<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Example_Requirements_for_UXC_Review</id>
	<title>Example Requirements for UXC Review - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Example_Requirements_for_UXC_Review"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Example_Requirements_for_UXC_Review&amp;action=history"/>
	<updated>2026-04-16T12:54:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=Example_Requirements_for_UXC_Review&amp;diff=1989&amp;oldid=prev</id>
		<title>Omaerz: 3 revisions imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Example_Requirements_for_UXC_Review&amp;diff=1989&amp;oldid=prev"/>
		<updated>2018-06-28T03:52:23Z</updated>

		<summary type="html">&lt;p&gt;3 revisions imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;=== Example Requirements ===&lt;br /&gt;
==== Compiles for UXC to facilitate development of UXC requirements ====&lt;br /&gt;
-- Developed by Ellen Nadeau&lt;br /&gt;
&lt;br /&gt;
== Interoperability Requirements ==&lt;br /&gt;
*Pulled from original NSTIC derived requirements &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: Organizations shall accept external users authenticated by third parties.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: Organizations shall adopt common business policies and processes (e.g., liability, identity proofing, and vetting) related to the transmission, receipt, and acceptance of data between systems.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Privacy Committee Requirements ===&lt;br /&gt;
*Developed by privacy committee&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: Organizations shall provide concise, meaningful, timely, and easy-to-understand mechanisms to end-users on how they collect, use, disseminate, and maintain personal information.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: When terminating business operations or overall participation in the Identity Ecosystem, organizations shall, while maintaining the security of individuals&amp;#039; information, transfer it upon their request and destroy it unless they request otherwise.&lt;br /&gt;
&lt;br /&gt;
=== Security Committee Requirements ===&lt;br /&gt;
*Developed by security committee&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: User control of the credential and associated token is proven during the authentication process.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Supplemental information/guidance&amp;#039;&amp;#039;&amp;#039;: Successful authentication requires that the user prove, through a secure authentication protocol, that he or she controls the credential and associated token(s).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: The confidentiality and integrity of shared secrets are protected. Shared Secrets are never stored in plaintext.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Supplemental information/guidance&amp;#039;&amp;#039;&amp;#039;:&amp;lt;br&amp;gt;&lt;br /&gt;
The execution of all identity transactions and functions should make use of transport that offers confidentiality and integrity protection such as a secure (encrypted) transport.&amp;lt;br&amp;gt;&lt;br /&gt;
Sensitive data collected during identity transactions should be protected at all times using industry accepted practices for encryption and data protection. &amp;lt;br&amp;gt;&lt;br /&gt;
Where operations and functions are executed by separate organizations, secure transport mechanisms and business processes should be used to preserve the confidentiality and integrity of identity data being transmitted to and stored by service providers.&amp;lt;br&amp;gt;&lt;br /&gt;
Entities should have countermeasures and safe-guards in place to resist common threats to identity solutions and identity data, including (but not limited to):&amp;lt;br&amp;gt;&lt;br /&gt;
* Session hijacking	&amp;lt;br&amp;gt;	&lt;br /&gt;
* Eavesdropping		&amp;lt;br&amp;gt;&lt;br /&gt;
* Theft			&amp;lt;br&amp;gt;&lt;br /&gt;
* Man-in-them-middle	&amp;lt;br&amp;gt;	&lt;br /&gt;
* Online Guessing		&amp;lt;br&amp;gt;&lt;br /&gt;
* Replay  &amp;lt;br&amp;gt;&lt;br /&gt;
* Unauthorized copying or duplication  &amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:User Experience]]&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=Example_Requirements_for_UXC_Review&amp;diff=1987&amp;oldid=prev</id>
		<title>Mary Hodder: syntax fix</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Example_Requirements_for_UXC_Review&amp;diff=1987&amp;oldid=prev"/>
		<updated>2014-10-22T04:13:49Z</updated>

		<summary type="html">&lt;p&gt;syntax fix&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 04:13, 22 October 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Example Requirements ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;=&lt;/ins&gt;== Example Requirements &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;=&lt;/ins&gt;==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==== Compiles for UXC to facilitate development of UXC requirements ====&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==== Compiles for UXC to facilitate development of UXC requirements ====&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;-- Developed by Ellen Nadeau&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;-- Developed by Ellen Nadeau&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Mary Hodder</name></author>
	</entry>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=Example_Requirements_for_UXC_Review&amp;diff=1986&amp;oldid=prev</id>
		<title>Mary Hodder: added doc</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Example_Requirements_for_UXC_Review&amp;diff=1986&amp;oldid=prev"/>
		<updated>2014-10-22T04:13:09Z</updated>

		<summary type="html">&lt;p&gt;added doc&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Example Requirements ==&lt;br /&gt;
==== Compiles for UXC to facilitate development of UXC requirements ====&lt;br /&gt;
-- Developed by Ellen Nadeau&lt;br /&gt;
&lt;br /&gt;
== Interoperability Requirements ==&lt;br /&gt;
*Pulled from original NSTIC derived requirements &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: Organizations shall accept external users authenticated by third parties.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: Organizations shall adopt common business policies and processes (e.g., liability, identity proofing, and vetting) related to the transmission, receipt, and acceptance of data between systems.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Privacy Committee Requirements ===&lt;br /&gt;
*Developed by privacy committee&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: Organizations shall provide concise, meaningful, timely, and easy-to-understand mechanisms to end-users on how they collect, use, disseminate, and maintain personal information.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: When terminating business operations or overall participation in the Identity Ecosystem, organizations shall, while maintaining the security of individuals&amp;#039; information, transfer it upon their request and destroy it unless they request otherwise.&lt;br /&gt;
&lt;br /&gt;
=== Security Committee Requirements ===&lt;br /&gt;
*Developed by security committee&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: User control of the credential and associated token is proven during the authentication process.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Supplemental information/guidance&amp;#039;&amp;#039;&amp;#039;: Successful authentication requires that the user prove, through a secure authentication protocol, that he or she controls the credential and associated token(s).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Requirement&amp;#039;&amp;#039;&amp;#039;: The confidentiality and integrity of shared secrets are protected. Shared Secrets are never stored in plaintext.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Supplemental information/guidance&amp;#039;&amp;#039;&amp;#039;:&amp;lt;br&amp;gt;&lt;br /&gt;
The execution of all identity transactions and functions should make use of transport that offers confidentiality and integrity protection such as a secure (encrypted) transport.&amp;lt;br&amp;gt;&lt;br /&gt;
Sensitive data collected during identity transactions should be protected at all times using industry accepted practices for encryption and data protection. &amp;lt;br&amp;gt;&lt;br /&gt;
Where operations and functions are executed by separate organizations, secure transport mechanisms and business processes should be used to preserve the confidentiality and integrity of identity data being transmitted to and stored by service providers.&amp;lt;br&amp;gt;&lt;br /&gt;
Entities should have countermeasures and safe-guards in place to resist common threats to identity solutions and identity data, including (but not limited to):&amp;lt;br&amp;gt;&lt;br /&gt;
* Session hijacking	&amp;lt;br&amp;gt;	&lt;br /&gt;
* Eavesdropping		&amp;lt;br&amp;gt;&lt;br /&gt;
* Theft			&amp;lt;br&amp;gt;&lt;br /&gt;
* Man-in-them-middle	&amp;lt;br&amp;gt;	&lt;br /&gt;
* Online Guessing		&amp;lt;br&amp;gt;&lt;br /&gt;
* Replay  &amp;lt;br&amp;gt;&lt;br /&gt;
* Unauthorized copying or duplication  &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mary Hodder</name></author>
	</entry>
</feed>