Access Security Principle 3
Empower your users to exercise their right to privacy
Quid pro quo. People who want to get access to protected resources, first need to provide information about themselves. But they want to be sure that their personal information will not be misused.
This third video in our access security principles series explains how you can improve trustworthy use of identity and personal data.
Main Takeaways
- How to process someone’s data based on their consent. What are you asking them to agree to?
- Learn about the Consent Receipt Specification of the Kantara Initiative
- Ecosystem sharing covers 3 dimensions of consent: user-to-organization, user-to-user, user-to-application