Digital Identity: use of personal data or growth element?

atelier-identite-numeriqueAt the debate on the commercial use of personal data and on public surveillance, digital identity is it part of the sovereign areas of the state and she has an economic impact ?

In 2025 , a quarter of the world’s population will have an account on a social network. But if the data from these allow companies to benefit from valuable insights to imagine new products and services , other practices such as the resale of personal data or harvesting of private data by tracking devices so nonconsensual exist. And it is the lack of transparency on the thumbprint of the individual who was at the heart of the debate at the forum on digital identity organized by MEDEF Forum Atena . ” While Data is now recoverable in operations of M & A, there is a balance between data granted to use and convenience to receive in return in terms of experience ,” says Diane Mullenex , a lawyer specializing in issues digital .

Shades of choice in the data to be transmitted according to usage

Affinity data transmitted through browsing or sharing on social networks are one thing, but private data such as banking or medical data in another form . To develop innovative value-added services, it is necessary to develop confidence in digital. ” Without a clear policy, digital identity will not take , because it will be managed according to the will of the market ,” warns Robin Wilton , Director for Identity and Privacy in the Internet Society. But it is above all the European Union should promote confidence in the reliability of authentication of all kinds , mobile way to the digital identity of its members emerge. This requires the development of an infrastructure to manage all the authentication of an individual on any platform and interoperability between countries. Similarly to the Internet of Things , digital identity requires standards. Initiatives such as the digital passport , the miniaturized image of the SIM card or the electronic signature could allow objects to authenticate , manage a real safe conducive to a sense of confidence mail, or even lower administrative costs.

Risk monitoring amplified with M2M and Cloud

If the state must act in the field of digital identity , it must be provided in a sovereign area in which it would be only to practice ? The question is difficult since Edward Snowden revelations concerning the moment focus on the United States alone . This case has also brought to light the very special relationship between the web giant and the state which could raise suspicion among consumers even if the use does not yet feel. Furthermore, the dissemination of personal and business data in the cloud , if it brings in convenience, however, is not necessarily chosen because of the costs of infrastructure support to provide such services. The issue of M2M also is crucial as it can legitimately find disturbing data from objects communicate with each other and with servers on the life of the individual so that it is passive. ” The fact that people are questioning is a good thing. It absolutely must not fall into the adage ” nothing to fear because nothing to hide” , it would give to assume that the human being is a social individual “concluded Robin Wilton .

Rating : 3 Both comments and pings are currently closed.

Comments are closed.

Powered by WordPress