pit stop 2014 -2015
•
•
•
•
•
•
•
•
•
•

E-ID e.g. Spain, NEM ID
WAYF, SAML
Mobile operators - International student card
Banks
Government issued ID docs – Secure key
Digital Life Data – Trulioo
Personal Data Empowerment Tools and Services
Biometrics
OCR
Traditional data bureaus and CRA’s
BUSINESS NEEDS:
• COPPA 2.0 – email Plus
• 20-40% of email+ emails end up in
Spam folders
• Freemium model
• Permission dashboard – set spending
limits –
• Enable self-regulatory measures –
• ROI
•
•
•
•

Omni-channel retailers
Payment providers
Alcohol
Advertising industry - broadcast
versus engagement
BENEFITS
• Permissioned use of attributes (includ. age)
– Higher levels of customer acquisition
– Trust elevation – LOA’s
• Remote on-boarding

– Differing levels of assurance

• Tailored to meet business rules
–
–
–
–
–
–

Low integration costs
Modular, highly configurable
Scalable, viable low cost
Reusable tokens
UX
Reputation, foster brand loyalty
LOOKING TO THE FUTURE
•
•
•
•
•
•
•
•
•
•
•
•

A greater variety of data sources will be accessible and permissioned, these can be
cross checked and an assurance level/ risk profile calculated to meet specific business
rules.
Granularity with respect to permissions (e.g. time stamped - miicard) and user centric
controls
Artificial barriers removed – young people will be enabled to become active
participants in the digital economy, internet of things, manage their personal data
New social contracts will be forged
Business development and ROI opportunities
Many other benefits..
Challenges
Information security
Threat vectors – bad actors, untrustworthy intermediaries
Scale of potential unintended consequences
Roles and responsibilities of regulators
Managing the processes of accreditation, oversight, redress
THANK YOU FOR LISTENING
HAPPY TO ANSWER ANY QUESTIONS?
rachel@technologist.com
Twitter: @racheloconnell
www.GroovyFuture.com

Weitere ähnliche Inhalte

Was ist angesagt?

E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingIJERA Editor
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content RegulationEndcode_org
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Secure Identity Alliance
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsNaveed Zahoor
 
Electronic and mobile commerce
Electronic and mobile commerceElectronic and mobile commerce
Electronic and mobile commerceyham manansala
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018Dan Storbaek
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-BusinessEyad Almasri
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesPalani Kumar
 

Was ist angesagt? (19)

E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and Prototyping
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content Regulation
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 
5362098
53620985362098
5362098
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systems
 
Electronic and mobile commerce
Electronic and mobile commerceElectronic and mobile commerce
Electronic and mobile commerce
 
E-Commerce: Digital Markets, Digital Goods
E-Commerce: Digital Markets, Digital GoodsE-Commerce: Digital Markets, Digital Goods
E-Commerce: Digital Markets, Digital Goods
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerce
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
 
Iti
ItiIti
Iti
 
Fintech.
Fintech.Fintech.
Fintech.
 

Ähnlich wie Age Verification: Reaching a Tipping Point

Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Trust exchange webinar nov 2020
Trust exchange webinar nov 2020Trust exchange webinar nov 2020
Trust exchange webinar nov 2020Trust Exchange
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Digital Catapult
 
Introduction to Digital e-marketing management
Introduction to Digital e-marketing managementIntroduction to Digital e-marketing management
Introduction to Digital e-marketing managementVIRUPAKSHA GOUD
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
 
ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)scomes
 
Lecture_2_Competing_with_Information_and_Communication_Technology.pdf
Lecture_2_Competing_with_Information_and_Communication_Technology.pdfLecture_2_Competing_with_Information_and_Communication_Technology.pdf
Lecture_2_Competing_with_Information_and_Communication_Technology.pdfDebelaTekabe
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity managementshivan82
 
Using the Cloud to Attract, Engage & Retain Your Customers
Using the Cloud to Attract, Engage & Retain Your CustomersUsing the Cloud to Attract, Engage & Retain Your Customers
Using the Cloud to Attract, Engage & Retain Your CustomersWainhouse Research
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...FinTechLabs.io
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyGoutama Bachtiar
 

Ähnlich wie Age Verification: Reaching a Tipping Point (20)

Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Trust exchange webinar nov 2020
Trust exchange webinar nov 2020Trust exchange webinar nov 2020
Trust exchange webinar nov 2020
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Project 13 #COMIT2018
Project 13 #COMIT2018Project 13 #COMIT2018
Project 13 #COMIT2018
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Smac Technology
Smac TechnologySmac Technology
Smac Technology
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
Introduction to Digital e-marketing management
Introduction to Digital e-marketing managementIntroduction to Digital e-marketing management
Introduction to Digital e-marketing management
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)ACMPaperFinalDraft.docx (5)
ACMPaperFinalDraft.docx (5)
 
Lecture_2_Competing_with_Information_and_Communication_Technology.pdf
Lecture_2_Competing_with_Information_and_Communication_Technology.pdfLecture_2_Competing_with_Information_and_Communication_Technology.pdf
Lecture_2_Competing_with_Information_and_Communication_Technology.pdf
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management
 
Using the Cloud to Attract, Engage & Retain Your Customers
Using the Cloud to Attract, Engage & Retain Your CustomersUsing the Cloud to Attract, Engage & Retain Your Customers
Using the Cloud to Attract, Engage & Retain Your Customers
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
 

Kürzlich hochgeladen

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Age Verification: Reaching a Tipping Point

  • 1. AGE VERIFICATION: REACHING A TIPPING POINT SSSSS RACHEL O’CONNELL Dr. ISSE CONFERENCE, 2013.
  • 2. BACKGROUND • Research Consultant • Oxford Internet Institute: – Effective Age Verification Techniques: Lessons to be Learnt from the Online Gambling Industry • Ctrl_Shift – A market analyst and consulting business • Member of OIX and the GSMA’s UK Assured legal working group • Led the UK Council for Child Internet Safety (UKCCIS) project group on age verification and report back to minsters on an annual basis. • Advisor to commercial organisations on both the policy requirements and business opportunities associated with identity management and age verification • Co-founder of GroovyFuture.com.
  • 3. AREAS COVERED • The 2008 perspective and the artificial divide • Catalysts and Tipping Points: Pit stop in 2013 and a 2020 horizon scan • Emergence of a data driven economy: – – – – – – Trust Frameworks Electronic ID – NSTIC – Minors Trust Framework ($1.6m) Mobile ID – alpha projects, introduction of age verification into payment protocols Digital economy – disruption in the payments sector, sub-accounts Internet of Things – Personal Data Empowerment Tools and Services – Quantified self • E-ID ecosystem, IDAAS, IDPs, Attribute Exchanges – Business use cases: ROI – Sources of attributes – Opportunities and challenges
  • 4. 2008 View of Age Verification • • • • • Burdensome compliance cost Little or no elevation in assurance Open to repudiation Privacy concerns No viable commercial or liability models • Not scalable, absence of standards • Not an effective means to mitigate risks • Barrier to innovation
  • 5. Artificial Divide • ID and age verification – lessons from the evolution of data bureaus and CRA’s to meet specific business sector needs • Lack of access to datasets not only about children and young people but also the unbanked – thin files. • Assumption that under 18’s had limited purchasing power • Data sources: Government, schools, banks • COPPA requirements: Permissioned access – sites excluded young people aged 12 and below (to difficult box) • Struggle to identify business cases with a clear ROI – not seen as a business enabler
  • 6.
  • 9. ELECTRONIC ID • • • Electronic identity ecosystems are a key enabler of the “digital economy” NSTIC aims to enable “Individuals and organizations [to] utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.” • Provide scalable, privacy preserving, commercially viable, privacy preserving permissioned use of attributes. STORK • Proposed regulation • Alpha project – retailers • Reducing the barriers to permissioned use of age attributes
  • 11. MOBILE ID • • • • Mobile ID – GSMA/ OIX Commercial Trust Framework SIM-based digital authentication solution Embedded SIM/MIM – Machine Identification Modules With the huge market potential and demand stimulated by immense traffic from trillions of connected devices, the Internet of Things provides operators with the means to expand their service portfolios and increase revenues.
  • 12. ASSURED UK  Assured UK is a collaborative forum established to develop a personal data and identity attribute exchange marketplace  It encompasses the whole ecosystem  Banking  Retailers  Mobile Network Operators  Identity experts  Government 12
  • 13. VISION Establish a secure and trusted marketplace that enables consumers to control, share and benefit from their digital identities and personal information PRINCIPLES 1. The consumers interests are uppermost and at all times the individual controls storage and exchange of data 2. We will seek to reuse existing standards work where ever possible and align with the work of UK government. 3. We will seek to enable the maximum product and business model diversity, consistent with inter-working between participants.
  • 14. OBJECTIVES  Define an end-2-end framework and pilot use case by year end a) Architect standards for identity attribute verification and authentication b) Define a permissions system for the exchange of those attributes c) Develop a legal framework that will facilitate the interoperability between different players in the ecosystem, while ensuring users’ data protection and privacy, encompassing: i. ii. iii. iv. Risk & Liability flows Auditing framework Privacy Regulatory compliance d) Establish and prove a commercial model for identity attribute exchange e) Pilot and demonstrate efficient marketplace for digital identity and attributes
  • 15. TRUST FRAMEWORKS • Trust is central to the operation of a data driven economy. • Trust is crucial in the context of delivery and consumption of electronic interactions between parties including consumers, governments and the private sector. • In order to both provide and benefit from digital services, companies, public administrations and consumers need to distinguish between trusted and non-trusted counterparts online; they also need to be recognised as trusted parties themselves. • A trust framework can reduce the need to negotiate a multitude of individual commercial contracts.
  • 16. TRUST FRAMEWORKS: E-ID, COMMERICIAL (MOBILE ID),INTERNET of THINGS, PDETS
  • 17. INTERNET OF THINGS • Education • Assert trusted credentials (LoA) • Recognise trusted intermediaries (accreditation) • Quantified self - Databetes • Convenience, security • Active participants
  • 18. IoT INFORSEC AND TRUST • Inofsec properties of the IoT are often difficult to understand for its users, because they are hidden in pervasive systems and small devices manufactured by a large number of vendors. • Trustworthiness, security functions and privacy implications are vast, and must be assessable to users and consumers. • uTRUSTit enables system manufacturers and system integrators to express the underlying security concepts to users in a comprehensible way, allowing them to make valid judgments on the trustworthiness of such systems.
  • 19. PDETS TRUST FRAMEWORKS • Forging new social contracts • The Respect Trust Framework is designed to give individuals control over the sharing of their personal data on the Internet. • Mydex, the personal data store and trusted identity provider, has also had its “Mydex Trust Framework” listed by the Open Identity Exchange. • Connet.me has had its Trust Model and Business Model for Personal Data listed by OIX • The Personal Network: A New Trust Model and Business Model for Personal Data • Access to data that companies make available and authoritative personal data sources – university exam results
  • 20. GOVERNANCE AS A SOFTWARE SERVICE • ID³ believes, governance principles should be expressed as software that is then able to evolve to incorporate advances in technology and to support changing market and societal requirements. • Using these tools, people will be able to ensure the privacy of their personal information, leverage the power of networked data, and create new forms of online coordination, exchange and self-governance. • They will be able to forge new “social contracts” and participate in new types of legal and regulatory systems for managing organizations, markets and their social and civic lives. These systems will conform to both international legal standards and to the specific social norms and priorities of its members.
  • 21. NASCENT ECOSYSTEMS: Sources and Consumers of Verified and Permissioned Identities and Attributes I
  • 22. DATA SOURCES: Permissioned Attributes Pit stop 2014 -2015 • • • • • • • • • • E-ID e.g. Spain, NEM ID WAYF, SAML Mobile operators - International student card Banks Government issued ID docs – Secure key Digital Life Data – Trulioo Personal Data Empowerment Tools and Services Biometrics OCR Traditional data bureaus and CRA’s
  • 23. BUSINESS NEEDS: • COPPA 2.0 – email Plus • 20-40% of email+ emails end up in Spam folders • Freemium model • Permission dashboard – set spending limits – • Enable self-regulatory measures – • ROI • • • • Omni-channel retailers Payment providers Alcohol Advertising industry - broadcast versus engagement
  • 24. BENEFITS • Permissioned use of attributes (includ. age) – Higher levels of customer acquisition – Trust elevation – LOA’s • Remote on-boarding – Differing levels of assurance • Tailored to meet business rules – – – – – – Low integration costs Modular, highly configurable Scalable, viable low cost Reusable tokens UX Reputation, foster brand loyalty
  • 25. LOOKING TO THE FUTURE • • • • • • • • • • • • A greater variety of data sources will be accessible and permissioned, these can be cross checked and an assurance level/ risk profile calculated to meet specific business rules. Granularity with respect to permissions (e.g. time stamped - miicard) and user centric controls Artificial barriers removed – young people will be enabled to become active participants in the digital economy, internet of things, manage their personal data New social contracts will be forged Business development and ROI opportunities Many other benefits.. Challenges Information security Threat vectors – bad actors, untrustworthy intermediaries Scale of potential unintended consequences Roles and responsibilities of regulators Managing the processes of accreditation, oversight, redress
  • 26. THANK YOU FOR LISTENING HAPPY TO ANSWER ANY QUESTIONS? rachel@technologist.com Twitter: @racheloconnell www.GroovyFuture.com

Hinweis der Redaktion

  1. Trulioo Internet Life Verification utilizes “digital life data” - social network interactions, crowd sourcing, Internet information repositories and behavioral data – to perform identity vetting and information verification.