Edentiti uses an approach to the supply of information from individuals to organisations that
- reduces the cost and effort required by both organisations and individuals to supply information
- reduces the risk associated with the leakage of information so protecting privacy
- reduces the chances of identity and data theft
- reduces the chances of inappropriate or incorrect information being used by organisations
Organisations collect information about people for contact, legal, and operational reasons. Often there is a considerable amount of information to be collected and organisations who expect to have an ongoing relationship with a person try to collect this information once and once only. Once a relationship is established the organisation generates information about the person in the form of a record of transactions with the person and they supply that information back to the person. In ongoing dealings with the person they check to see if the information they hold is correct. Typically they identify people with a number or code. The organisation takes on the responsibility of collecting, storing and verifying information about a person needed for their own purposes. They do this because traditionally this has been the best way to handle the problem.
Unfortunately there are many problems associated with this approach. Organisations take on a major burden in protecting, verifying and keeping information up to date. From the point of view of the person they have to do the same or similar things for every organisation they deal with and this can run into the hundreds if not thousands over a lifetime. Secondly they are unsure if the information held on them by the organisations is correct and finally they do not know what information is held on them.
Edentiti solves all these problems by changing the way information is stored and more importantly changing the way information is supplied to organisations. These changes result in lower costs to organisations, better information to organisations, less effort for individuals, greater security of data and in better protection of privacy.
It works in the following way:
When an individual wants to deal with an organisation the individual has a way of giving the organisation the information required in an electronic form – or of giving the organisation the right to access the latest information about the person when it is required. A typical example is when an organisation wants to know how to contact a person. Rather than the organisation looking up its own database of information it has permission to ask the individual electronically for their latest contact details. This can be done because through the Edentiti system each organisation establishes a relationship with the individual electronically and at the time of establishing the relationship the individual agrees to supply the organisation with certain information when it is required. In return the organisation promises to give the individual access to any information it stores on the individual.
The electronic system for the individual has certain characterisitics. Information about the individual can be changed but only if approved by the individual. Information once it is independently verified or if it is supplied by others cannot be changed without the permission of the other party. Information cannot be accessed without the permission of the individual.
What this means is that there is one authorative copy of information about a person but that this information is kept in different places. This is typically where the information was first generated. It means that there is no one number or identifier for a person because each time a relationship is established with an organisation a different identifier is used because it is a different agreement.
Using this approach organisations only have to worry about information they generate. They no longer need to keep other information about a person because they can request it whenever they need it. Similarly a person only has to keep information about themselves for which they are responsible – like their name and contact details. When they need information about themselves that is kept by an organisation they request the latest information. Data is protected and costs are reduced because there is one authorative information and this information can be distributed across many physical databases.