/Docs/G/UMA-Use-Cases-CmA/0.md
Source views: Source JSON(ish) on GitHub (VSCode) Doc views: Document (&k=4.r00t): Visual Print Technical: OpenParameters Xray
Implications for Creating a UMA Legal Framework
>- Mapping UMA Roles, Obligations and Liabilities to Information Privacy, Information Security, Federated IdM, and eID Frameworks
>- Resource Subject
- Resource Owner/Access Rights Holder
- Resource Server
- Authorization Server
- Requesting Party
- Relying Parties (Out of UMA Network)
>Intermediary Service Provider Liability Issues
>- Unauthorized Access, Use or Dissemination of Protected Data (by AS)
- Mistaken Identification of Requesting Parties (by AS)
- Failure to Enforce Access Policies with Third Party Providers (by AS)
- Failure to Enforce Access Policies with Requesting Parties (by AS)
- Unauthorized Dissemination of Identity Attributes (by Identity Brokers)
>Strategies for Limiting Liability
>- Contractual
- Insurance
- Compliance with Jurisdiction-Specific Laws
- Compliance with Data/Industry-Specific Regulations
>>