Consent Enforcement

Empower your users to exercise their right to privacy

Quid pro quo. People who want to get access to protected resources, first need to provide information about themselves. But they want to be sure that their personal information will not be misused.

This third video in our access security principles series explains how you can improve trustworthy use of identity and personal data.

Individuals need to give consent to others to access and use their personal data for the purposes of authentication, authorization and a bettter user experience. You’ll learn how you can give people agency over their personal data through consent enforcement.

Consent enforcement

Request access to this video


Any personal data you provide is collected and processed by Scaled Access, as a controller, in order to service your submission.
Read more in our Privacy Policy.

Main takeaways

  • How to process someone’s data based on their consent. What are you asking them to agree to?
  • Learn about the Consent Receipt Specification of the Kantara Initiative
  • Ecosystem sharing covers 3 dimensions of consent: user-to-organization, user-to-user, user-to-application

We use cookies to enhance your experience. Find out more. By continuing to visit this site you agree to our use of cookies. X