U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. About Us
  3. Site Links
  4. Archived
  5. News Archive
  6. National Strategy for Trusted Identities in Cyberspace

Archived Content

In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.

National Strategy for Trusted Identities in Cyberspace

Many of us do it without even blinking an eye. Internet services have become such as part of our daily lives that logging on to a network to complete work, check your bank account, shop for a new book or post a blog is second nature-- and what you’re providing in order to complete these tasks goes unnoticed. We have become accustomed to being asked for our personal information. Only in the last few years have major concerns over what is being provided online drawn national attention. Identity theft and cybercrime are on the rise around the world, so individuals need to pay particular attention to what information they are providing about themselves and with whom it is being shared online. This is no longer just a matter of personal privacy, but a matter of economic stability and national security.

On June 25th, the White House released a draft National Strategy for Trusted Identities in Cyberspace (NSTIC) that speaks to this very issue. NSTIC proposes an improved online environment where all users have a choice in the personal information they share to perform online transactions. This Strategy builds on the recommendations resulting from the Cyberspace Policy Review that was signed by the President in May 2009.

The vision described in this Strategy outlines potential changes to America’s online infrastructure in order to trust identities during online transactions. Details for this vision include guiding principles, goals and potential actions needed to accomplish this change. By creating a consistent way to establish, use and validate identities, individuals, governments and private organizations can interact in a more secure and efficient manner. This is not solely a change for the Federal government; it will take collaboration across public and private sectors, among individuals and groups. We are looking for your input.

Last Updated: 09/21/2018
Was this page helpful?
This page was not helpful because the content