- • Credentials derived from personal data are often used as the
primary proof of identity.
- • Identity information is used to automate consent.
- • Theft of identity information becomes theft of identity and consent.
- • This ties to many, many issues. Competitive advantage, safety, privacy, ...