The IT Law Wiki
Tag: Source edit
Tag: Source edit
Line 17: Line 17:
 
== Overview (General) ==
 
== Overview (General) ==
   
"A digital identity is always unique in the context of a [[digital service]], but does not necessarily need to be [[traceable]] back to a specific [[real-life]] subject. In other words, [[access]]ing a [[digital service]] may not mean that the underlying subject's [[real-life]] representation is known. [[Identity proofing]] establishes that a subject is actually who they claim to be."<ref>''Id''</ref>
+
"A digital identity is always unique in the context of a [[digital service]], but does not necessarily need to be [[traceable]] back to a specific real-life subject. In other words, [[access]]ing a [[digital service]] may not mean that the underlying subject's real-life representation is known. [[Identity proofing]] establishes that a subject is actually who they claim to be."<ref>''Id''</ref>
   
 
== References ==
 
== References ==

Revision as of 06:30, 17 November 2020

Definitions

Blockchain technology

A digital identity is

an online or networked identity adopted or claimed in cyberspace by an individual, organization, or electronic device.[1]

General

A digital identity is

[t]he electronic representation of an entity (e.g., a device, software, service, organization or individual) in cyberspace that is comprised of an information artifact or correlated information sets.[2]
the unique representation of a subject engaged in an online transaction.[3]

Overview (General)

"A digital identity is always unique in the context of a digital service, but does not necessarily need to be traceable back to a specific real-life subject. In other words, accessing a digital service may not mean that the underlying subject's real-life representation is known. Identity proofing establishes that a subject is actually who they claim to be."[4]

References

  1. "Blockchain Technology Glossary" (full-text).
  2. National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy, at 32.
  3. NIST Special Publications 800-63-B, § 2.
  4. Id

See also