Digital identity: Definition and advice

by | Nov 21, 2023 | Identity check

The rise of the digital world has ushered in a new era in which our online activities contribute to forging a complex and constantly evolving virtual identity. A person's digital identity is increasingly crucial to our daily lives. It requires a thorough understanding to successfully navigate this connected universe. This article explores the various aspects of digital identity, offering essential insights for understanding, protecting and acting.

 

What is a person's digital identity?

 

A person's digital identity is the extension of their identity (surname, first name, date of birth, address, etc.) into the virtual world. It corresponds, for example, to e-mail addresses, passwords, pseudonyms and so on. All these elements make up a person's digital identity. Social networks will enhance this digital identity with elements such as images, videos, comments, private data, etc. Our online presence influences how Internet users perceive us, and thus contributes to our online identity.

 

The creation of our online identity often takes place through social networks. Taking over from personal blogs, networks like Facebook, Instagram and Twitter expose our digital identity. However, once online, all this information becomes difficult to control and poses certain privacy risks.

 

A person's online identity also concerns all private and sometimes sensitive information. For example, health data stored on a health insurance card. But also legal or judicial data. Physical identity is increasingly extending to the digital domain, and to a person's digital identity.

 

Types of personal digital identity

 

Online identity can be broken down into three distinct categories, each linked to the origin of information sources, their content, and the author.

 

Declarative identity

 

This category covers information provided by the person concerned. For example: details of marital status and other objective elements. This declared information helps to build up an accurate image of the individual online.

 

Calculated identity

 

The calculated identity results from analyses performed on the available data, generating a more complex profile of the individual or entity. These analyses provide in-depth insights based on aggregated data.

 

Active identity

 

Active identity is shaped by concrete actions taken online. Behaviors, habits and actions observed on social networks and other platforms contribute to a constantly evolving identity.

 

These categories underline the diversity of information disclosed online, and highlight the need for proactive management to preserve the integrity of the individual or entity concerned.

 

What rights do we have regarding a person's digital identity?

 

The General Data Protection Regulation (GDPR) gives users a series of significant rights with regard to the management of their digital identity. These rights aim to strengthen transparency, control and confidentiality of personal data. Here are some of the key rights granted to users by the RGPD.

 

Rights brought about by the GDPR concerning a person's digital identity

 

The right of access

Individuals have the right to request and receive confirmation as to whether personal data concerning them is being processed. They may also request detailed information on the nature of such processing.

 

Right of rectification

Users have the right to request the correction of inaccurate personal data concerning them.

 

Right to be forgotten

Also known as the right to erasure, this entitles individuals to request the deletion of their personal data. This right applies in certain circumstances, notably if the data is no longer necessary for the purpose for which it was collected.

 

Right to restrict processing

Individuals have the right to restrict the processing of their personal data in certain situations, notably if the accuracy of the data is disputed or if the processing is unlawful.

 

Right to data portability

This right enables individuals to receive their personal data in a structured, commonly used and machine-readable format, and to transmit it to another data controller.

 

Right to object

Individuals have the right to object to the processing of their personal data in certain circumstances, in particular where the processing is based on the legitimate interests of the data controller.

 

Right not to be the subject of an automated decision

Users have the right not to be subject to a decision based exclusively on automated processing. This includes, in particular, profiling and applies if this decision produces legal effects concerning them or significantly affects them.

 

These rights, granted by the RGPD, aim to give individuals greater control over their personal information and promote more transparent and privacy-friendly management of their digital identity.

 

How do you protect your personal digital identity?

 

Protecting digital identity has become crucial as our world becomes increasingly connected. Potential risks include data leaks and privacy breaches. These can result from poor digital identity management. The consequences can be real, even affecting a person's professional life.

 

That's why it's important to be cautious online. Here are a few tips for improving the security of your virtual identity.

 

User account protection

 

To reduce the risk of usurpation of your personal digital identity, there are a few practices you should adopt.

  • Change your password frequently.
  • Do not use the same password on different sites.
  • Use secure passwords that are not linked to your personal information.

 

Beware of free websites

 

Many are familiar with the adage "If it's free, you're the product!". That says it all! Completely free sites often use your data. In fact, personal information and user behavior are used for targeted advertising, sometimes a little too much so.

 

Beware of phishing attempts

 

Phishing is a method frequently used by cyber criminals. It enables them to retrieve a person's credentials and use their digital identity.

 

Conclusion

 

Navigating the digital world requires a thorough understanding of our online identity. By adopting secure practices and understanding the issues surrounding our digital presence, we can shape a digital identity that reflects our true essence, while preserving our privacy. Protecting our digital identity thus becomes a shared responsibility in this constantly evolving digital age. By remaining vigilant and proactive, we can build and maintain a positive and secure digital identity.

confetti

Identity check

Spot any attempted fraud