A-Z Popular Blog Encyclopedia Search »
Privacy
 Advertisements
Related Guides

9 Types of Digital Identity

 , updated on
A digital identity is a number, code, record, object or collection of attributes that are used by information technologies to identify entities such as people, organizations, users and customers. The following are common types of identity.

Government

Government identification of people and organizations such as a birth certificate or corporate registration. Government identification is required to access services such as banking that are carefully tracked by governments for purposes such as compliance and taxation.

Organizational

Identification issued by organizations such as a school id or corporate id.

Customer

Identification of customers such as a bank card or a phone number.

User

A registration process that creates an account for a user. In some cases, users may use a pseudonym, nickname or pen name that allows some degree of anonymity.

Transactional

An temporary identity that is established for a single transaction.

Anonymous

An identity that is established specifically to allow a user to remain anonymous.

Networking

Network addresses such as an IP address.

Machine

Machine identifiers such as a serial number.

Attributes

A collection of attributes that together identify an entity. For example, marketing technologies may attempt to identify customers based on attributes such as IP address and phone number.
Overview: Digital Identity
Type
Definition
A number, code, record, object or collection of attributes that are used by information technologies to identify entities such as people, organizations, users, customers, contributors, actors, equipment, machines and software entities.
Related Concepts

Privacy

This is the complete list of articles we have written about privacy.
Big Brother
Creeping Normality
Cryptography
Cultural Lag
Data Liberation
Data Risks
Data Subject
Default Effect
Information Security
Media Literacy
Offline Software
Panopticon
Personal Data
Personal Information
Privacy By Design
Pseudonymity
Self-Censorship
Smart Cities
Social Data
Technology Ethics
Try our search:


If you enjoyed this page, please consider bookmarking Simplicable.
 

Privacy By Design

An overview of privacy by design.

Expectation Of Privacy

The definition of expectation of privacy.

Personally Identifiable Information

An overview of personally identifiable information.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Risks

A definition of data risk with examples.

Personal Information

A definition of personal information with examples.

Data Subject

A definition of data subject with examples.

Machine Readable

The definition of machine readable with examples.

Delete

The definition of delete with examples.

Privacy Examples

The definition of privacy with examples.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map