Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 35 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
PII (Personally Identifiable Information) refers to any data that can identify a specific individual, including attributes like name, address, date of birth, and citizenship that require privacy protection mechanisms in credential systems.
PII stands for Personally Identifiable Information - any data element or combination of elements that can be used to identify, contact, or locate a specific individual. In the context of KERI and ACDC systems, PII represents sensitive identity attributes that require careful handling to preserve privacy while maintaining verifiability.
Common examples of PII include:
Within the KERI/ACDC ecosystem, PII handling is a critical design consideration that directly influences the architecture of verifiable credentials and disclosure protocols.
ACDCs provide sophisticated mechanisms for protecting PII through:
Selective Disclosure: Enables credential holders to reveal only specific attributes necessary for a transaction, keeping other PII hidden. Each selectively disclosable attribute is cryptographically blinded using SAIDs, preventing correlation of undisclosed fields.
When designing ACDC credentials containing PII:
PII handling in KERI/ACDC systems must comply with applicable data protection regulations:
The cryptographic verifiability of ACDC credentials supports compliance by providing auditable proof of consent and disclosure scope.
Graduated Disclosure: Allows progressive revelation of PII as trust relationships develop, starting with minimal disclosure and expanding only as contractual protections are established.
Chain-Link Confidentiality: Contractually binds recipients to protect disclosed PII and extends these obligations to downstream parties, creating legal liability for unauthorized disclosure.
The KERI protocol addresses the correlation problem - where PII from multiple contexts can be linked to track individuals across interactions. Through cryptonymous identifiers and blinded attributes, ACDC credentials minimize exploitable correlation while maintaining cryptographic verifiability.
The vLEI Ecosystem Governance Framework explicitly recognizes that Legal Entity Engagement Context Role vLEI Credentials may contain PII, requiring:
PII protection in ACDC credentials leverages: