Trustmark Definition Name | Version |
---|---|
Requirements for verifying identity evidence at a high assurance level.
|
3.0 |
Requirements for justifying all forms of identity evidence accepted during the identity proofing process.
|
3.0 |
Requirements for documenting training procedures for personnel that validate identity evidence.
|
3.0 |
Requirements for validating identity evidence at levels appropriate for the strength of the identity evidence.
|
3.0 |
Requirements for collecting additional attributes during identity proofing.
|
3.0 |
Requirements for maintaining and reviewing audit logs.
|
3.0 |
The requirements for a CSP to collect appropriate biometric data from all applicants at high assurance level.
|
3.0 |
Requirements for publishing a credential policy.
|
3.0 |
Requirements for publishing a credentialing practices statement.
|
3.0 |
The requirements for enrollment codes during the identity proofing process.
|
3.0 |
Requirements for fraud mitigation inclusion in privacy risk assessments.
|
3.0 |
Requirements for in-person identity proofing.
|
3.0 |
The requirements for a CSP to adhere to special rules when identity proofing minors.
|
3.0 |
Requirements for collecting the minimum necessary PII during identity proofing.
|
3.0 |
Requirements to avoid using Social Security Numbers (SSN) for identity proofing and resolution.
|
3.0 |
Requirements for dispossing of PII.
|
3.0 |
Requirements for in-person or remote identity proofing.
|
3.0 |
Requirements for privacy notice being provided to applicants at the time of data collection.
|
3.0 |
Requirements for explicit notice being provided regarding the collecting of PII during identity proofing.
|
3.0 |
Requirements for protecting PII collected during enrollment.
|
3.0 |
Requirements for using only protected channels during identity proofing.
|
3.0 |
Requirements for publishing redress mechanisms.
|
3.0 |
Requirements for performing periodic redress mechanism audits.
|
3.0 |
Requirements for conducting a risk management process.
|
3.0 |
The requirements for a CSP to adhere to appropriate security controls.
|
3.0 |