<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>identity Archives - IDPro</title>
	<atom:link href="https://idpro.org/tag/identity/feed/" rel="self" type="application/rss+xml" />
	<link>https://idpro.org/tag/identity/</link>
	<description>The Professional Organization for Digital Identity Management</description>
	<lastBuildDate>Thu, 04 Dec 2025 19:51:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://idpro.org/wp-content/uploads/2023/07/cropped-idpro_stickerA-circle-100-32x32.jpg</url>
	<title>identity Archives - IDPro</title>
	<link>https://idpro.org/tag/identity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Identity of Everything… Else</title>
		<link>https://idpro.org/the-identity-of-everything-else/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Thu, 04 Dec 2025 19:51:37 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2903</guid>

					<description><![CDATA[<p>This article is about “identity.” However, this is explicitly not about user accounts and what some may call “digital identities”. [&#8230;]</p>
<p>The post <a href="https://idpro.org/the-identity-of-everything-else/">The Identity of Everything… Else</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This article is about “identity.”</p>



<p>However, this is explicitly <em>not </em>about user accounts and what some may call “digital identities”. It’s also not about non-human identities (NHIs), workload, service, machine-to-machine, or customer accounts.&nbsp;</p>



<p>There are a lot of great articles already written on each and every one of these identity types by thought leaders, so I’d like to address the neglected others.</p>



<p>So, if this article is about identities, but none of the above, then what’s this article about? This is about other constructs that are fundamental to all Identity and Access Management programs, and to their related tools and applications. I’m referring to the identities of constructs like groups, applications, policies, networks, etc.</p>



<h2 class="wp-block-heading"><strong>Identity Constitution</strong></h2>



<p>Allow me to simplify the constitution of ‘Identity’ into having three parts: </p>



<ol class="wp-block-list">
<li>An identifier (as unique as possible)</li>



<li>Attributes, which provide further differentiation, context, etc.</li>



<li>Relationships (e.g., “belongs to”), which can be documented as part of #2</li>
</ol>



<p>“My dog’s name is Lola” ← These five words already encompass the three parts above:</p>



<ol class="wp-block-list">
<li>Her identifier: Lola</li>



<li>Attributes: type: Dog</li>



<li>Relationships: owner: Me (although, if Lola could talk, she’d tell you her human is my wife)</li>
</ol>



<p>An example of a non-living object is “my lucky t-shirt”. I’ve had this t-shirt for years, and it’s green, and it has a print of mountains with “Colo ‘rad’ o” written above (I’m a dad, I love it). At home, I may say, “have you seen my lucky t-shirt?”, and in the context of my family, chances are they’d know which one I’m talking about. If my daughter is not sure which t-shirt I’m talking about, she may ask, “what color is it?” (It’s green, an attribute). Life gives us an extensible schema to define any number of attributes to identify objects.</p>



<p>In the examples above, I shared the ‘Identities’ of two objects. The point is to ‘identify’ them.</p>



<p>If we turn to IAM-related objects, we can look at groups as in immediate need of proper identification. A group’s system identifier may be “xyz123”, attributes may include Group Name = “App X Users” (this may be considered the identifier, to the human eyes at least), and Group Description = “Accounts with access to App X”. Is this sufficient? Perhaps initially you’ll think “absolutely”. I’d argue that there’s a rich group identity hidden behind the ID, Name, and Description for this group. </p>



<p>The IAM systems I’m most familiar with allow me to define a rich, extensible schema for accounts with many different attributes and even different attribute-types (string, Boolean, array, etc). This is excellent and much needed. In the last few years, the ‘group schema’ became available, so I may now define a Boolean value ‘For SSO’, ‘For SCIM Provisioning’, or ‘For Policy’. In addition, I want to define ‘Pushed to App’ as a Boolean value, and if TRUE, then ‘App’ (string type, as I can’t define an App object relationship).</p>



<p>But, there’s no extensible schema for ‘Apps’, or for ‘Group Rules’, or ‘Policies’, or ‘Networks’, etc. Lots of opportunities here to elevate the schemas of other objects to a whole new level.&nbsp;</p>



<h2 class="wp-block-heading"><strong>The CMDB is an Identity Management system</strong></h2>



<p>It follows that the system of record for constructs such as applications, systems, and perhaps groups is actually an IAM system, but for constructs other than accounts.</p>



<p>A proper CMDB will contain the creation date for any of its configuration items (CIs), its reason for being, its location, and, importantly, its relationships to other CIs.</p>



<h3 class="wp-block-heading"><strong>A Source of Truth</strong></h3>



<p>One way to make your IAM system compliant and elevate its security is to delegate account creation to the correct source of truth. HR-driven provisioning is one example of this. If the IAM system delegates employee account creation to a correlated HR record, and the permissions to create accounts are removed from humans, a bad actor would have to shift their tactics to the HR system in order to create an account, which would likely require creating a role requisition, an applicant account, and then a hire/onboarding process.</p>



<p>Similarly, if the base attributes for a group, application, or other IAM construct are established and properly governed by the right source of truth, then the entire identity fabric will be more secure and compliant, but it’ll be like a self-maintaining organism, keeping the parts that are needed and auto-shedding those that have come to the end of their useful existence. </p>



<h2 class="wp-block-heading"><strong>Naming Conventions Don’t Work</strong></h2>



<p>You’ve likely implemented or have seen many naming conventions implemented to address this very topic. In my experience, a naming convention typically encodes attributes into the name (perhaps into a `Description`) with the intent to give more context to the object. This may work in some situations and it may help humans visually inspect the object. The problem begins when these existing encoded dimensions change or no longer capture the entirety of the object’s schema. When faced with this challenge, proper hygiene means renaming all existing objects, or, in the more common scenario, breaking the naming convention altogether. The end result is heterogeneous names and paralysis due to confusion and the need to research.</p>



<h2 class="wp-block-heading"><strong>Suggested Actions</strong></h2>



<p>If you have access to an extensible schema for your objects, use it. Give those objects a rich identity that empowers a complete lifecycle of the object, from creation to decommissioning.</p>



<p>In the case of our Lola, she has her tag on her collar with her name and our cell phone numbers. However, she also has a microchip that extends the schema of her attributes to include our details, her vaccinations, etc. in case she gets lost and loses her collar.</p>



<p>If you’re building or managing IAM software, expand the universe to enable rich schemas in the system. Some of us may want to have a “lucky” group/policy/agent, and we certainly want better ways to identify and protect our Lola’s.</p>



<p></p>



<p><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em></p>



<p></p>



<h2 class="wp-block-heading">About the author</h2>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="400" height="400" src="https://idpro.org/wp-content/uploads/2025/12/image.jpeg" alt="" class="wp-image-2904" srcset="https://idpro.org/wp-content/uploads/2025/12/image.jpeg 400w, https://idpro.org/wp-content/uploads/2025/12/image-300x300.jpeg 300w, https://idpro.org/wp-content/uploads/2025/12/image-150x150.jpeg 150w, https://idpro.org/wp-content/uploads/2025/12/image-320x320.jpeg 320w" sizes="(max-width: 400px) 100vw, 400px" /></figure>



<p>Pablo Valarezo is an Identity practitioner building and modernizing secure IAM programs over the last decade. His primary focus has been in the workforce side of IAM. He came to Information Security via system administration, project management, and audit and compliance.</p>
</div>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="(max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-large"><img decoding="async" width="600" height="600" data-id="2390" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-2390" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="(max-width: 600px) 100vw, 600px" /></figure>
</figure>
<p>The post <a href="https://idpro.org/the-identity-of-everything-else/">The Identity of Everything… Else</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GDPR Part 4: Identification, Classification, and Analysis</title>
		<link>https://idpro.org/gdpr-part-4-identification-classification-and-analysis/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Wed, 29 Jun 2022 19:25:40 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[identity]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=1701</guid>

					<description><![CDATA[<p>by David William Silva, PhD This is the last article of a series of four on the basics of the [&#8230;]</p>
<p>The post <a href="https://idpro.org/gdpr-part-4-identification-classification-and-analysis/">GDPR Part 4: Identification, Classification, and Analysis</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>by David William Silva, PhD</p>



<p>This is the last article of a series of four on the basics of the General Data Protection Regulation (GDPR). In the first article, we covered <a href="https://idpro.org/gdpr-part-1-context-motivations-and-goals/">context, motivations, and goals</a>. In the second article, we reviewed <a href="https://idpro.org/gdpr-part-2-terminology-and-basic-definitions/">terminology and basic definitions</a>. In the third article, we discussed <a href="https://idpro.org/gdpr-part-3-examples-and-applications/">examples and application</a>s of some of the main building blocks of GDPR. In this fourth article, we review some of the most critical issues in the GDPR while identifying, classifying, and analyzing each one in practical terms.</p>



<p>Without any concrete instance of an application subject to GDPR compliance, one might look into the GDPR text from a dangerously relaxed perspective which can lead (and it has been leading) to GDPR violations, overwhelming fines, and further administrative penalties. On the other hand,&nbsp;generally speaking, it is not always clear how to ensure GDPR compliance. Resorting to the GDPR text without a strategy might feel like drinking from a fire hose. The whole point of this series of four articles on GDPR was to propose a gentle introduction to the subject matter in a gradual, structured way.</p>



<p>The primary motivation behind this fourth and last article is to propose a way to identify key regulatory components that can be classified into major groups so we can discuss their importance and practical implications.&nbsp;</p>



<p>We organized the following discussion in four major groups: Must Know, Must Do, Better Have, and Better Do. It goes without saying that this is a non-exclusive and non-exhaustive discussion. Instead, for each of these major groups, we will select one or a few examples that configure a good start on the road to GDPR compliance. The “analysis” piece of this article will be presented as an informal discussion to keep this article within an acceptable length.</p>



<h3 class="wp-block-heading">Must Know</h3>



<p>If there are components that anyone interested in GDPR must know, these are probably the applicability and non-applicability of the Regulation and associated fines. The GDPR text can sometimes be very specific and practical, while some other portions leave too much room for interpretation. In any case, establishing a knowledge foundation is the best one can do towards GDPR compliance.</p>



<h3 class="wp-block-heading">Applicability and Non-Applicability of the GDPR</h3>



<p>The General Data Protection Regulation (GDPR) establishes rules for protecting natural persons concerning the processing of personal data (<a href="https://gdpr-info.eu/art-1-gdpr/">Article 1</a>). The GDPR “applies to the processing of personal data wholly or partly by automated means and to the processing other than by automated means of personal data which form part of a filing system or are intended to form part of a filing system” (<a href="https://gdpr-info.eu/art-2-gdpr/">Article 2</a>). The Regulation applies to any data processing related to members of the European Union (EU) regardless of the processors’ location. (<a href="https://gdpr-info.eu/art-3-gdpr/">Article 3</a>)</p>



<p><em>Natural person</em>&nbsp;and&nbsp;<em>data subject</em>&nbsp;are synonymous.&nbsp;<em>Personal data</em>&nbsp;is a term for data that reveals information that identifies or has the potential to identify a natural person.&nbsp;<em>Processing</em>&nbsp;is the term used to describe any operation executed on personal data.&nbsp;<em>A processor</em>&nbsp;is a term to describe a natural or legal person who processes data (<a href="https://gdpr-info.eu/art-4-gdpr/">Article 4</a>).</p>



<p>The GDPR&nbsp;does not apply&nbsp;to “the processing of personal data which concerns legal persons and in particular, undertakings established as legal persons, including the name and the form of the legal person and the contact details of the legal person” (<a href="https://gdpr-info.eu/recitals/no-14/">Recital 14</a>). Legal entities many times operate as a processor. Although the GDPR does not apply to data that identifies legal entities, legal entities often possess data that identifies natural persons (their customers). Therefore, GDPR protects these customers&#8217; right to privacy (<a href="https://gdpr-info.eu/art-28-gdpr/">Article 28</a>).</p>



<h3 class="wp-block-heading">Penalties</h3>



<p>Perhaps the most important exercise an organization intending to process data that can be seen as personally identifiable information (PII) can do is to identify what from the GDPR applies and does not apply in the context of the application that the organization is responsible for. It is not rare to see organizations downplaying the need to comply with privacy regulations such as the GDPR in an attempt to overlook its severity. However, in 2021, the GDPR&nbsp;<a href="https://termly.io/resources/articles/biggest-gdpr-fines/">issued fines up to $823.9 million</a>&nbsp;for violations.&nbsp;</p>



<p>Violations can seem subtle for some organizations already in possession of personal data. In 2020&nbsp;<a href="https://edpb.europa.eu/news/national-news/2022/aggressive-telemarketing-italian-sa-fines-enel-energia-eur-265-million_en">the GDPR issued a fine of $29.3 million</a>&nbsp;to a company that failed to obtain consent or to inform customers about using their personal data for telemarketing purposes.</p>



<p>The first step towards compliance is, obviously, to know the requirements and their applicability. In some portions of its text, the GDPR advises that in case of doubt, the requirement must be fulfilled regardless, such as in the case of performing a&nbsp;<a href="https://gdpr-info.eu/issues/privacy-impact-assessment/">privacy impact assessment</a>.</p>



<p>Furthermore, all the general conditions for imposing fines, with different levels of severity, can be found in&nbsp;<a href="https://gdpr-info.eu/art-83-gdpr/">Article 83</a>&nbsp;of the GDPR.&nbsp;</p>



<p>The GDPR establishes fines and further remedies or corrective powers when a violation occurs. Fines must be “effective, proportionate and dissuasive for each individual case. For the decision of whether and what level of penalty can be assessed, the authorities have a statutory catalogue of criteria which it must consider for their decision”. Severe violations (<a href="https://gdpr-info.eu/art-83-gdpr/">Article 83</a>) are subject to fines of up to 20 million euros or up to 4% of an organization&#8217;s global turnover of the preceding year, whichever is higher (<a href="https://gdpr-info.eu/issues/fines-penalties/">GDPR Fines and Penalties</a>).</p>



<h3 class="wp-block-heading">Must Do</h3>



<p>Not all procedures and specifications in the GDPR are mandatory, and most of what is mandatory is subject to exceptions under proper conditions. However, if there is one issue above all others that can never be neglected, that could easily be the requirement for consent. We discussed consent in the previous articles of this series, and we return to this subject to place it in the Must Do group from a practical perspective.</p>



<h3 class="wp-block-heading">Consent&nbsp;</h3>



<p>As we discussed in previous articles of this series, if an organization aims to process personal data, a mechanism for obtaining the consent of data subjects must be in place. According to&nbsp;<a href="http://eur-lex.europa.eu/legal-content/EN/AUTO/?uri=OJ:L:1993:095:TOC">Council Directive 93/13/EEC</a>, consent must be requested via a pre-formulated interface presented in an intelligible and easily accessible form, using objective and easy-to-understand language, avoiding any terms that might be considered unfair. Before providing consent, the data subject should have no doubt of the controller&#8217;s identity and the purpose of processing personal data that is being requested.</p>



<p>The Regulation summarily prohibits the processing of personal data unless expressly allowed by law or by the data subject. Besides consent, other mechanisms also apply for allowing the processing of personal data, such as contract, legal obligations, vital interest of the data subject, public interest, and legitimate interest according to&nbsp;<a href="https://gdpr-info.eu/art-6-gdpr/">Article 6(1)</a>. Processing personal data in the clear without consent or the previously mentioned mechanisms is a violation. (<a href="https://gdpr-info.eu/issues/consent/">Key Issues: Consent</a>)</p>



<p>Recall that consent must be &#8220;freely given, specific, informed, and unambiguous.&#8221; If processing personal data has been enabled by consent, whoever is processing that data must be able to prove that the data subject has indeed consented to the processing of their data. The data subject has the right to withdraw their consent at any time, and this process must be as easy as it was to give the consent. Withdrawing consent does not affect the lawfulness of the processing of data based on consent before its withdrawal. Conditions for Consent,&nbsp;<a href="https://gdpr-info.eu/art-7-gdpr/">Article 7</a>, is part of the main principles of the GDPR.</p>



<p>At any indication that consent was obtained under pressure, penalty, and/or by some form of imposition, consent will not be regarded as freely given since, in this case, the data subject is unable to refuse or withdraw consent without detriment.</p>



<p>The GDPR prohibits the processing of personal data that reveals &#8220;racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and the processing of genetic data, biometric data to uniquely identify a natural person, data concerning health or data concerning a natural person&#8217;s sex life or sexual orientation.&#8221;&nbsp;<a href="https://gdpr-info.eu/art-9-gdpr/">Article 9</a>&nbsp;establishes several exceptions to this prohibition, including law enforcement activities, support of court procedures, public interest, and legal inability of a data subject to give consent.</p>



<p>The processing of data (by third parties) that leads to identifying data subjects is a violation of the GDPR. (<a href="https://gdpr-info.eu/issues/personal-data/">Key Issues: Personal Data</a>)</p>



<p>Processing of personal data is allowed when the processing no longer permits the identification of data subjects, provided that appropriate safeguards exist, such as pseudonymization (<a href="https://gdpr-info.eu/recitals/no-156/">Recital 156</a>).</p>



<p>Consent for personal data collection and processing for a particular purpose is not everything and certainly not the end of an organization&#8217;s concerns with respect to GDPR compliance. Still, it is undoubtedly one of the most important first steps toward the lawful processing of personal data.</p>



<h3 class="wp-block-heading">Better Have</h3>



<p>The term “better” here does not imply any relaxation with respect to obligations imposed by the GDPR. As mentioned earlier, some requirements are followed by conditions and exceptions which might release an organization from associated obligations. The term “better” here implies that even if it is not objectively mandatory, some requirements are so important that it is better for an organization to address them than otherwise. That is, the benefits of implementing some measures outweigh any associated inconvenience.</p>



<h3 class="wp-block-heading">Data Protection Officer</h3>



<p>The GDPR establishes the concept and conditions for the obligation of organizations to have a Data Protection Officer (DPO). The legal obligation to appoint a DPO does not depend on the size of the organization “but on the core processing activities, which are defined as those essential to achieving the company’s goals. If these core activities consist of processing sensitive personal data on a large scale or a form of data processing which is particularly far-reaching for the rights of the data subjects, the company has to appoint a DPO.” The GDPR also establishes that “willful or negligent failure to appoint a Data Protection Officer despite a legal obligation is an infringement subject to fines” (<a href="https://gdpr-info.eu/issues/data-protection-officer/">Key Issues: Data Protection Officer</a>).</p>



<p>Organizations need to take the need and role of a DPO seriously. The DPO must be impartial and empowered to assist the organization in implementing all necessary protective measures to meet GDPR requirements. The DPO cannot perform functions that place them in a position of conflict of interest.</p>



<p>Electing a DPO is one of those measures that an organization processing personal data might want to have in place regardless of a clear conviction of its legal obligation, providing immediate benefits versus risks and penalties associated with failing to do so.</p>



<p>Additional information about the DPO, including the associated qualification they might have and how to hire one, is<a href="https://gdpr.eu/data-protection-officer/"> available</a>.</p>



<h3 class="wp-block-heading">Better Do</h3>



<p>Once again, “better” here does not intend to relax any obligations from the Regulation. Instead, we use it to identify and put together mechanisms, procedures, and requirements which are better to address even if an organization falls into some condition in which it is not obligated to comply.</p>



<h3 class="wp-block-heading">Privacy Impact Assessment</h3>



<p>An organization that intends to process data must first conduct a privacy impact assessment (PIA) or data protection impact assessment (DPIA) and document it. If certain measures are in place, a PIA or DPIA might not be absolutely necessary. A PIA or DPIA is mandatory if risks from data processing are high. In case of doubt or difficulty in determining risk, a DPIA should be conducted. (Key Issues:&nbsp;<a href="https://gdpr-info.eu/issues/privacy-impact-assessment/">Privacy Impact Assessment</a>)</p>



<h3 class="wp-block-heading">Records of Processing Activities</h3>



<p>When personal data is processed, the GDPR obligates written documentation and an overview of the procedures by which personal data is processed. (<a href="https://gdpr-info.eu/art-30-gdpr/">Article 30</a>) This documentation must be made entirely available to authorities upon request. (Key Issues:&nbsp;<a href="https://gdpr-info.eu/issues/records-of-processing-activities/">Records of Processing Activities</a>) Not maintaining records of processing activities is a violation of the GDPR (<a href="https://gdpr-info.eu/art-83-gdpr/">Article 83(4)(a)</a>).</p>



<h3 class="wp-block-heading">Procedural Rights</h3>



<p>A data subject has the right to access personal data being processed. Omitted or incomplete disclosure of access to personal data being processed upon request is subject to fines. (Key Issues:&nbsp;<a href="https://gdpr-info.eu/issues/right-of-access/">Right to Access</a>) Any right provisioned by the GDPR, such as the&nbsp;<a href="https://gdpr-info.eu/issues/right-to-be-forgotten/">Right to be Forgotten</a>&nbsp;and the&nbsp;<a href="https://gdpr-info.eu/issues/right-to-be-informed/">Right to be Informed</a>, must be observed when applicable.&nbsp;</p>



<h3 class="wp-block-heading">Safeguards</h3>



<p>The GDPR establishes that security measures must be considered and implemented according to risk assessment. These measures include (but are not limited to) pseudonymization, encryption, mechanisms for ensuring confidentiality, integrity, availability, and resilience, regular testing, ongoing evaluation of the effectiveness of present measures, and continuous improvement of the security of processing (<a href="https://gdpr-info.eu/art-32-gdpr/">Article 32</a>).</p>



<h3 class="wp-block-heading">Data Minimization</h3>



<p>Data minimization is the term used to describe “adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed” (<a href="https://gdpr-info.eu/art-5-gdpr/">Article 5</a>). It is about only collecting and processing data that is absolutely required for the purposes stated when consent was requested.</p>



<p>Data minimization can prevent organizations from accidentally violating GDPR requirements for processing personal data, such as&nbsp;<em>purpose limitation</em>, where data is only collected for the legitimate purposes stated when requesting consent and not further processed in a way that violates its limits. Data minimization can also reduce risks and liabilities when processing personal data, such as in the case of data leakage.</p>



<p>Processing personal data might be allowed for particular purposes such as archiving, scientific or historical research, or statistical purposes as long as appropriate safeguards are in place. These safeguards aim to ensure that required measures are in place, particularly the principle of data minimization (<a href="https://gdpr-info.eu/recitals/no-156/">Recital 156</a>).</p>



<p>Data minimization is part of general data protection principles recognized by the GDPR, such as purpose limitation, limited storage periods, data quality, data protection by design and by default, the legal basis for processing, processing of special categories of personal data, measures to ensure data security, among others (<a href="https://gdpr-info.eu/art-47-gdpr/">Article 47</a>).</p>



<h3 class="wp-block-heading">Anonymization</h3>



<p>The GDPR does not apply “to anonymous information, namely, information which does not relate to an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable.” Furthermore, the GDPR “does not, therefore, concern the processing of such anonymous information, including for statistical or research purposes” (<a href="https://gdpr-info.eu/recitals/no-26/">Recital 26</a>).</p>



<p>Although allowed by the GDPR, it is well known that techniques such as anonymization are faulty (<a href="https://heinonline.org/HOL/LandingPage?handle=hein.journals/uclalr57&amp;div=48&amp;id=&amp;page=">Broken Promises of Privacy: Responding To The Surprising Failure of Anonymization</a>). At least since the late 2000s, schemes for de-anonymizing data have been proposed (<a href="https://ieeexplore.ieee.org/abstract/document/4531148">Robust De-Anonymization of Large Sparse Datasets</a>).</p>



<h3 class="wp-block-heading">Pseudo-anonymization</h3>



<p>Pseudonymization “means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person” (<a href="https://gdpr-info.eu/art-4-gdpr/">Article 4</a>).</p>



<p>The GDPR establishes that techniques such as pseudonymization can reduce risks to the data subjects and help controllers and processors meet their data-protection obligations. The explicit introduction of pseudonymization is not intended to exclude any other measures for data protection (<a href="https://gdpr-info.eu/recitals/no-28/">Recital 28</a>).</p>



<p>The GDPR acknowledges that techniques such as pseudonymization may be reversed by unauthorized parties, which constitutes a violation (<a href="https://gdpr-info.eu/recitals/no-85/">Recital 85</a>).</p>



<h3 class="wp-block-heading">Encryption</h3>



<p>Organizations can reduce the probability of a data breach as well as the risks of fines by resorting to the encryption of personal data. Processing data is naturally associated with a certain degree of risk. The GDPR recognizes encrypted data as unreadable by non-key owners, which therefore minimizes the risks in case of incidents during data processing. Furthermore, the GDPR recognizes encryption as the best way to protect data in transit and at rest (<a href="https://gdpr-info.eu/issues/encryption/">Key Issues: Encryption</a>).</p>



<h3 class="wp-block-heading">Authentication</h3>



<p>User authentication is part of the concept of Privacy by Design discussed in the Regulation (Key Issues:&nbsp;<a href="https://gdpr-info.eu/issues/privacy-by-design/">Privacy by Design</a>). If not done properly, instead of a safeguard, authentication can be an opening for a GDPR violation. One example would be to collect from a natural person more information than necessary for implementing an authentication mechanism and, from there, make inferences about the individual that exceeds the scope of authentication. The GDPR clearly states that personal data is, by nature, sensitive data (<a href="https://gdpr-info.eu/recitals/no-51/">Recital 51</a>).&nbsp;</p>



<p>Requesting additional data for identification purposes is allowed if a controller can’t identify a natural person but is not mandatory. The controller should not refuse to take additional information from the data subject (<a href="https://gdpr-info.eu/recitals/no-57/">Recital 57</a>).</p>



<h3 class="wp-block-heading">Where To Go From Here</h3>



<p>The IDPro Body of Knowledge offers an <a href="https://bok.idpro.org/article/id/11/">introduction to the GDPR</a> and a discussion on the <a href="https://bok.idpro.org/article/id/24/">impact of GDPR on identity and access management</a>. The <a href="https://gdpr-info.eu/">full GDPR text is available online</a> in a friendly format. Some templates are also available such as the <a href="https://gdpr.eu/data-processing-agreement/">Data Processing Agreement</a>, <a href="https://gdpr.eu/privacy-notice/">instructions on how to write a GDPR-compliant privacy note</a>, and the <a href="https://gdpr.eu/right-to-erasure-request-form/">Right to Erase Request Form</a>. The European Data Protection Board has a <a href="https://edpb.europa.eu/news/news_en?news_type=2">GDPR-centric news feed</a> which can be useful for keeping up with the latest developments about GDPR.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="998" height="261" src="https://idpro.org/wp-content/uploads/2022/05/David-Silva-Image.png" alt="" class="wp-image-1643" srcset="https://idpro.org/wp-content/uploads/2022/05/David-Silva-Image.png 998w, https://idpro.org/wp-content/uploads/2022/05/David-Silva-Image-300x78.png 300w, https://idpro.org/wp-content/uploads/2022/05/David-Silva-Image-768x201.png 768w" sizes="auto, (max-width: 998px) 100vw, 998px" /></figure>



<p><strong>About the Author</strong></p>



<p>David William Silva is a Senior Research Scientist at Symetrix Corporation and Algemetric and is responsible for the research and development of innovative products related to security, privacy, and efficient computation powered by applied mathematics. David started his career as a Software Engineer focused on web services and agile software development, which led him to be involved with several projects from startups to government and large corporations. After 17 years of conducting R&amp;D in Brazil, David moved to the US to engage in scientific research applied to a global industry of security and privacy, which has been his focus for the past seven years.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="588" height="199" src="https://idpro.org/wp-content/uploads/2022/05/David-Silva-Badges.png" alt="" class="wp-image-1641" srcset="https://idpro.org/wp-content/uploads/2022/05/David-Silva-Badges.png 588w, https://idpro.org/wp-content/uploads/2022/05/David-Silva-Badges-300x102.png 300w" sizes="auto, (max-width: 588px) 100vw, 588px" /></figure>
<p>The post <a href="https://idpro.org/gdpr-part-4-identification-classification-and-analysis/">GDPR Part 4: Identification, Classification, and Analysis</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Announcing IDPro®’s Diversity &#038; Inclusion Packages for Identiverse® 2022!</title>
		<link>https://idpro.org/announcing-idpros-diversity-inclusion-packages-for-identiverse-2022/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Thu, 02 Jun 2022 18:18:21 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[diversity]]></category>
		<category><![CDATA[iam]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[idpro]]></category>
		<category><![CDATA[inclusion]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=1650</guid>

					<description><![CDATA[<p>As part of IDPro®’s continued efforts to promote a diverse and inclusive identity community, we are pleased to announce that [&#8230;]</p>
<p>The post <a href="https://idpro.org/announcing-idpros-diversity-inclusion-packages-for-identiverse-2022/">Announcing IDPro®’s Diversity &#038; Inclusion Packages for Identiverse® 2022!</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As part of IDPro<sup>®</sup>’s continued efforts to promote a diverse and inclusive identity community, we are pleased to announce that we are offering two Diversity &amp; Inclusion Packages for those wishing to attend <a href="https://identiverse.com/">Identiverse<strong><sup>®</sup></strong></a> 2022.&nbsp;</p>



<p>These packages include one Identiverse event ticket, donated by Identiverse, and up to $1,000 for expense reimbursement, fully funded by generous donations from IDPro<strong><sup> </sup></strong>members.</p>



<p>“We are excited to be able to offer these Diversity &amp; Inclusion Packages to the identity community.<strong> </strong>I have been a firsthand witness to the impact these values are having on this industry and am very proud of our organization for being able to support this effort.”<strong> </strong>—<strong> </strong>Heather Vescent, Executive Director and President of IDPro.</p>



<p>To be considered, please submit a personal statement of no more than 300 words to <a href="mailto:director@idpro.org">director@idpro.org</a> by 11:59 PM PDT on June 7, 2022. Your personal statement should answer the following questions:</p>



<ol class="wp-block-list"><li>Can you please share a little bit about your background?</li><li>How did your interest in identity come about?</li><li>What do you hope to learn at Identiverse 2022?</li><li>Why are diversity and inclusion important to you?</li><li>Are you willing to write a brief blog post or be interviewed about what you learn at Identiverse 2022?&nbsp;</li></ol>



<p>Please include any social media links in your personal statement.&nbsp;</p>



<p>Our vision at IDPro drives us toward enabling a diverse, supportive, and inclusive identity community and we are grateful for our dedicated members who are helping us achieve this important goal. We look forward to reviewing your submissions and we hope to see you at Identiverse 2022!</p>
<p>The post <a href="https://idpro.org/announcing-idpros-diversity-inclusion-packages-for-identiverse-2022/">Announcing IDPro®’s Diversity &#038; Inclusion Packages for Identiverse® 2022!</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: idpro.org @ 2026-04-01 19:32:20 by W3 Total Cache
-->