-
A simple way for websites to describe in clear, consistent terms what they do with the data we share.
Join the announcement list for up-to-date info. Recent Comments
- Ten Years Later on VRM: The user as point of integration
- Speaking of Identity – People-Centered Internet on Speaking of Identity
- In Context » Apps and Personal Data Stores on VRM and Personal Data Stores
- In Context » 2010 » March on VRM and Personal Data Stores
- In Context » Azigo on VRM and Personal Data Stores
Meta
Tag Archives: OpenID
User Driven Services: 9. Self-managed Identity
9. Self-managed Identity User Driven Services let users manage their own online identity. Unless we control our identity online, we risk unnecessary exposure to identity theft and unwanted correlation of online activity. At the same time, online services increase the … Continue reading
Posted in Identity, User Driven, User Driven Services
Tagged Identity, information cards, OpenID, User Driven, User Driven Services
1 Comment
The Identity Quartet
A functional model for best practice Identity implementations. The Identity Quartet is a framework for online services that allows users to express their Identity on their own terms. When I use the term “Identity”, I refer to the set of … Continue reading
Intro video to OpenID
Here’s a nice, clear introduction to OpenID that Phil Windley blogged recently. If you are curious about all this user-centric identity stuff or have taken on the role of explaining OpenID to others, I highly recommend it.
Posted in Identity
Tagged OpenID, Phil Windley, User-centric Identity
Comments Off on Intro video to OpenID
The hard stuff – VRM Use Cases
Last week was the Internet Identity Workshop in Mountain View, California, which is, without reservation, the most productive technical gathering I know of. An “unconference,” (facilitated by the incomparable Kaliya Hamlin) it dumps the talking heads for interactive discussions so … Continue reading
Posted in ProjectVRM, Vendor Relationship Management
Tagged Identity, IIW, IIW2007b, OpenID, Use Case, User-centric Identity, VRM
2 Comments