The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 1 to 14.
The Appropriate Use of Digital Identity
https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity
<b></b>
<p>As governments across the globe implement new, foundational, digital identification systems (“Digital ID”), or modernize existing ID programs, there is dire need for greater research and discussion about appropriate uses of Digital ID systems. This significant momentum for creating Digital ID in several parts of the world has been accompanied with concerns about the privacy and exclusion harms of a state issued Digital ID system, resulting in campaigns and litigations in countries such as UK, India, Kenya, and Jamaica. Given the very large range of considerations required to evaluate Digital ID projects, it is necessary to think of evaluation frameworks that can be used for this purpose.</p>
<p>At RightsCon 2019 in Tunis, we presented <a class="external-link" href="http://bit.ly/CISDigitalIDAppropriateUse">working drafts</a> on appropriate use of Digital ID by the partner organisations of this <a class="external-link" href="https://www.omidyar.com/blog/appropriate-use-digital-identity-why-we-invested-three-region-research%C2%A0alliance">three-region research alliance</a> - ITS from Brazil, CIPIT from Kenya, and CIS from India.</p>
<p>In the <a class="external-link" href="https://digitalid.design/evaluation-framework-01.html">draft by CIS</a>, we propose a set of principles against which Digital ID may be evaluated. We hope that these draft principles can evolve into a set of best practices that can be used by policymakers when they create and implement Digital ID systems, provide guidance to civil society examinations of Digital ID and highlight questions for further research on the subject. We have drawn from approaches used in documents such as the necessary and proportionate principles, the OECD privacy guidelines and scholarship on harms based approach.</p>
<p>Read and comment on CIS’s Draft framework <a class="external-link" href="https://digitalid.design/evaluation-framework-01.html">here</a>.</p>
<p>Download Working drafts by CIPIT, CIS, and ITS <a class="external-link" href="http://bit.ly/CISDigitalIDAppropriateUse">here</a>.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity'>https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity</a>
</p>
No publisheramberDigital IDPrivacyInternet GovernanceAppropriate Use of Digital IDDigital Identity2019-08-08T10:24:40ZBlog EntryPicking ‘Wholes’ - Thinking in Systems Workshop
https://cis-india.org/internet-governance/blog/picking-2018wholes2019-thinking-in-systems-workshop
<b>A System's Thinking masterclass was conducted by Dinesh Korjan on 27th and 28th May in the CIS Delhi office.</b>
<p style="text-align: justify; ">It was organised as part of the Digital Identity project to explore the use of system’s thinking approach in a digital identity system, and addressing questions of policy choices and uses, while creating such a system. The workshop was attended by Amber Sinha, Ambika Tandon, Anubha Sinha, Pooja Saxena, Radhika Radhakrishnan, Saumyaa Naidu, Shruti Trikanad, Shyam Ponappa, Sumandro Chattapadhyay, Sunil Abraham, Swati Gautam, and Yesha Paul.</p>
<p style="text-align: justify; ">Dinesh Korjan is a proponent of the strategic use of design for the larger good. He is a product designer and co-founder of Studio Korjan in Ahmedabad. He complements his practice with active engagement in academics and teaches at many leading design schools including NID, Ahmedabad, Indian Institute of Technology (IIT), Gandhinagar, Srishti School of Art Design & Technology, Bangalore, and CEPT University, Ahmedabad.</p>
<p style="text-align: justify; ">The masterclass was aimed at learning to address complex problems using systems thinking approach. It involved experiential and collaborative learning through discussions, and doing and making activities. The workshop began with identifying different actors, processes, institutions, and other entities involved in a complex problem. The method of role-playing was introduced to learn to detail out and map the problem. Concepts such as synergy/ emergence, relationships, and flows were introduced through examples and case studies. These concepts were applied while mapping complex problems to find insights such as patterns, purposes, feedback loops, and finally a leverage. The workshop also introduced the idea of ephemeralization. Participants were prompted to find solutions that require least input but have greatest impact.</p>
<p style="text-align: justify; ">For further reading <a class="external-link" href="http://cis-india.org/internet-governance/files/picking-wholes">click here</a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/picking-2018wholes2019-thinking-in-systems-workshop'>https://cis-india.org/internet-governance/blog/picking-2018wholes2019-thinking-in-systems-workshop</a>
</p>
No publishersaumyaaInternet GovernanceDigital IDDigital Identity2019-06-05T14:35:35ZBlog EntryHolding ID Issuers Accountable, What Works?
https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works
<b></b>
<p>Together with the <a class="external-link" href="https://itsrio.org/pt/home/">Institute of Technology & Society</a> (ITS), Brazil, and the <a class="external-link" href="https://www.cipit.org/">Centre for Intellectual Property and Information Technology Law</a> (CIPIT), Kenya, CIS participated at a side event in <a class="external-link" href="https://www.rightscon.org/">RightsCon 2019</a> held in Tunisia, titled Holding ID Issuers Accountable, What Works?, organised by the <a class="external-link" href="https://www.omidyar.com/">Omidyar Network</a>. The event was attended by researchers and advocates from nearly 20 countries. Read the event report <a class="external-link" href="https://digitalid.design/rightscon-2019-report.html">here</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works'>https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works</a>
</p>
No publisherShruti Trikanad and Amber SinhaDigital IDPrivacyInternet GovernanceAppropriate Use of Digital IDDigital Identity2019-08-08T10:23:58ZBlog EntryGoverning ID: Use of Digital ID in the Healthcare Sector
https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector
<b></b>
<p>In our third case-study, we use our Evaluation Framework for Digital ID to examine the use of Digital ID in the healthcare sector.</p>
<p><img src="https://cis-india.org/internet-governance/image-digital-id-healthcare-case-study/" alt="null" width="100%" /></p>
<p>Read the <a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/healthcare.html">case-study</a> or download as <a href="https://cis-india.org/internet-governance/digital-id-healthcare-case-study" class="internal-link" title="Digital ID Healthcare Case Study">PDF</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector'>https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector</a>
</p>
No publisherShruti Trikanadinternet governanceInternet GovernanceDigital IDDigital Identity2020-03-02T13:21:22ZBlog EntryGoverning ID: Kenya’s Huduma Namba Programme
https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme
<b></b>
<p>In our fourth case-study, we use our Evaluation Framework for Digital ID to examine the use of Digital ID in Kenya.</p>
<p>Read the <a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/kenya.html">case-study</a> or download as <a href="https://cis-india.org/internet-governance/digital-id-kenya-case-study" class="internal-link" title="Digital ID Kenya Case Study">PDF</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme'>https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme</a>
</p>
No publisheramberinternet governanceInternet GovernanceDigital IDDigital Identity2020-03-02T13:19:15ZBlog EntryGoverning ID: Introducing our Evaluation Framework
https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework
<b></b>
<div class="content">
<p>With the rise of national digital identity systems (Digital ID) across the world, there is a growing need to examine their impact on human rights. In several instances, national Digital ID programmes started with a specific scope of use, but have since been deployed for different applications, and in different sectors. This raises the question of how to determine appropriate and inappropriate uses of Digital ID. In April 2019, our research began with this question, but it quickly became clear that a determination of the legitimacy of uses hinged on the fundamental attributes and governing structure of the Digital ID system itself. Our evaluation framework is intended as a series of questions against which Digital ID may be tested. We hope that these questions will inform the trade-offs that must be made while building and assessing identity programmes, to ensure that human rights are adequately protected.</p>
<h4>Rule of Law Tests</h4>
<p>Foundational Digital ID must only be implemented along with a
legitimate regulatory framework that governs all aspects of Digital ID,
including its aims and purposes, the actors who have access to it, etc.
In the absence of this framework, there is nothing that precludes
Digital IDs from being leveraged by public and private actors for
purposes outside the intended scope of the programme. Our rule of law
principles mandate that the governing law should be enacted by the
legislature, be devoid of excessive delegation, be clear and accessible
to the public, and be precise and limiting in its scope for discretion.
These principles are substantiated by the criticism that the Kenyan
Digital ID, the Huduma Namba, was met with when it was legalized through
a Miscellaneous Amendment Act, meant only for small or negligible
amendments and typically passed without any deliberation. These set of
tests respond to the haste with which Digital ID has been implemented,
often in the absence of an enabling law which adequately addresses its
potential harms.</p>
<h4>Rights based Tests</h4>
<p>Digital ID, because of its collection of personal data and
determination of eligibility and rights of users, intrinsically involves
restrictions on certain fundamental rights. The use of Digital ID for
essential functions of the State, including delivery of benefits and
welfare, and maintenance of civil and sectoral records, enhance the
impact of these restrictions. Accordingly, the entire identity
framework, including its architecture, uses, actors, and regulators,
must be evaluated at every stage against the rights it is potentially
violating. Only then will we be able to determine if such violation is
necessary and proportionate to the benefits it offers. In Jamaica, the
National Identification and Registration Act, which mandated citizens’
biometric enrolment at the risk of criminal sanctions, was held to be a
disproportionate violation of privacy, and therefore unconstitutional.</p>
<h4>Risk based Tests</h4>
<p>Even with a valid rule of law framework that seeks to protect
rights, the design and use of Digital ID must be based on an analysis of
the risks that the system introduces. This could take the form of
choosing between a centralized and federated data-storage framework,
based on the effects of potential failure or breach, or of restricting
the uses of the Digital ID to limit the actors that will benefit from
breaching it. Aside from the design of the system, the regulatory
framework that governs it should also be tailored to the potential risks
of its use. The primary rationale behind a risk assessment for an
identity framework is that it should be tested not merely against
universal metrics of legality and proportionality, but also against an
examination of the risks and harms it poses. Implicit in a risk based
assessment is also the requirement of implementing a responsive
mitigation strategy to the risks identified, both while creating and
governing the identity programme.</p>
<p>Digital ID programmes create an inherent power imbalance
between the State and its residents because of the personal data they
collect and the consequent determination of significant rights,
potentially creating risks of surveillance, exclusion, and
discrimination. The accountability and efficiency gains they promise
must not lead to hasty or inadequate implementation.</p>
</div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework'>https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework</a>
</p>
No publisherShruti Trikanadinternet governanceInternet GovernanceDigital IDDigital Identity2020-03-02T08:03:49ZBlog EntryGoverning ID: India’s Unique Identity Programme
https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme
<b></b>
<div class="content">
<p>In our second case-study, we use our Evaluation Framework for Digital ID to assess India’s Unique Identity Programme.</p>
<p>Read the <a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/india.html">case-study</a> or download as <a href="https://cis-india.org/internet-governance/digital-id-india-case-study" class="internal-link" title="Digital ID India Case Study">PDF</a>.</p>
</div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme'>https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme</a>
</p>
No publisherVrinda Bhandariinternet governanceInternet GovernanceDigital IDDigital Identity2020-03-02T11:38:51ZBlog EntryGoverning ID: A Framework for Evaluation of Digital Identity
https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity
<b></b>
<p>As governments across the globe implement new and foundational
digital identification systems (Digital ID), or modernize existing ID
programs, there is an urgent need for more research and discussion about
appropriate uses of Digital ID systems. This significant momentum for
creating Digital ID has been accompanied with concerns about privacy,
surveillance and exclusion harms of state-issued Digital IDs in several
parts of the world, resulting in campaigns and litigations in countries,
such as UK, India, Kenya, and Jamaica. Given the sweeping range of
considerations required to evaluate Digital ID projects, it is necessary
to formulate evaluation frameworks that can be used for this purpose.</p>
<p>This work began with the question of what the appropriate uses
of Digital ID can be, but through the research process, it became clear
that the question of use cannot be divorced from the fundamental
attributes of Digital ID systems and their governance structures. This
framework provides tests, which can be used to evaluate the governance
of Digital ID across jurisdictions, as well as determine whether a
particular use of Digital ID is legitimate. Through three kinds of
checks — Rule of Law tests, Rights based tests, and Risks based tests —
this scheme is a ready guide for evaluation of Digital ID.</p>
<p><img src="https://cis-india.org/internet-governance/image-governing-id-principles-for-evalution/" alt="null" width="100%" /></p>
<p> </p>
<p>View the <a class="external-link" href="https://digitalid.design/evaluation-framework-02.html">framework</a> or download as <a href="https://cis-india.org/internet-governance/governing-id-principles-for-evalution" class="internal-link" title="Governing ID: Principles for Evalution">PDF</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity'>https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity</a>
</p>
No publisherVrinda Bhandari, Shruti Trikanad, and Amber Sinhainternet governanceInternet GovernanceDigital IDDigital Identity2020-03-02T13:22:43ZBlog EntryGoverning ID: Use of Digital ID for Verification
https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification
<b></b>
<p>This is the first in a series of case studies, using our recently-published <a href="https://digitalid.design/evaluation-framework-02.html">Evaluation Framework for Digital ID</a>. It looks at the use of digital identity programmes for the purpose of verification, often using the process of deduplication.</p>
<p><img src="https://cis-india.org/internet-governance/image-governing-id-use-of-digital-id-for-verification/" alt="null" width="100%" /></p>
Read the <a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/verification.html">case-study</a> or download as <a href="https://cis-india.org/internet-governance/use-of-digital-id-for-verification" class="internal-link" title="Use of Digital ID for Verification">PDF.</a>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification'>https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification</a>
</p>
No publisherShruti Trikanadinternet governanceInternet GovernanceDigital IDDigital Identity2020-03-02T11:16:19ZBlog EntryDigital ID Forum 2019
https://cis-india.org/internet-governance/news/digital-id-forum-2019
<b>Sunil Abraham was one of the panelists at this event at Chulalongkorn University on July 3, 2019.</b>
<p><img src="https://cis-india.org/home-images/DigitalID.png" alt="Digital ID" class="image-inline" title="Digital ID" /></p>
<p><span>Click to </span><a class="external-link" href="http://cis-india.org/internet-governance/files/digital-id-forum">view the agenda</a><span>. Also see </span><a class="external-link" href="https://en.wikipedia.org/wiki/Asia_Source">Wikipedia page</a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/digital-id-forum-2019'>https://cis-india.org/internet-governance/news/digital-id-forum-2019</a>
</p>
No publisherAdminDigital IDPrivacyInternet GovernanceAppropriate Use of Digital IDDigital Identity2019-08-07T14:09:16ZNews ItemDesign and Uses of Digital Identities - Research Plan
https://cis-india.org/internet-governance/blog/digtial-identities-research-plan
<b>In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.</b>
<h4>Read the research plan <a class="external-link" href="https://digitalid.design/research-plan.html">here</a>.</h4>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/digtial-identities-research-plan'>https://cis-india.org/internet-governance/blog/digtial-identities-research-plan</a>
</p>
No publisherAmber Sinha and Pooja SaxenaDigital IDPrivacyInternet GovernanceAppropriate Use of Digital IDDigital Identity2019-08-17T07:58:44ZBlog EntryCore Concepts and Processes
https://cis-india.org/internet-governance/digital-identity/shruti-trikanand-and-amber-sinha-september-13-2019-core-concepts-processes
<b>When we embarked on this research project, we began with the primary questions of what constitutes a digital identity system. In the last few years, with the rise in national digital identity projects, there has been significant academic and media attention to the idea, benefits and risks of a digital identity system.</b>
<p style="text-align: justify; ">However, there have been relatively few attempts to critically look at what makes an identity system digital, and what are its defining elements and characteristics. Through a preliminary study of existing identity systems, we have arrived at these core set of concepts and processes that mark a digital identity system. In arriving at this list, we have relied upon and referred to the works by <a href="http://www.chyp.com/wp-content/uploads/2016/07/Digital-Identity-Issue-Analysis-Report.pdf" target="_blank">Dave Birch et al</a>, <a href="http://documents.worldbank.org/curated/en/248371559325561562/pdf/ID4D-Practitioner-Guide-Draft-for-Consultation.pdf" target="_blank">World Bank’s ID4D initiative</a>, <a href="https://www.semanticscholar.org/paper/Becoming-Artifacts-Medieval-Seals%2C-Passports-and-of-Chango/42cf3a5a5a2db067327298e7d8c540c9691171d2" target="_blank">Mawaki Chango</a>, <a href="https://identitywoman.net/domains-of-identity/" target="_blank">Kaliya Young</a> and <a href="https://medium.com/@kezike/the-evolution-of-digital-identity-6c13aca128c0" target="_blank">Kayode Ezike</a>.</p>
<p class="indent" style="text-align: justify; ">By publishing this, we hope to arrive at a shared vocabulary to discuss and critically analyse digital identity systems, both within our team and in engagements with other stakeholders. This illustrated and interactive glossary can serve as an easy reference for anyone seeking an introduction to the core aspects of digital identity. Even though this is essentially a list of definitions with examples, it does not follow an alphabetical order like most glossaries, but the logical flow of concepts as they build upon each other in a working identity system. We have paid special emphasis to the core processes of <a href="https://digitalid.design/core-concepts-processes.html#identification-diagram">Identification</a> and <a href="https://digitalid.design/core-concepts-processes.html#authentication-diagram">Authentication</a>, elucidating them through diagrams.</p>
<p class="indent"><a class="external-link" href="https://digitalid.design/core-concepts-processes.html">Click to read more</a></p>
<hr />
<p>Credentials:</p>
<ul>
<li> Research by Shruti Trikanad and Amber Sinha </li>
<li> Conceptualization by Pooja Saxena and Amber Sinha </li>
<li>Illustrations by Akash Sheshadri and Pooja Saxena</li>
</ul>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/digital-identity/shruti-trikanand-and-amber-sinha-september-13-2019-core-concepts-processes'>https://cis-india.org/internet-governance/digital-identity/shruti-trikanand-and-amber-sinha-september-13-2019-core-concepts-processes</a>
</p>
No publisherShruti Trikanand and Amber SinhaInternet GovernanceDigital IDDigital Identity2019-10-17T16:06:54ZBlog EntryComments to the ID4D Practitioners’ Guide
https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide
<b></b>
<p>This post presents our comments to the ID4D Practitioners’ Guide: Draft For Consultation released by ID4D in June, 2019. CIS has conducted research on issues related to digital identity since 2012. This submission is divided into three main parts. The first part (General Comments) contains the high-level comments on the Practitioners’ Guide, while the second part (Specific Comments) addresses individual sections in the Guide. The third and final part (Additional Comments) does not relate to particulars in the Practitioners' Guide but other documents that it relies upon. We submitted these comments to ID4D on August 5, 2019. Read our comments <a class="external-link" href="https://digitalid.design/comments-ID4D-practitioners-guide.html">here</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide'>https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide</a>
</p>
No publisherYesha Tshering Paul, Prakriti Singh, and Amber SinhaDigital IDPrivacyInternet GovernanceAppropriate Use of Digital IDDigital Identity2019-08-08T10:25:13ZBlog EntryAnnouncement of a Three-Region Research Alliance on the Appropriate Use of Digital Identity
https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement
<b>Omidyar Network has recently announced its decision to invest in establishment of a three-region research alliance — to be co-led by the Institute for Technology & Society (ITS), Brazil, the Centre for Intellectual Property and Information Technology Law (CIPIT) , Kenya, and the CIS, India — on the Appropriate Use of Digital Identity. As part of this Alliance, we at the CIS will look at the policy objectives of digital identity projects, how technological policy choices can be thought through to meet the objectives, and how legitimate uses of a digital identity framework may be evaluated.</b>
<p> </p>
<p>As governments across the globe are implementing new, digital foundational identification systems or modernizing existing ID programs, there is a dire need for greater research and discussion about appropriate design choices for a digital identity framework. There is significant momentum on digital ID, especially after the adoption of UN Sustainable Development Goal 16.9, which calls for legal identity for all by 2030. Given the importance of this subject, its implications for both the development agenda as well its impact on civil, social and economic rights, there is a need for more focused research that can enable policymakers to take better decisions, guide civil society in different jurisdictions to comment on and raise questions about digital identity schemes, and provide actionable material to the industry to create identity solutions that are privacy enhancing and inclusive.</p>
<p> </p>
<h4>Excerpt from the <a href="https://www.omidyar.com/blog/appropriate-use-digital-identity-why-we-invested-three-region-research%C2%A0alliance" target="_blank">blog post by Subhashish Bhadra</a> announcing this new research alliance</h4>
<p>...In the absence of any widely-accepted thinking on this issue, we run the risk of digital identity systems suffering from mission creep, that is being made mandatory or being used for an ever-expanding set of services. We believe this creates several risks. First, people may be excluded from services if they do not have a digital identity or because it malfunctions. Second, this approach creates a wider digital footprint that can be used to create a profile of an individual, sometimes without consent. This can increase privacy risk. Third, this approach increases the power of institutions versus individuals and can be used as rationale to intentionally deny services, especially to vulnerable or persecuted groups.</p>
<p>Three exceptional research groups have undertaken the effort of answering this complex and important question. Over the next six months, these think tanks will conduct independent research, as well as involve experts from across the globe. Based in South America, Africa, and Asia, these institutions represent the collective wisdom and experiences of three very distinct geographies in emerging markets. While drawing on their local context, this research effort is globally oriented. The think tanks will create a set of recommendations and tools that can be used by stakeholders to engage with digital identity systems in any part of the world...</p>
<p>This research will use a collaborative and iterative process. The researchers will put out some ideas every few weeks, with the objective of seeking thoughts, questions, and feedback from various stakeholders. They will participate in several digital rights and identity events across the globe over the next several months. They will also organize webinars to seek input from and present their interim findings to interested communities from across the globe. Each of these provide an opportunity for you to provide your thoughts and help this research program provide an independent, rigorous, transparent, and holistic answer to the question of when it’s appropriate for digital identity to be used. We need a diversity of viewpoints and collaborative dissent to help solve the most pressing issues of our times.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement'>https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement</a>
</p>
No publisheramberDigital IDInternet GovernanceAppropriate Use of Digital IDFeaturedDigital IdentityHomepage2019-05-13T09:06:23ZBlog Entry