US flag signifying that this is a United States Federal Government website   Official website of the Department of Homeland Security

U.S. Flag and Keyboard

National Strategy for Trusted Identities in Cyberspace

Many of us do it without even blinking an eye. Internet services have become such as part of our daily lives that logging on to a network to complete work, check your bank account, shop for a new book or post a blog is second nature-- and what you’re providing in order to complete these tasks goes unnoticed. We have become accustomed to being asked for our personal information. Only in the last few years have major concerns over what is being provided online drawn national attention. Identity theft and cybercrime are on the rise around the world, so individuals need to pay particular attention to what information they are providing about themselves and with whom it is being shared online. This is no longer just a matter of personal privacy, but a matter of economic stability and national security.

On June 25th, the White House released a draft National Strategy for Trusted Identities in Cyberspace (NSTIC) that speaks to this very issue. NSTIC proposes an improved online environment where all users have a choice in the personal information they share to perform online transactions. Due to the widespread impact of a national strategy to improve technologies, processes, and even services offered online, NSTIC is available for public comment until July 19th on http://www.nstic.ideascale.com/. This Strategy builds on the recommendations resulting from the Cyberspace Policy Review that was signed by the President in May 2009.

The vision described in this Strategy outlines potential changes to America’s online infrastructure in order to trust identities during online transactions. Details for this vision include guiding principles, goals and potential actions needed to accomplish this change. By creating a consistent way to establish, use and validate identities, individuals, governments and private organizations can interact in a more secure and efficient manner. This is not solely a change for the Federal government; it will take collaboration across public and private sectors, among individuals and groups. We are looking for your input. Please visit http://www.nstic.ideascale.com/ to participate in the discussion.
Published by the U.S. Department of Homeland Security, Washington, D.C.
Categories: 
Back to Top