Archive for February, 2013

Home  »  2013  »  February

Q. Why does PDEC care about NSTIC?

Feb 11, 2013 No Comments ›› Phil Wolff

Q. You're the executive director of the Personal Data Ecosystem Consortium. Why does PDEC care about NSTIC?  I am focused on making a personal data ecosystem (PDE) real. And a rich, strong, diverse identity ecosystem lowers common barriers our PDE participants confront.  The big vision of an Identity Ecosystem articulated in NSTIC goes well beyond identity credentials for verified ...

Continue Reading

Q. What is a “Regulate Forward” strategy?

Feb 10, 2013 No Comments ›› Phil Wolff

NSTIC is a Regulate Forward strategy The US government is keen for markets to solve Internet information sharing, privacy and trust challenges. Theirs is a “Regulate Forward” approach. NSTIC strives to establish policy for where technology will be instead of regulating for where it’s been: past societal conditions, rapidly obsolescing technologies, and old industry models. “A good ...

Continue Reading

Q. Lawyers like the term “trust framework.” Is there a better framing?

Feb 10, 2013 No Comments ›› Phil Wolff

Q. Lawyers like the term “trust framework.” Is there a better framing?  I prefer “accountability framework.” Here’s why.  Trust is a meta-goal for the overall system and transactions within it. I think naming the techno-legal policy sandwiches “trust frameworks” is a mistake.   These frameworks, which are the Identity Ecosystem’s default, connect the Identity Ecosystem’s participants through technology, ...

Continue Reading

Q. What does the NSTIC program look like now?

Feb 9, 2013 No Comments ›› Phil Wolff

Q. What does the NSTIC program look like now?  There are six parts.  NSTIC National Program Office. The NSITIC NPO operates within the Department of Commerce’s National Institute of Standards. It is lead by Jeremy Grant. The office has several full time staff and they are responsible for the transition of NSTIC from a US government initiative to ...

Continue Reading

Q. What triggered the whole NSTIC thing?

Feb 8, 2013 No Comments ›› Phil Wolff

Q. What triggered the whole NSTIC thing?  When the Obama administration came into office in 2008, it started a cyber security review. Password re-use was identified as a real threat. Simply put, the fact that people use the same password for multiple sites where they also use the same user-name, likely their e-mail address, is a ...

Continue Reading
This is Kaliya's candidate statement video. Kaliya is running to be the delegate for Small Businesses and Entrepreneurs to the NSTIC Identity Ecosystem Steering Group's leadership. Kaliya explains the role, why it's important, what she hopes to accomplish, and why she deserves your vote in 2 minutes and 20 seconds. More on http://KaliyaForMayor.org.

Candidate Video Statement

Feb 6, 2013 No Comments ›› kaliya

Kaliya is running to be the delegate for Small Businesses and Entrepreneurs to the NSTIC Identity Ecosystem Steering Group's leadership. Kaliya explains the role, why it's important, what she hopes to accomplish, and why she deserves your vote in 2 minutes and 20 seconds. On YouTube.

Continue Reading