Civic Engagement Platform

An official website of the OECD.
Created by the Public Governance Directorate This website was created by the OECD Observatory of Public Sector Innovation (OPSI) and Observatory of Civic Space, both within the Public Governance Directorate (GOV).
How to validate authenticity Validation that this is an official OECD website can be found on the Civic Space page of the corporate OECD website.
Go back

Draft Recommendation on the Governance of Digital Identity

More information and context

Commments for version

updated at 21 Mar 2023
  How I can comment this document?
Comments about See in context
V. 5. Introduce robust arrangements to ensure that any attributes and credentials shared through a digital identity solution are accurate, complete, kept up-to-date, and relevant;
1 comment
Comments about See in context
V. 7. Take steps to establish trusted, secure and legally recognised mechanisms by which users can use digital identity solutions to mandate someone, or delegate representation rights, to act on their behalf in a manner that is transparent to, manageable, and traceable by, the user;
1 comment
Comments about See in context
VIII. 2. Engage in international regulatory co-operation to enable cross-border interoperability of digital identity systems, such as by assessing the coherence, compatibility or equivalence of existing laws, trust frameworks and technical standards, exploring collaboration through free trade agreements and identifying opportunities for cross-border regulatory experimentation;
1 comment
Comments about See in context
HAVING REGARD to the technical standards developed by other fora, such as the European Telecommunications Standards Institute (ETSI), the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), the United States National Institute of Standards and Technology (NIST) and the World Wide Web Consortium (W3C), as well as related work undertaken by the European Commission, the United Nations Commission on International Trade Law (UNCITRAL), and the World Bank;
2 comments
Comments about See in context
IV. 6. Establish a national trust framework, or align with relevant regional trust frameworks, to set out common requirements against different Levels of Assurance (LoA) that digital identity solution providers can follow to facilitate trust within the digital identity ecosystem;
1 comment
Comments about See in context
IV. 5. Promote collaboration between the public and private sectors and support the development of a healthy market for digital identity solutions, as appropriate, to encourage innovation and explore the potential value of alternative models and technologies;
1 comment
Comments about See in context
V. 2. Treat privacy and data protection as fundamental tenets of digital identity systems, and encourage the adoption of privacy-by-design and privacy-by-default approaches that include informed consent, selective disclosure and collection, as well as purpose and use limitations regarding personal data;
1 comment
Comments about See in context
IV. 7. Establish clear responsibilities for the regulation and oversight of digital identity systems, such that the rights of users are protected and that adequate mechanisms for dispute resolution, redress and recovery are in place.
2 comments
Comments about See in context
RECOGNISING that trust between the different actors of the digital identity ecosystem is critical for the proper functioning of digital identity and should be promoted by domestically appropriate policies and solutions;
1 comment
Comments about See in context
IV. RECOMMENDS that Adherents take a strategic approach to digital identity and define roles and responsibilities across the digital identity ecosystem. To this effect,Adherents should:
1 comment
Comments about See in context
Digital identity ecosystem refers to the different actors involved in the digital identity system, such as policymakers, regulators, government supervisory bodies, digital identity solution providers, credential issuers, service providers, and users. The ecosystem may include different domain-specific solutions and their associated actors;DEVELOPING USER-CENTRED AND INCLUSIVE DIGITAL IDENTITY
1 comment
Comments about See in context
HAVING REGARD to the technical standards developed by other fora, such as the European Telecommunications Standards Institute (ETSI), the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), the United States National Institute of Standards and Technology (NIST) and the World Wide Web Consortium (W3C), as well as related work undertaken by the European Commission, the United Nations Commission on International Trade Law (UNCITRAL), and the World Bank;
2 comments
Comments about See in context
including registration, issuance, use, expiration or revocation, and maintenance or repair;
1 comment
Comments about See in context
RECOGNISING that trust between the different actors of the digital identity ecosystem is critical for the proper functioning of digital identity and should be promoted by domestically appropriatepolicies and solutions;
1 comment
Comments about See in context
II. 2. c. measuring operational performance in order to iterate the digital identity system and solutions, as appropriate;
1 comment
Comments about See in context
VIII. 3. Ensure that the cross-border interoperability of digital identity is not used to discriminate against foreign users in their access to essential services or commercial transactions;
1 comment
Comments about See in context
I. AGREES that, for the purposes of the present Recommendation, the following definitionsare used:
1 comment
Comments about See in context
Digital identity ecosystem
1 comment
Comments about See in context
Credential issuer refers to any entity, public or private, that issues credentials to users;
1 comment
Comments about See in context
Credential refers to a set of one or more electronically recorded and trusted assertions about a user made by a credential issuer, such as a driver’s license, ID card, permit, or qualification;
1 comment
Comments about See in context
Digital identity refers to a set of electronically captured and stored attributes and/or credentials that can be used to prove a quality, characteristic, or assertion about a user, and, when required, support the unique identification of that user;
1 comment
Comments about See in context
V. 1. Recognise security as foundational to the design of trusted digital identity systems and ensure that digital identity solution providers comply with all relevant requirements to prevent harms to users, service providers, and societies;
1 comment
Comments about See in context
III. 2. Take steps to ensure that access to essential services, including those in the public and private sector is not restricted or denied to natural persons who, for whatever reason, cannot access or use a digital identity solution;
4 comments
Comments about See in context
VI. 3. Provide access to a catalogue of resources intended to support service providers onboard with the digital identity system such as common technical components, documentation or relevant technical support as appropriate;
2 comments
Comments about See in context
II. 4. Encourage the development of digital identity solutions that empower users to easily and securely control what attributes and credentials they share, when, and with whom.
4 comments
Comments about See in context
VII. 1. Identify the priority use cases for cross-border interoperability of digital identity systems according to their context and the experience of their users by identifying the activities that require the sharing of attributes and/or credentials in a different jurisdiction;
1 comment
Comments about See in context
IV. RECOMMENDS that Adherents take a strategic approach to digital identity and define roles and responsibilities across the digital identity ecosystem. To this effect, Adherents should:
1 comment
Comments about See in context
RECOGNISING that both the public and private sector contribute to the success of digital identity systems, and that their roles and relative contributions in the digital identity ecosystem might be different across countries;
1 comment
Comments about See in context
RECOGNISING that the different approaches taken by Adherents create a need for interoperability of secure and trusted digital identity systems across borders, which calls for international collaboration and the development and adoption of common technical standards to ensure that all users are always able to access essential services;
1 comment
Comments about See in context
RECOGNISING the value of trust services such as electronic signatures, electronic time-stamps, and electronic seals to support the usability of digital identity solutions;
1 comment
Comments about See in context
III. 3. Involve the public and civil society in the development of digital identity systems to ensure that they are open and transparent;
1 comment
Comments about See in context
RECOGNISING the value of trust services such as electronic signatures, electronic time-stamps, and electronic seals to support the usability of digital identity solutions;
1 comment
Comments about See in context
III. 4. Raise awareness of the benefits and secure uses of digital identity, the way in which the digital identity system protects users and mitigates potential harms, and identify opportunities to build the skills and capabilities of users;
1 comment
Comments about See in context
RECOGNISING that effective, usable, secure and trusted digital identity systems can facilitate and simplify access to a wide range of services and thereby contribute to social and economic value;
2 comments
Comments about See in context
III. 1. Promote accessibility, affordability, and usability across the digital identity lifecycle in order to increase access to a secure and trusted digital identity solution, including by vulnerable groups and minorities in accordance with their needs;
1 comment
Comments about See in context
IV. 5. Promote collaboration between the public and private sectors and support the development of a healthy market for digital identity solutions, as appropriate, to encourage innovation and explore the potential value of alternative models and technologies;
2 comments
Comments about See in context
II. 2 Use service design methodologies to ensure that digital identity systems respond to the needs of users and achieve accessible, ethical, and equitable outcomes, particularly by:
2 comments
Comments about See in context
RECOGNISING that effective, usable, secure and trusted digital identity systems can facilitate and simplify access to a wide range of services and thereby contribute tosocial and economic value;
1 comment
Comments about See in context
User refers to a natural person or a legal person, or to a natural person representing a natural or legal person. In cross-border scenarios, a user should be understood as a natural or legal person from another jurisdiction;
1 comment
Comments about See in context
V. 6. Identify the specific needs concerning how to safely accommodate and protect children and vulnerable groups and minorities in the design and use of digital identity systems;
1 comment
Comments about See in context
VIII. 7. b. digital identity solutions and associated attributes and credentials from other countries to be recognised domestically.
8 comments
Comments about See in context
III. 4. Raise awareness of the benefits and secure uses of digital identity, the way in which the digital identity system protects users and mitigates potential harms, and identify opportunities to build the skills and capabilities of users;
1 comment
Comments about See in context
RECOGNISING that while the principles relating to the governance of digital identity for natural and legal persons should be the same, the use cases, user experience, challenges, and mechanisms for implementation will differ;
1 comment
Comments about See in context
CONSIDERING that the governance of digital identity systems can/may be a shared responsibility across branches and levels of government, this Recommendation can/may therefore be relevant to all of them.
1 comment
Comments about See in context
II. 3. Encourage the development of digital identity solutions that are portable for users in terms of:
1 comment
Comments about See in context
Level of Assurance (LoA) refers to the extent to which a service provider can be confident in the claimed identity of a user and is determined by the practices employed by the digital identity solution provider in the issuing of a given digital identity solution;
1 comment
Comments about See in context
II. 2. a. identifying the needs of users and service providers;
2 comments
Comments about See in context
RECOGNISING that stakeholder engagement and consultation is essential to foster public trust in the digital identity system as a whole;
2 comments
Comments about See in context
Digital identity refers to a set of electronically captured and stored attributes and/or credentials that can be used to prove a quality, characteristic, or assertion about a user, and, when required, support the unique identification of that user;
1 comment
Comments about See in context
III. 3. Involve the public and civil society in the development of digital identity systems to ensure that they are open and transparent;
2 comments
Comments about See in context
Attribute refers to a verified quality or characteristic ascribed to a user, for example name, date of birth, place of birth, uniqueness identifier (e.g. personal ID number, social security number, company registration number), and address, in electronic form;
1 comment
Comments about See in context
III. 5. Take steps to ensure that support is provided through appropriate channel(s) for those who face challenges in accessing and using digital identity solutions;
1 comment
Comments about See in context
VII. 2. Co-operate internationally to identify the needs of service providers in other jurisdictions for recognising, integrating and trusting a digital identity solution;
5 comments
Comments about See in context
IV. 2. Secure national strategic leadership and delivery oversight and define and communicate domestic roles and responsibilities within the digital identity ecosystem;
1 comment
Comments about See in context
IV. 6. Establisha national trust framework, or align with relevant regional trust frameworks, to set out common requirements against different Levels of Assurance (LoA) that digital identity solution providers can follow to facilitate trust within the digital identity ecosystem;
1 comment
Comments about See in context
Digital identity ecosystem refers to the different actors involved in the digital identity system, such as policymakers, regulators, government supervisory bodies, digital identity solution providers, credential issuers, service providers, and users. The ecosystem may include different domain-specific solutions and their associated actors;
1 comment
Comments about See in context
RECOGNISING that Members and non-Members having adhered to this Recommendation (hereafter the “Adherents”) have differing approaches to the development and refinement of their digital identity systems with different roles and contributions from the public and private sectors, varying underlying identity management systems(centralised and decentralised)and links with civil registry systems, legacy infrastructure, levels of digital maturity, existing digital identity adoption, trust between actors of the digital identity ecosystem, and public discourse about the role and nature of digital identity;
1 comment
Comments about See in context
VI. 5. Monitor and report on compliance with existing domestic rules and internationally recognised technical standards across the digital identity ecosystem, as appropriate.
2 comments
Comments about See in context
III. 5. Take steps to ensure that support is provided through appropriate channel(s) for those who face challenges in accessing and using digital identity solutions;
1 comment
Comments about See in context
IV. 6. Establish a national trust framework, or align with relevant regional trust frameworks, to set out common requirements against different Levels of Assurance (LoA) that digital identity solution providers can follow to facilitate trust within the digital identity ecosystem;
1 comment
Comments about See in context
IV. 8. Promote a sustainable and resilient digital identity system by taking into account the environmental impact of technology choices, and the need for ongoing investment to reflect the costs for all relevant actors throughout the digital identity lifecycle;
1 comment
Comments about See in context
XIII. 2. Monitor activities and emerging trends around digital identity which may impact the implementation of this Recommendation, through relevant data collection, analysis, and dissemination of results to Adherents;
2 comments
Comments about See in context
VI. 4. Support the creation of mechanisms, such as regulatory sandboxes, to provide a secure and controlled environment in which to explore the risks and opportunities of emerging technologies, and/or updates to digital identity systems that might affect interoperability;
1 comment
Comments about See in context
V. 1. Recognise security as foundational to the design of trusted digital identity systems and ensure that digital identity solution providers comply with all relevant requirements to prevent harmsto users, service providers, and societies;
1 comment
Comments about See in context
VI. 2. Ensure that digital identity solutions are technology and vendor neutral and promote the use of international open standards for interoperability;
1 comment
Comments about See in context
II. 2. c. measuring operational performance in order to iterate the digital identity system and solutions, as appropriate;
3 comments
Comments about See in context
IV. 8. Promote a sustainable and resilient digital identity system by taking into account the environmental impact of technology choices, and the need for ongoing investment to reflect the costs for all relevant actors throughout the digital identity lifecycle;
1 comment
Comments about See in context
III. 4. Raise awareness of the benefits and secure uses of digital identity, the way in which the digital identity system protects users and mitigates potential harms, and identify opportunities to build the skills and capabilities of users;
1 comment
Comments about See in context
VIII. 7. a. domestically recognised digital identity solutions and associated attributes and credentials to be used internationally; and
1 comment
Comments about See in context
V. 2. Treat privacy and data protection as fundamental tenets of digital identity systems, and encourage the adoption of privacy-by-design and privacy-by-default approaches that include informed consent, selective disclosure and collection, as well as purpose and use limitations regarding personal data;
2 comments
Comments about See in context
VIII. 7. Produce a roadmap scoping out steps that would be needed to enable:
4 comments
Comments about See in context
IV. 2. Secure national strategic leadership and delivery oversight and define and communicate domestic roles and responsibilities within the digital identity ecosystem;
1 comment
Comments about See in context
V. 3. Prevent the aggregation of datasets between services or the retention of unnecessary personal data trails being left when users use digital identity solutions to access differentservices;
1 comment
Comments about See in context
VIII. 4. Work towards clarifying the basis for liability related to the use of digital identity in cross-border transactions;
0 comments
Comments about See in context
VI. 2. Ensure that digital identity solutions are technology and vendor neutral and promote the use of international open standards for interoperability;
1 comment
Comments about See in context
V. 2. Treat privacy and data protection as fundamental tenets of digital identity systems, and encourage the adoption of privacy-by-design and privacy-by-default approaches that include informed consent, selective disclosure and collection, as well as purpose and use limitations regarding personal data;
1 comment
Comments about See in context
V. 5. Introduce robust arrangements to ensure that any attributes and credentials shared through a digital identity solutionare accurate, complete, kept up-to-date, and relevant;
1 comment
Comments about See in context
V. 7. Take steps to establish trusted, secure and legally recognised mechanisms by which users can use digital identity solutions to mandate someone, or delegate representation rights, to act on their behalf in a manner that is transparent to, manageable, and traceable by, the user;
1 comment
Comments about See in context
VIII. 3. Ensure that the cross-border interoperability of digital identity is not used to discriminate against foreign users in their access to essential services or commercial transactions;
1 comment
Comments about See in context
VIII. 5. Engage in bilateral and multilateral co-operation in collaboration with relevant stakeholders from across the digital identity ecosystem to advance interoperability of trusted digital identity solutions across borders by exchanging experiences and best practices, agreeing technical standards and aligning innovation programmes;
1 comment
Comments about See in context
VI. 4. Support the creation of mechanisms, such as regulatory sandboxes, to provide a secure and controlled environment in which to explore the risks and opportunities of emerging technologies, and/or updates to digital identity systems that might affect interoperability;
1 comment
Comments about See in context
III. 3. Involve the public and civil society in the development of digital identity systems to ensure that they areopen and transparent;
1 comment
Comments about See in context
VIII. 1. Designate a national point of contact to engage as appropriate and applicable with international counterparts and activities in support of cross-border digital identity;
1 comment
Comments about See in context
V. 8. Design the digital identity system to mitigate the risks to users, service providers and societies associated with dependency on any single hardware or software vendor.
1 comment
Comments about See in context
Attribute refers to a verified quality or characteristic ascribed to a user, for example name, date of birth, place of birth, uniqueness identifier (e.g. personal ID number, social security number, company registration number), and address, in electronic form;
6 comments
Comments about See in context
VI. 2. Ensure that digital identity solutions are technology and vendor neutral and promote the use of international open standards for interoperability;
1 comment
Comments about See in context
RECOGNISING that the governance, design and implementation of digital identity systems should be rooted in democratic values and respect for human rights;
2 comments
Comments about See in context
XIII. 3. Develop the processes, guidance and tools to support the implementation of this Recommendation;
1 comment
Comments about See in context
II. 2. b. considering the end-to-end user experience of the digital identity lifecycle; and
1 comment
Comments about See in context
IV. 3. Encourage co-operation and co-ordination between government agencies and competent authorities at all levels of government, as relevant and applicable;
1 comment
Comments about See in context
VIII. 2. Engage in international regulatory co-operation to enable cross-border interoperability of digital identity systems, such as by assessing the coherence, compatibility or equivalence of existing laws, trust frameworks and technical standards, exploring collaboration through free trade agreements and identifying opportunities for cross-border regulatory experimentation;
2 comments
Comments about See in context
II. 3. c. sector, to allow access to public services as well as the wider economy as appropriate;
1 comment
Comments about See in context
II. 2. c. measuring operational performance in order to iterate the digital identity system and solutions, as appropriate;
1 comment
Comments about See in context
V. 1. Recognise security as foundational to the design of trusted digital identity systems and ensure that digital identity solution providers comply with all relevant requirements to prevent harms to users, service providers, and societies;
1 comment
Comments about See in context
VIII. 6. For cross-border public services, enable, as appropriate, the matching of identity attributes stored in a particular public sector body abroad with the attributes or information shared about the user through the digital identification process, to ensure matching between the identity and digital identity of the user trying to access the service;
1 comment
Comments about See in context
II. 1 Take into account the domestic context, including digital maturity and existing digital identity developments, when considering the design, implementation or iteration of a digital identity system;
1 comment
Comments about See in context
VII. 1. Identify the priority use cases for cross-border interoperability of digital identity systems according to their context and the experience of their users by identifying the activities that require the sharing of attributes and/or credentials in a different jurisdiction;
1 comment
Comments about See in context
VIII. RECOMMENDS that Adherents co-operate internationally to establish the basis for trust in other countries’ digital identity systems and issued digital identities. This this effect, Adherents should:
1 comment
Comments about See in context
II. 1Take into account the domestic context, including digital maturity and existing digital identity developments, when considering the design, implementation or iteration of a digital identity system;
1 comment
Comments about See in context
IV. 9. Oversee the digital identity system to adapt to new needs, threats, risks and opportunities.
1 comment
Comments about See in context
V. 4. Enforce accountability obligations under existing data protection and privacy laws;
1 comment
Comments about See in context
VII. 3. Identify the risks associated with the cross-border interoperability of digital identity systems and associated use cases, and adopt mitigation measures as necessary.
1 comment
Comments about See in context
VI. 1. Ensure that, as appropriate, domestic policies, laws, rules and guidelines for the digital identity system cover issues such as governance, liability, privacy and security, to encourage and facilitate interoperability and portability in terms of location, technology and sector;
2 comments
Comments about See in context
III. 1. Promote accessibility, affordability, and usability across the digital identity lifecycle in order to increase access to a secure and trusted digital identity solution, including by vulnerable groups and minorities in accordance with their needs;
5 comments
Comments about See in context
IV. 4. Take steps to ensure that government agencies and competent authorities at all levels of government, as relevant and applicable, take responsibility for stewarding, monitoring, and protecting the digital identity ecosystem, including by safeguarding the rights of users, and prioritising inclusion;
1 comment
Comments about See in context
VIII. 7. a. domestically recognised digital identity solutions and associated attributes and credentials to be used internationally; and
1 comment
Comments about See in context
design and implement digital identity systems thatrespond to the needs of users and service providers
1 comment
Comments about See in context
III. 6. Monitor, evaluate and publicly report on the effectiveness of the digital identity system, with a focus on inclusiveness and minimising the barriers to the access and use of digital identity.
1 comment
Comments about See in context
IX. CALLS ON all actors in the digital identity ecosystem to implement or, as appropriate according to their role, support and promote the implementation of this Recommendation; X. INVITES the Secretary-General to disseminate this Recommendation. XI. INVITES Adherents to disseminate this Recommendation at all levels of government. XII. INVITES non-Adherents to take account of and adhere to this Recommendation.
1 comment
Comments about See in context
IV. 4. Take steps to ensure that government agencies and competent authorities at all levels of government, as relevant and applicable, take responsibility for stewarding, monitoring, and protecting the digital identity ecosystem, including by safeguarding the rights of users, and prioritising inclusion;
1 comment
Comments about See in context
RECOGNISING the need to ensure the accessibility, affordability, and usability of digital identity solutions for all, including for vulnerable groups and minorities;
1 comment
Comments about See in context
RECOGNISING that Members and non-Members having adhered to this Recommendation (hereafter the “Adherents”) have differing approaches to the development and refinement of their digital identity systems with different roles and contributions from the public and private sectors, varying underlying identity management systems (centralised and decentralised) and links with civil registry systems, legacy infrastructure, levels of digital maturity, existing digital identity adoption, trust between actors of the digital identity ecosystem, and public discourse about the role and nature of digital identity;
1 comment
Comments about See in context
RECOGNISING the rapidly evolving technology landscape, and the need for governments to consider the longer-term implications of introducing new technologies and architectural paradigms into digital identity systems, including with an awareness of any potential unintended risks and consequences;
1 comment
Comments about See in context
II. 2 Use service design methodologies to ensure that digital identity systems respond to the needs of users and achieve accessible, ethical, and equitable outcomes, particularly by:
1 comment
Comments about See in context
RECOGNISING the rapidly evolving technology landscape, and the need for governments to consider the longer-term implications of introducing new technologies and architectural paradigms into digital identity systems, including with an awareness of any potential unintended risks and consequences;
1 comment
Comments about See in context
RECOGNISING that digital identity can transform the way service providers operate and interact with their users, both in-person and online, by providing an optional alternative to physical credentials as part of a seamless omni-channel experience;
2 comments
Comments about See in context
design and implement digital identity systems that respond to the needs of usersand service providers
1 comment
Comments about See in context
design and implement digital identity systems that respond tothe needs of users and service providers
1 comment
Comments about See in context
III. 2. Take steps to ensure that access to essential services, including those in the public and private sector is not restricted or denied to natural persons who, for whatever reason,cannot access or use a digital identity solution;
1 comment
Comments about See in context
III. 1. Promote accessibility, affordability, and usability across the digital identity lifecycle in order to increase access to a secure and trusted digital identity solution, including by vulnerable groups and minorities in accordance with their needs;
0 comments
Comments about See in context
II. 2. a. identifying the needs of users and service providers;
1 comment
Comments about See in context
VIII. 5. Engage in bilateral and multilateral co-operation in collaboration with relevant stakeholders from across the digital identity ecosystem to advance interoperability of trusted digital identity solutions across borders by exchanging experiences and best practices, agreeing technical standards and aligning innovation programmes;
1 comment
Comments about See in context
V. 4. Enforce accountability obligations under existing data protection and privacy laws;
1 comment
Comments about See in context
III. 4. Raise awareness of the benefits and secure uses of digital identity, the way in which the digital identity system protects users and mitigates potential harms, and identify opportunities to build the skills and capabilities of users;
1 comment
Comments about See in context
V. 6. Identify the specific needs concerning how to safely accommodate and protect children and vulnerable groups and minorities in the design and use of digital identity systems;
1 comment
Comments about See in context
RECOGNISING that effective, usable, secure and trusted digital identity systems can facilitate and simplify access to a wide range of services and thereby contribute to social and economic value;
1 comment
Comments about See in context
RECOGNISING that both the public and private sector contribute to the success of digital identity systems, and that their roles and relative contributions in the digital identity ecosystem might be different across countries;
2 comments
Comments about See in context
Digital identity refers to a set of electronically captured and stored attributes and/or credentials that can be used to prove a quality, characteristic, or assertion about a user, and, when required, support the unique identification of that user;
2 comments
Comments about See in context
RECOGNISING that digital identity can transform the way service providers operate and interact with their users, both in-person and online, by providing an optional alternative to physical credentials as part of a seamless omni-channel experience;
2 comments
Comments about See in context
RECOGNISING that the different approaches taken by Adherents create a need for interoperability of secure and trusted digital identity systems across borders, which calls for international collaboration and the development and adoption of common technical standards to ensure that all users are always able to access essential services;
2 comments
Comments about See in context
RECOGNISING the rapidly evolving technology landscape, and the need for governments to consider the longer-term implications of introducing new technologies and architectural paradigms into digital identity systems, including with an awareness of any potential unintended risks and consequences;
2 comments
Comments about See in context
VIII. 7. Produce a roadmap scoping out steps that would be needed to enable: VIII. 7. a. domestically recognised digital identity solutions and associated attributes and credentials to be used internationally; and VIII. 7. b. digital identity solutions and associated attributes and credentials from other countries to be recognised domestically.
1 comment
Comments about See in context
RECOGNISING the value of trust services such as electronic signatures, electronic time-stamps, and electronic seals to support the usability of digital identity solutions;
1 comment
Comments about See in context
IV. 5. Promote collaboration between the public and private sectors and support the development of a healthy market for digital identity solutions, as appropriate, to encourage innovation and explore the potential value of alternative models and technologies;
2 comments
Comments about See in context
XIII. 1. Serve as a forum for exchanging information on the implementation of this Recommendation, fostering multi-stakeholder dialogue on user-centred and inclusive digital identity systems, the governance of digital identity systems, and cross-border use of digital identity for accessing public and private sector services;
1 comment
Comments about See in context
XIII. 4. Report to Council on the implementation, dissemination and continued relevance of this Recommendation no later than five years following its adoption and at least every ten years thereafter.
8 comments