Internet Identity Workshop  ·  April 2026

Fiduciary Commons at IIW

Three sessions presenting the complete Fiduciary Commons architecture: the constitutional foundation, why incomplete legislation is a practitioner problem, and how the inference problem and procurement reform complete the work.

3Sessions
52Total slides
10Documents
Michael G. LeahyPresenter
Session 1 of 3

From Principles to Law

The constitutional foundation, what Utah enacted, and a roadmap for other states

The fiduciary logic chain from facts as an unownable commons through constitutional trustee obligations. What Utah’s SB 260 and SB 275 accomplished, where the gaps remain, and the three-stage roadmap for states that follow.

Session 2 of 3

Why Incomplete Legislation Is a Practitioner Problem

Three failure scenarios, fragmentation risk, and the case for complete uniform enactment

VIDA without PDTA, PDTA without VIDA, and fragmentation across states: three scenarios with direct commercial consequences for identity vendors and protocol designers. Why practitioners are best positioned to prevent the worst outcomes.

Session 3 of 3

The Inference Problem: Completing the Architecture

GAAFA compliance architecture, the Carpenter trajectory, and Article 3B procurement reform

The AI layer that reconstructs what credential architecture was designed not to collect. What GAAFA requires architecturally. Why procurement is the leverage point where constitutional standards either get embedded before deployment or abandoned in vendor negotiations afterward.

Leave-behind and reference materials

Three document types serve three distinct audiences. The Series Summary is a standalone argument for readers who attended no sessions. The Session Refreshers are shareable two-page references for attendees. The Practitioner Reference Card is designed to hand to a state CIO or procurement officer.

Document Audience and purpose Format Download
Series Summary Standalone 9–10 page argument covering the full framework from constitutional foundation through procurement leverage point. For readers who attended no sessions. DOCX Download →
Session 1 Refresher Two-page reinforcement for Session 1 attendees. Four key ideas, closing ask, practitioner implications, and plain-language key terms. DOCX Download →
Session 2 Refresher Two-page reinforcement for Session 2 attendees. Three failure scenarios, CIO conversation guide, and key terms. DOCX Download →
Session 3 Refresher Two-page reinforcement for Session 3 attendees. GAAFA compliance checklist, Article 3B summary, and key terms. DOCX Download →
Practitioner Reference Card Three-page brief covering the core argument, three failure scenarios, GAAFA compliance properties, Article 3B summary, and three specific actions. Designed to hand to a state CIO or procurement officer. DOCX Download →

Michael G. Leahy

Michael G. Leahy is a lawyer and practitioner-scholar. He served as Secretary of Information Technology for the State of Maryland from 2017 to 2023, where he was Chief Information Officer and a member of the Governor’s Cabinet. He served as President of NASCIO in 2021 and 2022. He is the author of the Fiduciary Commons framework and the proposed Article 3B provisions submitted to the ABA State and Local Government Procurement Law Review Committee.