IDEF Anonymity, v1.0

Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement PRIVACY-12: ANONYMITY.

Assessment Steps (3)

1
Appropriate Support for Anonymous and Pseudonymous Transactions (AppropriateSupportforAnonymousandPseudonymousTransactions)
Does the entity utilize identity systems and processes that enable transactions to be anonymous, anonymous with validated attributes, or pseudonymous, where those types of transactions are required by law or otherwise feasible? Indicate "Not Applicable" (N/A) if the entity is prohibited from supporting anonymous or pseudonymous transactions, or if supporting such transactions is infeasible for the entity, by law or otherwise.
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) and supporting notes as appropriate to support the assessor's response to this assessment step.
2
Risk Mitigation Against Third-Party Collection of Personal Information from Transactions (RiskMitigationAgainstThird-PartyCollectionofPersonalInformationfromTransactions)
If the entity employs third-party service providers or intermediaries to execute transactions, does the entity mitigate the risk of those third-parties collecting user personal information from those transactions? Indicate "Not Applicable" (N/A) if the entity does not employ third-party service providers or intermediaries to execute transactions.
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) and supporting notes as appropriate to support the assessor's response to this assessment step.
3
Appropriate Limitations on Credential Requests During Transactions (AppropriateLimitationsonCredentialRequestsDuringTransactions)
Does the entity request individuals' credentials only when necessary for the transaction, and then only as appropriate to the risk associated with the transaction or only as appropriate to the risks to the parties associated with the transaction?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) and supporting notes as appropriate to support the assessor's response to this assessment step.

Conformance Criteria (1)

Anonymity
Wherever feasible, entities MUST utilize identity systems and processes that enable transactions that are anonymous, anonymous with validated attributes, pseudonymous, or where appropriate, uniquely identified. Where applicable to such transactions, entities employing service providers or intermediaries MUST mitigate the risk of those third-parties collecting user personal information. Organizations MUST request individuals' credentials only when necessary for the transaction and then only as appropriate to the risk associated with the transaction or only as appropriate to the risks to the parties associated with the transaction.
Citation
IDEF
Page 20