ASSERTION #7: Assertions Regarding the Responsible Management of Data
ASSERTION #7: If I Control The Usage Of My Data, Any Processing On That Data Is No Longer “On My Behalf”, It Is “As If” I Am Executing The Processing.
To catch up on parts 1-7, click below
ASSERTION #0: Data is the Observable Product of a Change in State https://www.dhirubhai.net/pulse/assertions-responsible-management-data-ian-kelly-ls0je/?trackingId=mpg7dEs4Q6Wd7ypTVXlyVg%3D%3D
ASSERTION #1: Data Is Property https://www.dhirubhai.net/pulse/part-2-assertions-regarding-responsible-management-data-ian-kelly-ooste/?trackingId=LMywfQaQvq360SJwKUVusQ%3D%3D
ASSERTION #2: Data Has Ownership And Provenance https://www.dhirubhai.net/pulse/part-3-assertions-regarding-responsible-management-data-ian-kelly-xnxxe/?trackingId=5P2q0wygSdqXOnmt%2BQCZuw%3D%3D
ASSERTION #3: If Data Can Be Verified, It Can Be A Claim https://www.dhirubhai.net/pulse/part-4-assertions-regarding-responsible-management-data-ian-kelly-0uene
ASSERTION #4: One Can Use Digital Claims To Enter Into A Secure Digital Interaction Without Revealing The Content Of Digital Claims Or Providing Excessive Personal Information. https://www.dhirubhai.net/pulse/part-5-assertions-regarding-responsible-management-data-ian-kelly-yffke/?trackingId=zGKIQh8DRuasH2LCTKbxLg%3D%3D
ASSERTION #5: One Can Be Assured Of Secure Connectivity Between People Using The Terms Of A Digital Agreement https://www.dhirubhai.net/pulse/part-6-assertions-regarding-responsible-management-data-ian-kelly-l7tge/?trackingId=c%2BJ9xqYgQK6pQZsYtkoHDA%3D%3D
领英推荐
ASSERTION #6: If Provenance And Identity Are Assured, Data Can Be Open And Secure. https://www.dhirubhai.net/pulse/part-7-assertions-regarding-responsible-management-data-ian-kelly-ewnze/?trackingId=LKjM5IKzRnC83HRYt3BbPQ%3D%3D
+++++++++++++++++++++++++++++++++++++++++++++++++++++
ASSERTION #7: If I Control The Usage Of My Data, Any Processing On That Data Is No Longer “On My Behalf”, It Is “As If” I Am Executing The Processing.
Once I have control of what happens to my data and by what process, I have visibility and control into any processing done on or with my data and the results and usage of the derived data as it is a “child” of my data. It’s as if I am executing the processing and thus I can be assured of its integrity and repeatability. Processing can now take place anywhere if it conforms to this model and is no longer “on my behalf” (like a bank transfer or trade request) but “as if I initiate and and have full accountability and audibility of the transaction (financial or not) on my data for which I have assertable ownership. If I have full visibility, then I can monitor the (complex) state of my owned data enabling an event driven data system.
+++++++++++++++++++++++++++++++++++++++++++++++++++++
Stay tuned for the final entry of the series and a major announcement of a data and identity management system that aligns to these assertions and we hope with transform and simplify the management, security, privacy, and availability of data.
ASSERTION #8: If My Digital Activity Is Secure And Repeatable, The Collection Of These Digital Agreements and Digital Claims Becomes My Verifiable Online Identity, Even If I Am Anonymous, Pseudonymous, Or Acting On Behalf Of An Organization.
Partner - One Brightly Cyber
3 个月Well done Ian. Someone using your data for their own benefit, is a violation of trust, respect and privacy. And probably much more.