The IT Law Wiki



Identity is

a set of characteristics by which an entity (e.g., human, application, device, service or process) is recognizable from every other entity.[1]


Identity is:

[a]ny subset of an individual's attributes, including names, that identifies the individual within a given context. Individuals usually have multiple identities for use in different contexts.[2]
[a] unique name of an individual person. Since the legal names of persons are not necessarily unique, the identity of a person must include sufficient additional information to make the complete name unique."[3]
[a] characteristic or group of characteristics by which an entity is recognizable; can refer to an asymmetric key associated with a person, device, or application.[4]
[t]he set of physical, behavioral, and/or other characteristics by which an entity (human, device, service, etc.) is uniquely recognizable by an identity manager.[5]

Identity is:

  1. "[t]he set of physical and behavioral characteristics by which an individual is uniquely recognizable."[6]
  2. "[a] unique physical being that identifies somebody or something. Identities can apply to persons or non-persons."[7]
  3. "[t]he unique biological person defined by DNA; the physical being.[8]
  4. "[t]he characteristics determining who or what a person or thing is."[9]


Identity is a

technical label which may represent the origin or destination of any telecommunications traffic, as a rule clearly identified by a physical telecommunications identity number (such as a telephone number) or the logical or virtual telecommunications identity number (such as a personal number) which the subscriber can assign to a physical access on a case-by-case basis.[10]


  1. Biometrics Identity Management Agency, Biometrics Glossary, at 35 (Ver. 5) (Oct. 2010) (full-text).
  2. Privacy Considerations for Internet Protocols, at 9.
  3. NIST Special Publication 800-63, at 6.
  4. National Security Agency, "Mobility Capability Package," at D-5 (Nov. 4, 2013) (full-text).
  5. Report on Securing and Growing the Digital Economy, at 89.
  6. NIST, FIPS 201.
  7. National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy, at 33.
  8. Executive Office of the President, Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance, at 173 (Ver. 1.0) (Nov. 10, 2009) (full-text).
  9. Framework for Cyber-Physical Systems, at 12.
  10. ETSI: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) (full-text).

See also[]