Combined Definitions

From IDESG Wiki
Jump to navigation Jump to search


Defined Terms

The material below is a set of defined terms, gathered from the IDEF APPENDIX A-Defined Terms, the IDESG Glossary, the User Experience Committee's UXC Use Case Mapping and the Requirements descriptions developed by various IDESG committees. Some user experience and other terms were sources from the NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE published by the White House in April 2011 and the foundation document for the IDESG.

These definitions are the set referenced in past glossaries and definitions. In this document, they are informative but not normative, and are considered to be a part of the Supplemental Guidance to the current Baseline Functional Requirements. Some meanings may vary from Requirement to Requirement based on context.


ANONYMOUS

Anonymous Interaction: An interaction designed such that the data collected is not sufficient to infer the identity of the USER involved nor is such data sufficient to permit an entity to associate multiple interactions with a USER or to determine patterns of behavior with a USER.

DIGITAL IDENTITY MANAGEMENT FUNCTIONS

DIGITAL IDENTITY MANAGEMENT FUNCTIONS: includes each of the functions described in the IDESG Functional Model (registration, credentialing, authentication, authorization, and intermediation), which also encompass enrollment, identity proofing, identity vetting, access control, attribute management, transaction processing, and identity data maintenance.

ENTITY

Entity: Any organization providing or using identity services.

IDENTIFIERS

Identifier: numbers or other non-attribute designations designed to specify individuals or sets of individuals in a system.

NONPROPRIETARY PUBLISHED FORMAT/SPECIFICATION

NONPROPRIETARY PUBLISHED FORMAT/SPECIFICATION: a known and consistent format that is published and transparent to all RELYING-PARTIES and IDENTITY-PROVIDERS in the relevant network, and is not controlled by a commercial interest.

PERSONAL INFORMATION

Personal Information: broadly means any information about or linked to a USER that is collected, used, transmitted, or stored in or by digital identity management functions.

PSEUDONYMOUS

Pseudonymous Interaction: An interaction designed such that the data collected is not sufficient to allow the entity to infer the USER involved but which does permit an entity to associate multiple interactions with the USER’s claimed identity.

REDRESS

Redress: When (a) an entity offers an opportunity for a party who is transacting with it to complain or ask for adjustment, if the transaction is unsatisfactory to that other party; and (b) the entity responds clearly to each request of that kind; and (c) if the request relates to the entity's failure to comply with the IDESG Baseline Requirements, the entity cures the failure to comply, or provides a remedy for the failure.

USER

User:

  1. In USABILITY statements, refers to an individual human being. This does not include machines, algorithms, or other non-human agents or actors. Equivalents and related terms may include: user-centric, user-centered, human-centered, end user, individual user, user-friendly.
  2. In SECURITY statements, may refer either to an individual natural person, or to an entity such as a company or agency: Various security requirements may confer opportunities, rights or remedies on a party or account which is served by a cybersecurity function, whether that account relates to a single human or to an organization.

USER-CENTRIC

User-Centric: Systems, design and/or program processes that put the individual human being at the center of the activity. Equivalents and related terms may include: user, user-centered, human-centered, end user, individual user, user-friendly.



Quick Links: SALS | Baseline Functional Requirements v1.0 |