Consent 2.0: Applying User-Managed Access to the Privacy Challenge

12
CONSENT 2.0 APPLYING USER-MANAGED ACCESS TO THE PRIVACY CHALLENGE Eve Maler (@xmlgrrl)

Transcript of Consent 2.0: Applying User-Managed Access to the Privacy Challenge

Page 1: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

CONSENT 2.0APPLYING USER-MANAGED ACCESS TO THE

PRIVACY CHALLENGE

Eve Maler (@xmlgrrl)

Page 2: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

The personal data gathering dark ages

Web 1.0 Web 2.0

Copyright © Identity Summit 2015, all rights reserved.

Page 3: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

Privacy goals vs. reality

aspirationrisk mitigation

cynicism

Copyright © Identity Summit 2015, all rights reserved.

Page 4: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

From the webto the IoT,

the “fear/greed” tension around data sharing is only going to

grow

Copyright © Identity Summit 2015, all rights reserved.

Page 5: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

“Post-compliance” consent toolsonly take us so far

OAuth: standard and scoped…but opt-in, app-to-app, and point-to-point

“Share”: proactive and party-to-party…but proprietary, point-to-point, and often insecure

Copyright © Identity Summit 2015, all rights reserved.

Page 6: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

Customers with identities in the digital worldneed Consent 2.0 solutions

Context The right moment to make the decision to share

Control The ability to share just the right amount

Choice The true ability to say no and to change one’s mind

Respect Regard for one’s wishes and preferences

Copyright © Identity Summit 2015, all rights reserved.

Page 7: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

Copyright © Identity Summit 2015, all rights reserved.

Page 8: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

Businesses and governments need the UMA standard to deliver Consent 2.0 successfully

Copyright © Identity Summit 2015, all rights reserved.

Page 9: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

ForgeRock’s OpenUMA solutions

will help you meet

the new privacy challenge

Copyright © Identity Summit 2015, all rights reserved.

Page 10: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

ForgeRock is delivering two key

OpenUMAcomponents by the

end of 2015

authorization server

resource server

(client)

UMA Providerbased on

UMA Protectorbased on

Copyright © Identity Summit 2015, all rights reserved.

Page 11: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

ForgeRock helps you deliver Consent 2.0 experiences to your

customers that demonstrate context, control, choice, and respect

Copyright © Identity Summit 2015, all rights reserved.

Page 12: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

THANKS!

Eve Maler (@xmlgrrl)