ASSERTION #7: Assertions Regarding the Responsible Management of Data

ASSERTION #7: Assertions Regarding the Responsible Management of Data

ASSERTION #7: If I Control The Usage Of My Data, Any Processing On That Data Is No Longer “On My Behalf”, It Is “As If” I Am Executing The Processing.

To catch up on parts 1-7, click below

ASSERTION #0: Data is the Observable Product of a Change in State https://www.dhirubhai.net/pulse/assertions-responsible-management-data-ian-kelly-ls0je/?trackingId=mpg7dEs4Q6Wd7ypTVXlyVg%3D%3D

ASSERTION #1: Data Is Property https://www.dhirubhai.net/pulse/part-2-assertions-regarding-responsible-management-data-ian-kelly-ooste/?trackingId=LMywfQaQvq360SJwKUVusQ%3D%3D

ASSERTION #2: Data Has Ownership And Provenance https://www.dhirubhai.net/pulse/part-3-assertions-regarding-responsible-management-data-ian-kelly-xnxxe/?trackingId=5P2q0wygSdqXOnmt%2BQCZuw%3D%3D

ASSERTION #3: If Data Can Be Verified, It Can Be A Claim https://www.dhirubhai.net/pulse/part-4-assertions-regarding-responsible-management-data-ian-kelly-0uene

ASSERTION #4: One Can Use Digital Claims To Enter Into A Secure Digital Interaction Without Revealing The Content Of Digital Claims Or Providing Excessive Personal Information. https://www.dhirubhai.net/pulse/part-5-assertions-regarding-responsible-management-data-ian-kelly-yffke/?trackingId=zGKIQh8DRuasH2LCTKbxLg%3D%3D

ASSERTION #5: One Can Be Assured Of Secure Connectivity Between People Using The Terms Of A Digital Agreement https://www.dhirubhai.net/pulse/part-6-assertions-regarding-responsible-management-data-ian-kelly-l7tge/?trackingId=c%2BJ9xqYgQK6pQZsYtkoHDA%3D%3D

ASSERTION #6: If Provenance And Identity Are Assured, Data Can Be Open And Secure. https://www.dhirubhai.net/pulse/part-7-assertions-regarding-responsible-management-data-ian-kelly-ewnze/?trackingId=LKjM5IKzRnC83HRYt3BbPQ%3D%3D

+++++++++++++++++++++++++++++++++++++++++++++++++++++

ASSERTION #7: If I Control The Usage Of My Data, Any Processing On That Data Is No Longer “On My Behalf”, It Is “As If” I Am Executing The Processing.

Once I have control of what happens to my data and by what process, I have visibility and control into any processing done on or with my data and the results and usage of the derived data as it is a “child” of my data. It’s as if I am executing the processing and thus I can be assured of its integrity and repeatability. Processing can now take place anywhere if it conforms to this model and is no longer “on my behalf” (like a bank transfer or trade request) but “as if I initiate and and have full accountability and audibility of the transaction (financial or not) on my data for which I have assertable ownership. If I have full visibility, then I can monitor the (complex) state of my owned data enabling an event driven data system.

+++++++++++++++++++++++++++++++++++++++++++++++++++++

Stay tuned for the final entry of the series and a major announcement of a data and identity management system that aligns to these assertions and we hope with transform and simplify the management, security, privacy, and availability of data.

ASSERTION #8: If My Digital Activity Is Secure And Repeatable, The Collection Of These Digital Agreements and Digital Claims Becomes My Verifiable Online Identity, Even If I Am Anonymous, Pseudonymous, Or Acting On Behalf Of An Organization.

Jay Borden

Partner - One Brightly Cyber

3 个月

Well done Ian. Someone using your data for their own benefit, is a violation of trust, respect and privacy. And probably much more.

回复

要查看或添加评论,请登录

Ian Kelly的更多文章

社区洞察

其他会员也浏览了