Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- D2.1: Inventory of Topics and Clusters.
- D2.2: Set of use cases and scenarios.
- D2.3: Models.
- D2.6: Identity in a Networked World – Use Cases and Scenarios.
- D2.13: Virtual Persons and Identities.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- Identity of Identity.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D2.2: Set of use cases and scenarios
Anonymously defending your anonymity
The problem of the anonymous person, wanting to defend and retain his anonymity when it’s revocation is being questioned before court, could be solved by analogy of California draft legislation (Assembly Bill 1143, see info.sen.ca.gov). This draft legislation creates an official procedure for de-anonymising and goes as follows:
a plaintiff suits (asks) an ISP to de-anonymise a client and provides the ISP with the reasons.
the SP notifies the anonymous personand sends him a copy of the suit,
the anonymous is granted a reasonable period to defend himself against the petition and sends his defence to the SP who sends it to the judge.
the judge rules on the defence.
if the party that files the suit abuses this procedure, he has to pay damages.
* * *
35 / 69 |