A Discussion of Military Identity use cases

From IIW
Military Identity Use Cases
Tuesday 3F

Convener: Heather Vescent

Notes-taker(s): Heather Vescent


Tags for the session - technology discussed/ideas considered


Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:


We discussed the different aspects of privacy and security for vulnerable populations - active duty soldiers are a vulnerable population and have similar identity requirements as other vulnerable populations - more security, who has access to identity information, how it is shared/given and what happens when concluding military service.