Trustmark Definition Name | Version |
---|---|
Requirements to avoid using Social Security Numbers (SSN) for identity proofing and resolution.
|
3.0 |
Requirements for dispossing of PII.
|
3.0 |
Requirements for in-person or remote identity proofing.
|
3.0 |
Requirements for privacy notice being provided to applicants at the time of data collection.
|
3.0 |
Requirements for explicit notice being provided regarding the collecting of PII during identity proofing.
|
3.0 |
Requirements for protecting PII collected during enrollment.
|
3.0 |
Requirements for using only protected channels during identity proofing.
|
3.0 |
Requirements for publishing redress mechanisms.
|
3.0 |
Requirements for performing periodic redress mechanism audits.
|
3.0 |
Requirements for conducting a risk management process.
|
3.0 |
The requirements for a CSP to adhere to appropriate security controls.
|
3.0 |
The requirements for a CSP to adhere to appropriate security controls.
|
3.0 |
Requirement that identity proofing not be performed to determine eligibility for services or benefits.
|
3.0 |
The requirements for a CSP to identity proof Trusted Referees at an equivalent or higher assurance level then that of regular applicants.
|
3.0 |
The requirements for sufficient complexity when performing Knowledge Based Verification.
|
3.0 |
The requirements for Knowledge Based Verification to be opted out of by an applicant.
|
3.0 |
The requirements for the sources of information used in Knowledge Based Verification.
|
3.0 |
The requirements for presence verification during remote supervised identity proofing.
|
3.0 |
The requirements for tamperproof hardware and networks when performing remote supervised identity proofing.
|
3.0 |
The requirements for training of proofing supervisors for remote identity proofing procedures.
|
3.0 |
The requirements for biometric collect for supervised identity proofing.
|
3.0 |
TD Description Goes Here
|
0.1-BETA |