/Docs/G/UMA-Use-Cases-CmA/0.md
  Source views: Source JSON(ish) on GitHub (VSCode)   Doc views: Document (&k=1.r00t): Visual Print Technical: OpenParameters Xray
Lex Informatica Considerations
  1. A. UMA Value Proposition for Programmable Devices, Network Systems, and Applications
    1. Consumer Access Control (Autonomy)
    2. Trusted Relationships (Reciprocity)
    3. Default Rules/Policies (Objectivity)
  2. UMA Consent Advantages
    1. Diachronic Consent/Access Control
    2. Asynchronous Consent/Access Control
    3. Delegated/Distributed Authorization Chain
  3. UMA Legal Advantages
    1. Jurisdictional: Networks and Cross-Border Interoperability
    2. Customization of Consumer Control over Access Rights/Permissions
    3. Self-Enforcement: Monitoring and Ex Ante
  4. UMA Legal Challenges
    1. Data Ownership – How Does the Consumer Gain Access Control?
    2. Device Function Control – Who Controls?
    3. Identity and Authorization of RqPs
    4. Downstream Control and Monitoring of Personal Information Access, Distribution, and Use Rights
    5. How enforce access controls and authorizations/permissions?