Home / Blogs

What Legal Framework for Online Identity?

Have you ever thought of how reputation is created in cyberspace? Beth Noveck wrote an article, Trademark Law and the Social Construction of Trust: Creating the Legal Framework for On-Line Identity, (available on SSRN), in which she argues that, to determine what rules should govern on-line identity, we should look to trademark law, which has the best set of rules to deal with the way reputation is created in cyberspace.

The following is the abstract from Beth Noveck’s paper:

Trust is the foundation of society for without trust, we cannot cooperate. Trust, in turn, depends upon secure, reliable and persistent identity. Cyberspace is thought to challenge our ability to build trust because the medium undermines the connection between online pseudonym and offline identity. We have no assurances of who stands behind an on-line persona or avatar; it may be one person, it may be more, it may be a computer. The legal debate to date has focused exclusively on the question of how to maintain real world identity in cyberspace. But new social software technology that enables communities from EBay to Amazon collectively to rate their members is giving rise to meaningful identity in an online context. To determine what rules should govern on-line identity and the use of such reputational data, we should look not to constitutional, copyright or tort law, but to trademark, the area of doctrine most closely analogous. Trademarks are the collaborative creation of the source of the mark and the buying public, which associates the mark with that source. The public’s interest in the mark circumscribes the property rights of the individual holder. By applying trademark theory to on-line identity we can create a better set of rules to deal with the way reputation is created in cyberspace. One key consequence of this approach is the conclusion that in order to produce reliable and persistent on-line identity, past reputational data should be preserved and widely shared.

Reposted from the author’s blog

By Cedric Manara, Law Professor

Filed Under

Comments

Matthew Elvey  –  Nov 10, 2005 9:22 PM

I’ve spent a lot of time thinking about online identity.  David Chaum has written extensively, (and brilliantly) describing ways to provide irrefutable evidence of, e.g. citizenship or the right to drive, while preserving anonymity. 
In my anti-spam work, authentication and reputation of identity is critical.  We develop efficient and robust methods of authentication and reputation, such as CSV.  Most of the concepts behind CSV are applicable not just to email spam, but to all spam, such as SPIM, wikispam, blogspam, etc.  While they are not useful where identity must be tightly tied to an individual, there are many cases
There are different levels of authentication, analagous to the levels of authentication provided by PGP/GPG, S/MIME, DKIM/DomainKeys, CSV, etc (which vary depending on how they’re used).  SpamAssassin rules and Open Proxy DNSBLs, for example, are already widely used to prevent non-email spam.
Unless we want to help build a police state,  folks must continue working on implementations other than ones that just tie an online identity to a gov’t ID.  I think it’s great that this is continuing.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global