White House

President Obama Releases the National Strategy for Trusted Identities in Cyberspace

Today, President Obama released the National Strategy for Trusted Identities in Cyberspace (NSTIC) (PDF).This Strategy seeks to improve security in cyberspace and e-commerce. We can see how this plays out in at least two areas. First, passwords alone are not secure enough, which contributes to online fraud and identity theft. It is also inconvenient to have to remember dozens of passwords to access different online services. Second, it is difficult for individuals to prove their true identity when they want to perform a sensitive transaction online, like banking or accessing health records.  These problems are limiting the full economic potential of the Internet, because certain services cannot easily be moved online.  NSTIC envisions a private sector led effort to create a new infrastructure for the Internet, built on interoperable, privacy-enhancing, and secure identity credentials.  This new infrastructure is centered around choice. First, you don't have to use it at all. If you do, you can choose when or how to use it.

For example, you might get a "digital credential" bundled with your cell phone plan that resides as an application on your smart phone. It would remain inactive when you are just browsing the web. But with a single, short PIN or password, you could use your credential on the phone to do a range of transactions from logging in to your favorite online game as “anon01” where you do not want to reveal your real name to accessing your tax information where you do. To see an animated example of this system, visit the NSTIC program office's home page.

But not everybody wants a smart phone. Under this strategy, you will be able to choose from many different identity providers: perhaps your bank, your health care provider, your email provider, or any other preferred organization. We seek to create an ecosystem of many different providers, so that there is an option that suits every individual who wants to participate. Individuals can also choose between different credentials, or ways of logging in: cell phones, keychain “fobs,” smart cards, and many others – in fact, there will undoubtedly be ways that have not yet even been invented.

read more

Fonte: White House

Como citar e referenciar este artigo:
NOTÍCIAS,. President Obama Releases the National Strategy for Trusted Identities in Cyberspace. Florianópolis: Portal Jurídico Investidura, 2011. Disponível em: https://investidura.com.br/noticias-internacionais/white-house/president-obama-releases-the-national-strategy-for-trusted-identities-in-cyberspace/ Acesso em: 26 fev. 2026