Identity and Access Management (IAM) has two seemingly opposed purposes: to enable user access to information, and to block user access to restricted information. In fact, strong security and user-friendly access are by no means mutually exclusive: a mature IAM solution provides both. Read a summary of my IAM Maturity Model.
Related Post
Data for Democracy Project
Monitoring Elections Data for Democracy Project Directed by Dr. Waël Hassan, the Data for Democracy Project aims to identify and recommend strategies, tools, and technology...
Big Data’s Big Privacy Leak – Metadata and Data Lakes, Part 3
Bringing Privacy Regulation into an AI World, Part 3: Big Data’s Big Privacy Leak: Metadata and Data Lakes This seven-part series explores, from a Canadian...
Moving from Access Control to Use Control
in an AI world you can’t talk about Access control but Use Control Rather
Is AI Compatible with Privacy Principles?
Bringing Privacy Regulation into an AI World, Part 2 This seven-part series explores, from a Canadian perspective, options for effective privacy regulation in an AI...
A 3D Test for Evaluating COVID Alert: Canada’s Official Coronavirus App
Great news – Canada has just released its free COVID-19 exposure notification app [1], COVID Alert. Several questions now arise: Is it private and secure?...
Outbreak Notification App Design
From Contact Tracing to Outbreak Notification Call for Participation This post is a call for participation for design thinkers - please email or tweet @drwhassan....