Description
Being able to prove you are who you say you are underpins access to a variety of essential services across the public and private sector. This can include reviewing your medical records, traveling abroad, running a business, or opening a bank account. Traditional identity verification involves physical proof of one's identity, such as a birth certificate, driver's licence, ID card, or passport, which are typically provided by trusted government sources and recognise important details like one's name, birthdate, and place of birth.
As essential services have moved online, digital channels have emerged to handle identity verification processes and proofs and authentication of verified identity claims. Digital credentials and wallets, eID cards, and mobile ID applications provided by either public or private entities have all contributed to the evolution of the digital identity landscape. Despite these advancements, in many countries there remains often a lack of cross-sector collaboration, interoperability and poor-quality user experience. As more and more essential services are accessed online and across borders, improving the governance and implementation of digital identity systems in line with user needs becomes important.
The OECD’s Public Governance Committee and its Working Party of Senior Digital Government Officials (E-Leaders) have developed a draft Recommendation on the Governance of Digital Identity that encourages its Adherents to develop and govern digital identity systems as digital public infrastructure. This involves creating and aligning sound and future-proof policies and regulations for solution providers, as well as promoting cross-sector coordination, international collaboration, and a healthy market for identity solutions. The development of digital identity systems should be rooted in the needs of users and service providers, respecting democratic values and human rights, including by ensuring the inclusion of vulnerable groups and minorities, and the protection of privacy.
The draft Recommendation on the Governance of Digital Identity aims to support Adherents’ efforts to ensure reliable and trusted access to digital identity for natural and legal persons that is portable across locations, technologies and sectors.
The draft Recommendation presents a set of principles organised around three pillars:
The consultation is open to government officials, civil society organisations, international organisations and interested citizens and stakeholders.
If approved by the OECD Council, the Recommendation will form the basis for the OECD to serve as a forum for exchanging information, guidance, and monitoring activities and emerging trends around the governance of digital identity.
An OECD Recommendation is a legal instrument adopted by the OECD Council. Recommendations are not legally binding but represent a political commitment to the principles they contain and an expectation that Adherents will do their best to implement them. There are currently around 180 OECD Recommendations in force. For more information, please consult the online Compendium of OECD Legal Instruments.
The aim of the public consultation is to ensure that the final text reflects the experience, needs and aspirations of the international community concerning the governance of digital identity.
Inputs collected during the public consultation will help inform the finalisation of the draft Recommendation. They will be analysed by the OECD Secretariat and a revised version will be discussed by the relevant OECD bodies. Ultimately, the Recommendation will require the approval of the Public Governance Committee after which it would be presented to the OECD Council for adoption.
Parties interested in commenting on the draft Recommendation can send written comments in English or French to eleaders@oecd.org or comment directly through the Engagement Platform no later than 31st March 2023.
Comments submitted on behalf of another person or group of persons should identify all enterprises or individuals who are members of the collective group, or the person(s) on whose behalf the commentator(s) is/are acting.
Inputs received by email will be analysed and the OECD may publish them, but only in an aggregated and anonymous manner. All comments posted via the Engagement Platform will be subject to moderation but should be expected to be made public.
Any personal data provided as part of this consultation is protected consistent with the OECD Data Protection Rules. If you have further queries or complaints related to the processing of your personal data, please contact the OECD Data Protection Officer. If you need further assistance in resolving claims related to personal data protection you can contact the OECD Data Protection Commissioner.
For further information please contact eleaders@oecd.org
" is not restricted or denied to......", is just not strong enough. There needs to be reference to alternate non-digital channels, and also most importantly, the use of proxies (Power of Attorney), especially in countries with low literacy rates. Without specific reference, and as an after-thought only, technical crypto issues may be very complex to solve.
Perform at least three impact assessments:
- risk impact assessment
- data privacy impact assessment
- human right impact assessment
- background:
risk assessment is typical for security
DPIA is required under GDPR but should be a common assessment done (in order also to get the legal framework in place, or test it being in place, to protect residents/citizens privacy). Case of Kenya 2021, high court ruling stating the rollout of a country-wide biometric ID scheme was illegal.
human right assessment is related to the outcome of digital identity solutions and addresses the risk for exclusion, amplification of existing inequalities.
https://www.bbc.com/news/world-africa-51324954
^ One problem of using local Registries ( by country, is that internally, at least in my, these systems are not compliant with a lot of basic requirements.
Examples:
A) Equifax Data. My Data in Equifax is partially true, outdated, and reflects I never know when the data is being read or updated. It uses asimilar model to that of SWIFT. It aggregates data from Financial Institutions and monetizes that data, without the user consent
B) SICAC ( our national KYC DB ). Currently, the data is being gathered by all participants, by email, and then being centralized from each bank to the central back DB. The process for onboarding is usually to print a PDF and sign it, then scan it, and send it back along with scanned IDs and proof of address. The UX of this process is a major friction point. It is not properly digitalized.
C) A user with a Data Agent credential, can access anyones data
C .. anyones data, without a record of access or proper ACL levels. They access the RAW data and can share it and they do sell this data to other private companies and criminal organizations. The recommendation for this should be to use ACL based data access and a Zero-Trust approach to data challenging and verification, rather than simply storing raw data and having humans performing data checks by accessing the raw data.
e.g. The ideal solution is something like https://www.skyflow.com/ ( the best solution in my opinion ) -- You can see examples and use cases of the Zero-Trust approach.