Part III - Employee/Contractor Legal Identities
Copyright 123RF

Part III - Employee/Contractor Legal Identities

December 27, 2023 update - I strongly suggest readers skim How Do I Trust Entities??? Different Levels of Identity & Credential Assurance - A Thought Paper

June 13, 2023 update - Note to reader: I wrote this series now a little over two years ago. Within the articles, I provide updates since the post was written. I strongly suggest readers skim these more recent articles:


This post examines rethinking employee and contractor legal identities used in enterprises. It's the third post in a series of rethinking enterprise identity architecture. If you haven't read Part I - then I strongly advise you to do so, before reading on.

A Dumb Question

I was the identity architect for a government's digital citizen identity & authentication program. My team met with the government's security auditors, who told us they were the first jurisdiction in North America to use facial recognition on driver's licenses. Now, many years later, it wasn't working so well. Why? Fake birth certificates.

People were traveling across the country, creating false identities, and then leveraging this to move up the identity food chain, e.g. drivers licenses, passports, claiming government benefits and opening up bank accounts, etc.?The cost of a crappy legal identity system today is staggering .

Given this, here's my dumb question - "Is it really Jane Doe who's either standing in front of you, or applying online for a job?

Identity Assurance and Risk

The answer to the above question is it depends on risk. If the level of enterprise risk is low, then Jane Doe presenting her driver's license or ID card might suffice. As the risk level grows, so to must the identity verification processes used (called identity assurance in the trade). Yet, given what I learnt as an identity architect, proving a person is who they claim to be isn't easy anymore. How can an enterprise assure themselves it really is Jane Doe?

June 2022 Note:

To understand the complexity of legal identity, I strongly suggest readers wade their way through this, "Legal Identity Problem Statements” - https://www.dhirubhai.net/pulse/legal-identity-problem-statements-guy-huntington/

Enter Toda LSSI

Skim this architecture doc describing the new rethought human legal identity architecture:

Study the diagram at the beginning. It leverages a new "Legal Self-Sovereign Identity (LSSI)" of four possible types:

  • Physical legal identity card
  • Digital legal identity app
  • A physical wristband biometrically tied to the user
  • A chip implanted into them

At birth, Jane Doe's forensic biometrics (fingerprints and iris) would be obtained and written not only to Jane's birth registration in the civil registration vital statistics (CRVS) system, but also issued to her, both physically and digitally, via her SOLICT (Source of Legal Identity & Credential Truth) via a Toda file.

Jane Doe's forensic biometrics would be written to the physical/digital Toda file, using anonymous biometrics (described in Part I ). Further, the CRVS digitally signed the Toda file on the physical fob/card, digital legal app, issued to Jane.

It's likely, as she comes of age, that her face image would also be obtained by the CRVS system, digitally signed and also written to her Toda file. Jane is now in control of her legal self-sovereign identity.

Enter the Employer

The employer will have a degree of risk for ascertaining Jane Doe's legal identity and will likely take the following measures accordingly:

  • Very low risk - If Jane Doe is volunteering, where she doesn't have to prove her legal identity, BUT DOES have to prove she's of age of majority, then Jane will present, with her consent, from her LSSI device, she's of age of majority. The enterprise may accept this at face value or not. If not, they may want to check the digital signature from the jurisdiction issuing the LSSI and/or match Jane's face to the image presented from the LSSI. If they match, Jane's good to go.
  • Low risk - If the employer wants to verify Jane's legal identity, then with Jane's consent, she'd release the legal identity information from the LSSI device. The employer may trust this or not. If not, they'd check the digital signature from the jurisdiction and/or check the image of Jane from the LSSI against her.
  • Medium risk - The employer would do all of the above, as well as request Jane to present her fingerprints and iris scan to be compared to the ones from the LSSI. The digital signature can be confirmed via a quick electronic trip to the issuing authoritative source (CRVS jurisdiction system)
  • High risk - The employer might request Jane Doe to go to a local notary to have them check Jane Doe's biometrics, writing an attestation it's really Jane Doe

All of the above equally apply to contractors, etc.

It Also Applies to Education Credentials

The paper referred to in Part I, demonstrates how Jane Doe can apply for a job using her LSSI device, but also using it to verify her education credentials. Employers will like this since using the same LSSI they can instantly verify Jane's education credentials. Jane likes it because she doesn't have to produce more documents attesting to her education.

June 2022 Note: Skim this article, “Verifiable Credentials For Humans and AI Systems/Bots” - https://www.dhirubhai.net/pulse/verifiable-credentials-humans-ai-systemsbots-guy-huntington/ .

It Also Applies to Jane's Dependents

If Jane Doe is married or has kids, how's an employer's HR benefits service to know? The Toda LSSI solution contains legal dependent's information. So, with Jane Doe's consent, she'd supply the dependents via her LSSI. Any changes to the dependents are updated immediately, once the authoritative legal source has published this to Jane Doe's Toda file.

June 2022 note: Skim this article, “Legal Identity Relationships” - https://www.dhirubhai.net/pulse/digital-identity-legal-relationships-its-problem-guy-huntington/

Enter Smart Digital Entities of the Employee, Contractor, etc.

The fast emerging world of smart digital entities , means human employees and contractors might be using these on their jobs. Again, depending on the risk involved to the employer, they might want to know the entity they're dealing with is a legally registered version of Jane Doe. How will this be done?

Digital Entities Tied to Human Legal Physical Identities

June 2022 Notes:

  1. In the new human legal identity architecture “Rethinking Human Legal Identity” - https://hvl.net/pdf/RethinkingHumanLegalIdentity.pdf , the new age CRVS system can register digital entities against the human physical legal identity. So, if the risk warrants it, the employer can determine from Jane Doe the Toda file for the digital entity, as well as secrets/cryptography to verify the identity of Jane's digital entity.
  2. Skim this article on identity principles,?“Revised Principles of Identity” - https://www.dhirubhai.net/pulse/revised-laws-identity-guy-huntington/
  3. To see a practical example of this in a person's life, skim this article, ?“An Identity Day in the Life of Jane Doe” - https://www.dhirubhai.net/pulse/identity-day-life-jane-doe-guy-huntington/ . It describes Jane using one of her registered legal smart digital identities of her at work.
  4. Note - in the not so distant future, it's highly likely employers will also issue smart digital identities to their employees.

Changes to Jane Doe's Legal Identity Status

Note that any change to Jane Doe's human legal identity status and/or her digital entities, are entered into Jane Doe's CrVS system, her SOLICT, as well as her LSSI devices. Depending on the consent agreement between Jane and the employer, the employer may or may not be notified of these changes. Hypothetically, this might include legal address changes, name changes, dependent changes, etc.

February 2022 update:

Skim these two articles:

They discuss the growing need to automatically let people/enterprises know of a person's death. An employer, as a condition of employment, might request automatic notification of Jane Doe's death from either a CRVS service and/or Jane Doe's death service.

Ensuring Trust in the LSSI From an Employer's Perspective

The new human legal identity architecture discusses the need to create a 24x7x365 threat assessment service against the legal identity governance, business processes and technological infrastructure. This is key in rapidly addressing new threats due to rapid technological change. Thus, employers can more readily trust the LSSI device Jane Doe's presenting.

It Works Globally

The CRVS, SOLICT, LSSI device framework is global. This means an employer hiring across multiple jurisdictions, can use the same LSSI to verify Jane Doe, regardless of where she comes from.

What if a Jurisdiction Doesn't Offer LSSI?

June 2022 Update:

I have ideas about how to create a commercial version of the above. Contact me if you'd like to chat.

Summary

The Toda LSSI framework allows employers a more trustworthy service to verify Jane Doe's legal identity. It also works for Jane, being able to present her legal identity, education credentials, etc., easily. It works globally.

In the next post, I'll discuss the enterprise creating its own Toda files for each employee, contractor.

Here's the links to articles in this series:

Enterprise readers might also find these articles very relevant to rethinking enterprises:

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles ?I've written,?or my webpage ?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT

?


要查看或添加评论,请登录

Guy Huntington的更多文章

社区洞察

其他会员也浏览了