A-Z Popular Blog Encyclopedia Search »
Related Guides

9 Types of Digital Identity

 , updated on
A digital identity is a number, code, record, object or collection of attributes that are used by information technologies to identify entities such as people, organizations, users and customers. The following are common types of identity.


Government identification of people and organizations such as a birth certificate or corporate registration. Government identification is required to access services such as banking that are carefully tracked by governments for purposes such as compliance and taxation.


Identification issued by organizations such as a school id or corporate id.


Identification of customers such as a bank card or a phone number.


A registration process that creates an account for a user. In some cases, users may use a pseudonym, nickname or pen name that allows some degree of anonymity.


An temporary identity that is established for a single transaction.


An identity that is established specifically to allow a user to remain anonymous.


Network addresses such as an IP address.


Machine identifiers such as a serial number.


A collection of attributes that together identify an entity. For example, marketing technologies may attempt to identify customers based on attributes such as IP address and phone number.
Overview: Digital Identity
A number, code, record, object or collection of attributes that are used by information technologies to identify entities such as people, organizations, users, customers, contributors, actors, equipment, machines and software entities.
Related Concepts


This is the complete list of articles we have written about privacy.
Big Brother
Creeping Normality
Cultural Lag
Data Liberation
Data Risks
Data Subject
Default Effect
Information Security
Media Literacy
Offline Software
Personal Data
Personal Information
Privacy By Design
Smart Cities
Social Data
Technology Ethics
Try our search:

If you enjoyed this page, please consider bookmarking Simplicable.

Privacy By Design

An overview of privacy by design.

Expectation Of Privacy

The definition of expectation of privacy.

Personally Identifiable Information

An overview of personally identifiable information.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Risks

A definition of data risk with examples.

Personal Information

A definition of personal information with examples.

Data Subject

A definition of data subject with examples.

Machine Readable

The definition of machine readable with examples.


The definition of delete with examples.

Privacy Examples

The definition of privacy with examples.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.


A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map