IDG News Service - The White House is seeking comment on a draft plan for establishing a trusted identity system online, with the goal of making Internet transactions more secure and convenient.
Howard Schmidt, the White House cybersecurity coordinator and special assistant to President Barack Obama, released a draft version of the National Strategy for Trusted Identities in Cyberspace on Friday.
The plan calls for the federal government to work with private companies to create an Identity Ecosystem, an online environment "where individuals, organizations, services, and devices can trust each other because authoritative sources establish and authenticate their digital identities."
The Identity Ecosystem would allow Internet users to complete transactions with confidence, Schmidt said in a blog post on WhiteHouse.gov.
"No longer should individuals have to remember an ever-expanding and potentially insecure list of usernames and passwords to login into various online services," he wrote. "Through the strategy we seek to enable a future where individuals can voluntarily choose to obtain a secure, interoperable, and privacy-enhancing credential ... from a variety of service providers -- both public and private -- to authenticate themselves online for different types of transactions."
The White House is seeking comments on the draft plan on a Web page at ideascale.com. A handful of people had already commented on the plan by Friday afternoon.
One person suggested the White House take advantage of existing open-source trusted ID efforts, including OpenID.
Schmidt's office developed the draft of the trusted ID plan by working with other government agencies, business leaders and privacy advocates, he said. A second poster called on the government to "leave privacy to the private sector."
"The current executive has been smothering the privacy and liberty of Americans even more than his predecessor, and evading criticism by employing secrecy and rainbows," that poster wrote. "Americans should not trust the federal government to have any goal other than the expansion of federal power."
A third poster suggested that "you all go get a real job at McDonalds."
The trusted ID plan is part of the Obama administrations Cyberspace Policy Review, released in May 2009.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantusG. Grant's e-mail address is firstname.lastname@example.org.
- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
- A walking tour: 33 questions to ask about your company's security
- 15 social media scams
- The 7 elements of a successful security awareness program
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Case Study: Hospital Turns to Email Archiving Solution to Ensure Regulatory Compliances
- Read this case study to learn how a cloud-based email archiving solution enabled the hospital to meet government mandates and helps avoid thousands...
- Case Study: In-the-Cloud Email Service Replaces Three Point Products
- Read this case study for more information on a comprehensive in-the-cloud email service to help replace three point products.
- Case Study: Simplifying the Transition to Exchange 2010 with Email Management Solutions
- Read this case study to learn how a cloud-based email management solution greatly simplified the company's transition to Exchange 2010.
- What does it take to deliver Security, Privacy and Trust at Mimecast?
- This whitepaper explains the process and controls that Mimecast put in place to deliver a secure, private and trusted SaaS platform for your... All Government IT White Papers
- 3 Reasons Why Sepaton is the World's Fastest Backup Solution
- Leading analyst, Storage Switzerland learns how Sepaton backs up and deduplicates massive data volumes while maintaining the industry's fastest performance - all in...
- Enterprise File Sharing: All You Need to Know
- Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with...
- Bridging HTTP and FTP with FileXpress Internet Server
- What if you could take an FTP server on your internal network, and allow external users (partners or customers) to securely access it...
- MFT and FileXpress - An Overview
- Business users and applications exchange files on a regular basis. File transfer is a core part of the flow of business activity.
- Content Analytics: Big Data Conquered, Customer Service Elevated
- For organizations looking to start a content analytics program or improve their existing capabilities, Aberdeen Group and IBM will lay out several recommendations... All Government IT Webcasts