Skip to: [Printable Version (PDF)] [Bibliography] [Footnotes]
Finance and Economics Discussion Series: 2016-103 Screen Reader version

Identity, Identification and Identifiers: The Global Legal Entity Identifier System*

Arthur B. Kennickell*

November 8, 2016

Identity is a critical concept in the rational interactions of any set of objects involving subject- object relationships. The objects must be distinguished according to some framework in order for such relationships to have meaning. In the world of economic systems, relationships such as ownership and responsibility require specific parties to be fixed with a high degree of certainty. This need is particularly strong in financial markets, where transactions can take place in nanoseconds. This paper discusses a particular framework for defining economic actors, the Global Legal Entity Identifier System (GLEIS), which was initiated for the purpose of creating greater transparency about participants in financial markets and transactions. The views expressed in this paper are mine and do not necessarily reflect those of the Federal Reserve Board or its staff.

As discussed in more detail below, the GLEIS follows from a G20 initiative to address fundamental problems related to identification that arose during the recent financial crisis. This system was constructed in stages, starting from an investigation under the leadership of the Financial Stability Board (FSB) of the relevant theoretical, practical and political constraints.

Following from that start came the development of an international charter of cooperating authorities, the elaboration of operational principles, and ultimately the unfolding and elaboration of an operational structure under a Swiss foundation created for that purpose.

As background for the discussion of the GLEIS, the paper addresses the most important conceptual issues related to identity, identification and identifiers. At a high level, these concepts are equally applicable to both natural persons and non-personal entities, though there are also fundamental differences.1 To support intuition, the paper begins with a discussion of the case of natural persons and then develops more details in the context of non-personal entities.

The ideas highlighted provide a framework for understanding the choices made in creating the GLEIS as a practical system of identity management for entities. The discussion also probes points where any such system might have weaknesses.

There is no pretense here that the discussion covers every aspect of identify, identification and identifiers. From John Locke [1690] onward, a large literature has developed on issues around identity, some of which reaches into very rarefied questions of existence or interpretation of reality. This paper purposely glosses over such fine elemental points, except where relevant to the goals of the paper.

1 Natural persons

As applied to a natural person, the broad concept of identity is potentially very complicated, involving the subjective views of the person about their distinct existence and their connections to ideas, groups and various other attributes--as well the views of other persons, systems or mechanical processes that may classify the person or distinguish the person from other persons. The process of identification, as the term is used here, classifies a person according to a set of criteria appropriate to a given context, and often at the most atomic level as a person distinct from all others. The identification may be determined at a given point in time, or for many points in time, given an underlying concept of what it means for a person to be "the same" at different times. It is such specific and persistent identification that is relevant for this paper.

Specific identification assumes first that there is an appropriate distinction between a person and not-a-person, as well as a distinction among persons. For purposes of this paper, it is most relevant to concentrate here on the inherent physical reality of a person. Outside of exceptional situations, an individual living person is easily distinguishable by observation as separate from other living persons. Thus, in principle it is possible to think of a persistent virtual envelope around the physical body of a given person and thereby formally distinguish the person from all others, even if parts of the person become separated (or parts are added) or the person otherwise changes size or condition over time. Such a distinction identifies the elements of the relevant set of persons in a persistent way. But it does not specifically distinguish among persons, outside the moment of observation.

A more specific and persistent identification requires matching attributes of a distinct physical person with a set of recorded information taken to be sufficient to define a person uniquely in a given context. Such information might be defined in terms of attributes directly connected to the physical reality of the person or attributes that reflect choice (e.g., "I see he is a distinct person, he says his name is Leif Xanthophyll and he lives in Philadelphia; because I believe he is telling the truth and there is only one Leif Xanthophyll recorded as living in Philadelphia, I conclude he is the specific person identified by the record.").

Problems in such identification may arise for three principal reasons. First, scope limitations in the set of attributes recorded for matching may lead to incorrect or ambiguous identification (e.g., "One Leif Xanthophyll lives on Lombard Street in Philadelphia and another lives on Luzerne Street, but the recorded attributes do not include the street name."). Where it is known that the entire population of individuals has been subjected to a common framework of identification, it is a theoretical possibility to verify the uniqueness of each set of values of the recorded attributes. In the common situation where the entire population is not recorded, there may be a risk of non-uniqueness of identification.

Second, the attributes of a person to be identified may be observed from the person with error (e.g., "He says he is the unique Leif Xanthophyll recorded as living in Philadelphia, but he is lying."). Careful observation and quality management as well as legal or similar compulsion to reveal the truth about some attributes may reduce the potential for such error. Where there is no constraint on implementation, attributes that have a minimal error rate in their association with a unique person, such as iris scans, could be used. However, privacy concerns, legal constraints, costs and other practical considerations may limit what can be collected or maintained as attributes or that may be applied in practice.

Third, the relevant set of reference attributes may be recorded or maintained with error, so that an incorrect match or no match is made (e.g., "There is a Leif Xanthophyll recorded as living in Philadelphia, but the only Leif Xanthophyll actually lives in Yellow Leaf, not Philadelphia."). Systematic revalidation of recorded attributes, perhaps by periodic direct comparison with the attributes of the person, may reduce the level of such error. Depending on the relevant institutional structure, some identifying attributes may change, yet the identification process may still remain informative about the correspondence of the person and a record of attributes (e.g., "Leif Xanthophyll, always a joker, changed his name to Godzilla Xanthophyll; the record for the former Lief Xanthophyll needs to be updated."). The validity of the concept of updating for addressing incorrect or stale information depends on support in the institutional structure for a concept of ownership or responsibility (such as an official record of a change of name), supported as necessary by an acceptable method of authentication (perhaps by a certification process or via access control using an alternative private code, such as a password). It may also be that the available attributes contain more than one subset of information that could be considered independently sufficient for identification (again for example, iris scans, in addition to other demographic information, such as an address), thus allowing a logical support for updating the incorrect attributes.2 Such subsets of the identifying information might be virtually absolute in their connection with a specific person, or the connection might be true with a level of probability. If the more nearly absolute attributes are relatively costly or difficult to evaluate, it may be sensible to include an array of less rigorous attributes that are almost always sufficient and to save use of the relatively absolute attributes for situations where the identification is otherwise ambiguous or where updating is necessary.

Normally, it would be considered very inefficient if detailed comparison of the entire set of relevant attribute information were necessary to achieve identification every time it might be required. An alternative is to undertake identification once, and to assign a unique and persistent label to a person. For example, a U.S. social security number is assigned based on an array of identifying information and it is (intended to be) unique to a particular person). A unique identifier is a type of formal label or pointer for which a value or code of some sort is assigned uniquely and exclusively (one and only one assignment) to a person specified by a unique combination of values of the relevant underlying identifying information.3 The identifier itself may be considered as a special type of attribute. In some cases it may contain specific information about the person identified (e.g., in most cases, the first three digits of a U.S. social security number reflect the location where the person was born.)

Generally, the most important use of an identifier is in connecting multiple sources of information that do not necessarily contain all the information required for primary identification, and doing so without direct intervening reference to the relevant physical person. If all the sources contain a common identifier, it may provide a more straightforward or efficient means of identifying sets of information about a specific person than separately collecting and maintaining identifying attributes, filtering across them in all sources to be connected and validating their applicability in each instance. For example, the U.S. Internal Revenue Service connects all income and tax information for a person through the use of a social security number.4 Obviously, for such linking to be meaningful, it is critically important that the initial association of the identifier with each record of information be reliable and that it be subsequently maintained through a chain of control.

The virtual envelope around a person is persistent, but over time the association of an identifier with a specific individual may become corrupted to some degree, lost or otherwise untrusted, either because the underlying identification process fails or because the identifier itself becomes corrupted in some way. In principle, it must always be possible to validate that the recoded attributes underlying an identifier continue to correspond to a specific person. The persistence of an identifier as a reliable mode of identification rests on the supporting institutional structure, the extent of redundancy in the identifying information, and the possibilities for other types of error. The possibilities for accidental or deliberate error are discussed further below for the case of entities.

In practical applications, there are many questions to be answered about when a degree of error or probability of error may overwhelm the usefulness of a set of attributes in identifying a person uniquely; often a perfect solution is not possible, so minimizing error within the existing constraints becomes important.5 For practical purposes, an identifier will not be used if there is insufficient confidence in the reliability of its association with a specific person. Confidence is supported by two factors. First, there must actually be an acceptable minimization of error within the domain of intended use. Second, transparency is needed about the limits of a given approach, in order to allow users to judge for themselves whether their specific uses might require additional effort to identify a particular individual to a higher degree of certainty.6

2 Non-personal entities

Non-personal entities (referred to here as simply "entities") are artificial objects socially constructed according to law, regulation, or convention to perform some function.7 The process of identification for entities raises most of the same general issues as the identification of persons. A significant difference is the range of possibility or difficulty in defining a persistent virtual envelope to contain a distinct entity. Direct physical reality does not necessarily offer a straightforward means of distinguishing an entity (for example, a fund). Sometimes the essence of an entity may have very little extent in the physical world, other than a notation of its existence or the traces of its actions. Legal personhood or similar legal, regulatory, administrative or other formal constructions may serve to define the identifiable essence of a particular entity at a given point in time.

Unlike the case of physical persons, the temporal persistence of the resulting virtual envelope, also may be more questionable for entities. This impermanence has implications for the definition of a consistent set of entities across time as well as the continuity of individual entities. An entity may change fundamental composition over time via corporate actions such as mergers and spin-offs or undertake basic changes of internal structure or function, leading to complex questions about what it means to be "the same entity" at various points in time. Moreover, in some jurisdictions a simple change of ownership of an entity that remains otherwise exactly the same is treated legally as a new entity, thus further calling into question the connection between even the physical reality of an entity and its legal embodiment. For some purposes, it may be possible to define specific information or a framework to track the composition of an entity sufficiently over time. As an extreme example, an entity might be pre-programmed by contract or other form of obligation to disintegrate in some way; there are many possible definitions of the relevant entity in this case, including one that encompasses a reference to the contractual nature of the disintegration from a specific initial state. In some cases, it might be sufficient to use data to track complete or fractional antecedents and successors of entities up to a level of materiality appropriate for a given set of uses.

Ideally, the identifying characteristics of an entity should be as closely connected as feasible to the legal, regulatory or other administrative construction that specifies the existence and extent of the entity. In some jurisdictions or situations, an entry in a business register may serve this function. In other situations, such information may be unavailable or unreliable and other identifying information would be required.8 The question of the sufficiency of identifying information for entities is addressed further below.

As in the case for natural persons, a unique identifier for an entity requires an unambiguous and exclusive assignment of an identifier to a single entity, based on a reliable process of identification. To be more than a trivially useful decoration, it should be either the sole sufficient information, within the tolerance of a given use, to make unique connections among different sources of information. For that reason, it is important to consider how an identifier, once assigned to an entity, might become associated with a given process or set of information and what limitations may apply.

An identifier in sets of information to be matched might have been provided originally by the authority of the entity itself, or it might follow from an earlier "chain of control" of other information that includes the identifier. It might also be "derived" by identifying a set of attributes associated with one identifier with comparable attributes in another source associated containing a different (or no) identifier; this approach is commonly referred to as "mapping." Such mapping is commonly performed once and revised only if there is a conflict in terms of the definition of an entity or its survival in the separate systems (e.g., two data systems might differ in standards for determining when an entity becomes a new entity, following its sale). Note that mapping is a type of identification and thus it is subject to the same sorts of qualifications as identification in general.

If the process for including an identifier in a given process or information set were perfectly controlled, the supporting identifying information for the entities associated with the identifier would not even need to be available. The usefulness of a reported identifier in practice turns on how close the practical situation is to this ideal, the possibilities for fast and inexpensive partial checking (for example, the identifier in conjunction with some other set of shared information), and the costs or risks from using or maintaining an erroneous identifier in the context of a specific set of uses.

Errors may occur in reports of an identifier for either accidental or intentional reasons. Accidental errors fall into three general types: chain-of-control errors, transcription errors and association errors. Chain-of-control errors may occur when procedures for assigning or propagating an identifier unintentionally contain an error (or where an error or other defect in associated security arrangements allows for corruption of the identifier); systematic testing (and security analysis) may minimize the likelihood of such errors.

Transcription errors in reports of an identifier may be controlled at a formal level through the use of check digits (e.g., ISO 7064). It is also possible that use of long and seemingly meaningless alphanumeric identifiers might increase the likelihood that reporters would use a mechanical process to refer to the identifier, rather than manually specifying the identifier. In this way, the possibility of multiple transcription errors could in principle be reduced to the possibility of a single error in the reference source, to which quality assurance procedures might more economically be applied.

Association errors occur as a result of misunderstanding which is the relevant identifier for an entity in a situation where its identity must be represented by an identifier. Where the data or process involving the reported identifier results in a transaction or other definitive action directly affecting an entity erroneously associated with the identifier, there would often be a built-in incentive to correct the information, if only at a point after the action has taken place--such as in the resolution of market trades that fail due to improper identification. Some such errors may be a result of confusion created by errors or by actual or perceived insufficiencies in the underlying identifying information associated with the identifier.

Intentional errors in the reporting of an identifier may occur when there is a deliberate effort to disguise the true identity of an entity or where a supposed entity does not in fact exist.

Deliberate reporting of a nonexistent value of an identifier is, in principle, straightforward to detect by searching the universe of the given identifier. Much more difficult to detect are situations where such errors occur by the masquerading of an entity under the identifier of another existing entity or by exploiting an identifier associated with a fabricated identity for a nonexistent entity. As in the case of accidental association errors, errors through masquerading at least can be expected to be detected at the point where an action affects the entity truly associated with the identifier, though this resolution may be much too late to be of practical use in cases of fraud. Masquerading may be limited by requiring multiple sources of authentication. Fabrication may be minimized by a rigorously enforced process to require proof of existence when an identifier is assigned, and by regular monitoring to ensure that the entity continues to exist and the identifying information remains sufficiently correct.

4 Conclusions

We have reached a stage of human history where there is a strong likelihood that machines will have an increasingly deep role in running the great majority of the manageable processes in the world that support life, and they will operate with minimal human intervention. If the relevant quanta for management--an action, the subject and the object of the action, and the relevant initial state description--are not defined and identified to a sufficiently high degree of precision in such a world, unintended actions could arise and systemic stability may be threatened by resulting turbulence. A taste of such breakdown was experienced in the financial crisis--or in fantasy in the film "Brazil". Highly reliable identification will also be necessary to support the level of transparency necessary to support trust in such systems. Identification needs in finance are likely to remain especially strong.

This paper has reviewed a range of conceptual issues relevant for identity, identification and identifiers. Identity raises fundamental questions about what an entity of any sort is, as distinct from all other possible arrangements of matter or logic, and the extent to which it is persistent over time and space. Identification operates at a more concrete level by associating observable attributes with an entity, as defined against the background of specific types of formal organization. By serving as a unique label, an identifier is a shorthand way of referencing an identification process for a particular entity. An advantage of an identifier is that it may be taken to signify a particular identified entity, regardless of whether the entity is present in a meaningful sense.

Although the paper explores a variety of areas of abstraction around the terms identity, identification and identifier, many others are silently passed over. Virtually any aspect has the possibility to regress to the point of metaphysics. The paper attempts to remain at a practical level, where the most pressing problems are ones associated with costs and the possibilities for information for identification, process control, error and risk, in the context of a given use or set of uses. The appropriate trade-off between costs and the other factors must be determined as appropriate for use.

Finance may be currently in the forefront in terms of the level of interaction of massive amounts of data with broader aspects of human behavior. Given the numerous, disparate and dispersed participants involved and the necessity for automation, standardization is critical for such a system to operate at all. The elements communicated must be as clear as possible. Among those elements, nothing is more important than the identity of actors in any exchange. The construction of the GLEIS described in this paper is practical example of a standardized system of identification that has considered the practical trade-offs against a foundational set of use cases.

The GLEIS is intended to provide an identifier, the LEI, associated with a level of identification appropriate for a wide variety of areas where the identification process underlying the LEI is viewed as sufficiently trusted and the propagation of the LEI in use is either unquestioned or separately controllable to a sufficient degree. For example, because the LEI serves as the primary regulatory identifier in OTC derivative trades, it is unambiguously associated with a trade; propagation of the LEI beyond that point through clearing and settlement relies on the integrity of the supporting information systems.

In some very sensitive applications, even the rigorous identification process underlying the LEI may not be sufficient, or its attachment to a given body of data may not be sufficiently trusted. For example, some anti-terrorism uses may require extraordinarily high precision for selected cases that would not be feasible to uphold for every entity. Nonetheless, the LEI framework might still serve as a core around which an even more rigorous process of this sort could be built, and errors in identification for the LEI could be passed back to the GLEIS for correction through the open challenge process.

Interoperability of data organized around the LEI with other sources of data is also critically important. The GLEIS is not designed to contain all relevant information about entities, but only to serve as a "hub" for identification of entities across other systems of information. Sometimes the LEI may not be present in a relevant body of data where there is a need to connect the data with other data containing the LEI as the identifier. Where the data without an LEI contain an alternative identifier, the problem becomes one of mapping, as discussed in this paper. Where the data contain no relevant identifier, a process is required to identify the entities present to an appropriate level of rigor for the intended use and to map those identities to the appropriate LEIs in the other source of data. Because mapping is itself another form of identification, complications may arise when the sources mapped rest on incompatible information or frameworks. Interoperability of the GLEIS with relationship structures organized and maintained outside the GLEIS is likely to be particularly important even in the long run. The GLEIS has the possibility of being the foundation for many other such complex systems.

Going forward, the rigor of control of LEI validation and the steps to ease mapping for the LEI should spur progress. The underlying quality processes supporting identification with an LEI can be expected to become increasingly rigorous as the ability of the GLEIF to enforce standards becomes more firm and as evaluation of past performance leads to continuous improvement.

Addition of information on organizational structures to the GLEIS will provide greater clarity about both the identity of individual entities and the collective effect of the organizations of which they are a part. Such organizational information, together with potential additions of information on relationships with corporate officers or beneficial ownership, could serve to further sharpen the level of identification for uses with more critical needs for precision in identification. For the long run, the GLEIS can be expected to evolve further around its original structure to support, or even prompt, a variety of new needs where identification has a key role.

5 Bibliography

Couillault, Bertrand, Jun Mizuguchi, and Matthew Reed, "Collective Action: Creative Use of Soft Law, Local Law, and Private Law to Build a Global Infrastructure" (forthcoming).

Financial Stability Board [2012]. "A Global Legal Entity Identifier for Financial Markets", http://www.fsb.org/wp-content/uploads/r_120608.pdf.

International Organization for Standardization [2012]. "lSO 17442: Financial services -- Legal Entity Identifier (LEI)", http://www.iso.org/iso/catalogue_detail?csnumber=59771.

Locke, John [1690]. An Essay on Human Understanding, Prometheus Books.

6 Annex: Governance of the GLEIS

The GLEIS was designed to serve a public-interest mission, by creating an identification system centered on the LEI in order to support the missions of regulators, facilitate improved information management in the private sector, serve as a tool for research and provide information for the public in general. In contrast to many of the existing proprietary identification systems, the LEI and its supporting data are freely available without intellectual property restrictions. The costs of the GLEIS are paid by registration and maintenance fees imposed on entities that register in the system.

The governance structure of the GLEIS operates at three levels: the Regulatory Oversight Committee (ROC), the Global LEI Foundation (GLEIF), and Local Operating Units (LOUs). The ROC, the highest-level governance body of the GLEIS, came into existence in January 2013 under a charter developed by a working group of the Financial Stability Board, which was endorsed by the G20 and then acceded to by over 70 public authorities from a wide range of jurisdictions globally.34 Those authorities became members of the ROC. The ROC is responsible for setting policies under which the system operates and for overseeing the operation of the system in a variety of ways.

The Global LEI Foundation (GLEIF) was established in Switzerland in June 2014 to serve as the central operational unit of the GLEIS, with key operational responsibilities, including, among other things, overseeing the quality of the assignment of the LEI to entities, setting operational standards and coordinating the federated registrars of the GLEIS. The constitutional document of the GLEIF (its "statutes") establishes its formal relationship with the ROC; among other things the statutes require the GLEIF to accept standards and protocols put forward by the ROC to define the nature of the GLEIS.35 A memorandum of understanding between the two parties further clarifies the relationship in practice.36

Local Operating Units (LOUs) provide registration services to entities and perform validation of the data. An LOU may be a public or private body, but each is required to operate in this capacity on a nonprofit cost-recovery basis. An LOU may operate in a single jurisdiction or market or it may operate much more broadly--even globally. However, an LOU must have sufficient institutional knowledge about the markets in which it operates to be able to select and use documentation to establish the existence of registering entities and to validate the information provided by the entity about itself.

From the time in 2013 when the ROC came into existence, the GLEIS operated in an interim manner, with the ROC assuming the minimal necessary operational responsibilities for the GLEIS to operate, until the GLEIF could be established and it could assume operational control and oversight. At this time this paper was written, all aspects of transition from this interim state had been completed except one: Initially, the LOUs were brought into the GLEIS under the sponsorship of a ROC sponsor, which had responsibility for ensuring that their sponsored LOU was compliant with ROC principles; by the middle of 2017, all LOUs are expected to have completed a formal accreditation process with the GLEIF, resulting in a set of bilateral contracts between the GLEIS and the LOUs that will empower the GLEIF to enforce common standards and data quality.37 Any LOUs failing to complete this process by the end of 2017 will be excluded from the GLEIS.



Footnotes

* The views expressed in this paper are the views of the author alone and they do not necessarily reflect the views of the Board of Governors of the Federal Reserve System or its staff, or any part of the Global LEI System. I am grateful to my colleagues on the LEI Regulatory Oversight Committee and its predecessors, the board members and staff of the Global LEI Foundation, as well as numerous other public spirited people who contributed their time to develop and guide the Global LEI System. I am particularly grateful to Stephan Wolf for comments. I am solely responsible for any errors or omissions. Return to Text
* Advisor, oard of Governors of the Federal Reserve System Washington, DC 20551 Arthur.Kennickell@frb.gov Return to Text
1. Identifiers for other types of objects are not considered here, but many of the same issues are involved. Return to Text
2. For example, multi-factor authentication, such as tokens in addition to passwords, might be appropriate in some situations for sufficiently reducing the probability of error. Return to Text
3. For example, for the Aadhaar code for personal identification in India, the identifying information includes finger prints, iris scans, photographs and other demographic information. See https://uidai.gov.in/. Return to Text
4. There may be intermediate approaches, such as in the case of a passport, which can be taken as a sort of portable identification system. To obtain a passport in the past, the applicant was required to provide documentation of eligibility (leaving aside the question of how the legitimacy of that material might be assessed) and to supply a photograph. Passports are designed to be difficult to fabricate, thus tightening the connection between the photograph included and the chain of documentation supporting the issuance of the document. In direct personal use of the passport, visual inspection of the photograph and the person holding the passport was judged sufficient for the purpose of identifying the holder. Subsequent incorporation of nearly unique biomarkers, such as finger prints and iris scans, makes fabrication more difficult, but if the biomarkers of the passport holder are assessed only relative to the information contained in the passport, for example in a chip, there is no logical difference from use of a photograph alone, because either might be forged in the physical document. A passport also contains a unique number which may be used as an identifier in data on instances of direct personal use of the passport. Return to Text
5. There may be errors of a "minor" sort that do not fundamentally affect the interpretation of the identifying information. For example, "111 E. Luzerne Street" would not normally be taken to be meaningfully different from "111 East Luzerne Street", even though one of those versions may be considered the "official" version by some standard. In contrast, "111 East Luzerne Street" and "111 West Luzerne Street" might be expected to be considered meaningfully different. The level of acceptable ambiguity depends on the background against which the information is viewed and the sensitivity of the purpose for which it is used. Return to Text
6. Even when the tolerance level is not always met for a very sensitive use, such as identifying blacklisted individuals, the identification may still be helpful if the association of the person and the identification process is sufficiently tight that it is only additional information (such as knowledge of a person's association with a specific group), not a different and more rigorous core process, which would be required. Return to Text
7. Such entities could range from the arrangement whereby an individual engages in a business activity to more complex forms, such as publicly traded corporations or state-owned enterprises. Return to Text
8. An additional means of identifying an entity might be via its relationship to other entities in an organizational structure or its connection to corporate officers or other individuals. In that sense, identification of larger organizational structures, rather than just entities, might provide more precise identification as well as supporting broader understanding of actions taken by or performed on entities. Return to Text
9. "We support the creation of a global legal entity identifier (LEI) which uniquely identifies parties to financial transactions. We call on the FSB to take the lead in helping coordinate work among the regulatory community to prepare recommendations for the appropriate governance framework, representing the public interest, for such a global LEI by our next Summit." Declaration of the 2011 G20 Cannes Summit, http://www.g20.utoronto.ca/2011/2011-cannes-declaration-111104-en.html. Return to Text
10. See Financial Stability Board [2012]. This report was endorsed by the G20 at its 2012 Los Cabos Summit ("We endorse the FSB recommendations regarding the framework for development of a global legal entity identifier (LEI) system for parties to financial transactions, with a global governance framework representing the public interest. The LEI system will be launched by March 2013 and we ask the FSB to report on implementation progress by the November 2012 Finance Ministers and Central Bank Governors' meeting. We encourage global adoption of the LEI to support authorities and market participants in identifying and managing financial risks." See http://www.g20.utoronto.ca/2012/2012-0619-loscabos.html.) Return to Text
11. See International Organization for Standardization [2012]. Return to Text
12. In general, the first four digits of an LEI generally represent a prefix associated with the initially issuing LOU. The prefix is used only for operational convenience. Because the maintenance of the data for any LEI may be transferred across LOUs, there is no necessary connection between the prefix and the issuer subsequent to issuance of the LEI. Return to Text
13. The two LEI check digits are determined by applying the MOD 97-10 method given in ISO 7064 to a concatenation of the first 18 component numbers and letters mapped to numbers (as given in ISO 17442). Return to Text
14. Most typically, the umbrella entity would have legal personality, while its component the sub-funds would not. However, the sub-funds would generally have ring-fenced assets and liabilities. Protected cell companies are a similar type of organizational structure. Return to Text
15. As noted earlier in the paper, identification of natural persons and of entities raise different issues. Generally, the relevant identifying information would be substantially different. Thus, it might be more straightforward to treat each under a separate standard. However, there is a gray area between entities and natural persons that is addressed by the LEI, as described in the text. Return to Text
16. Eligibility in this case turns critically on the presence of such an individual in a type of business register. Return to Text
17. The LEI and its reference data should persist indefinitely, but there is some question about whether the historical data on an individual acting in a business capacity might become personal data when the person ceased such activity under some jurisdictional frameworks. Return to Text
18. As with the case of individuals acting in a business capacity, a critical constraint on eligibility for an international branch is that it must be recorded in a type of business register. Return to Text
19. Among other things, Recommendation 5 of FSB [2012] requires that "Flexibility must be built into the global LEI system to provide the capability for the system to expand, evolve and adapt to accommodate innovations in financial markets. It must also allow the seamless introduction of new participants." Return to Text
20. In a world where perfect identification is either impossible or unmanageably costly, some degree of approximation is necessary. As noted earlier, the approximations should be optimized for the motivating use cases, as was done for the LEI. In general, other uses might require additional information or a different process for the chain of control of information. Return to Text
21. The resulting core set of "business card information" includes the official name of the entity, the legal address, the headquarters address, and, where relevant, the business register where the entity is recorded. The information specified under the standard also includes the date of assignment of the LEI, the most recent update of the information, and, where relevant, the reason the entity has ceased to exist and its legal successor. Return to Text
22. The ISO Standards Advisory Group with oversight of ISO 17442 provided very helpful comments at this stage. Return to Text
23. The LEI record also contains a variety of status indicators and operational flags. Return to Text
24. Note that LOUs may use information beyond the data published in an LEI record to verify the existence of an entity and its complete alignment with the information collected at the point of registration. Return to Text
25. Payment for registration is viewed as traceable and contributing evidence supporting the identification of the person registering to the entity. Return to Text
26. To be accredited under in the GLEIS, LOUs are required to have expertise in local conventions sufficient for them to be able to judge what information is meaningful and to use the information appropriately in validation. Return to Text
27. The GLIEF publishes regular reports on the quality of the GLEIS data at https://www.gleif.org/en/lei-data/gleif- data-quality-management. Return to Text
28. The GLEIS itself does not yet monitor information such as corporate action feeds to detect relevant probable changes in the status of an entity or its reference data. Such review may be expected as the system continues. Return to Text
29. At least some entities that are marked as lapsed appear to be no longer in existence. Absent external motivation, LOUs appear to have little incentive to research such entities, and generally users of LEI data should tend to have fewer interactions with data on defunct entities that might lead to a formal challenge to the data. Additional work is needed to determine the most efficient means of addressing this problem. Return to Text
30. For limited areas such as this, an exception to allow third-party registration by authorities or to allow a space for interoperability with an external system created for this purpose might be a way forward. Return to Text
31. In the initial phase, the parent definitions will be based on the type of accounting consolidation relevant for an entity or jurisdiction. For example, it can be expected that most U.S. entities would report parents according to US GAAP principles, whereas in Europe IFRS principles would generally apply. Preparatory work for this work indicated that differences in accounting principles are unlikely to lead to seriously inconsistent outcomes for this purpose. For details, see "Collecting data on direct and ultimate parents of legal entities in the Global LEI System - Phase 1" (http://www.leiroc.org/publications/gls/lou_20161003-1.pdf). Return to Text
32. Note that there are a variety of alternative relationship types (such as one based on control or other aspect of responsibility) and each type could lead to the identification of a different organizational structure, potentially having different entities at the top of the resulting hierarchy. Connection of off-balance-sheet entities, such as special purpose vehicles, might be linked to an entity with yet another type of relationship. Return to Text
33. See https://www.ferc.gov/whats-new/comm-meet/2016/072116/E-7.pdf. Return to Text
34. See https://www.leiroc.org/publications/gls/roc_20121105.pdf for the ROC Charter. Return to Text
35. See https://www.gleif.org/content/1-about/5-governance/8-statutes/gleif-20140824-3.pdf for the GLEIF Statutes. Return to Text
36. See https://www.gleif.org/content/1-about/5-governance/3-mou-between-gleif-and-lei-roc/20150923-ROC- GLEIF-MOU-final-signed.pdf for the memorandum of understanding between the ROC and the GLEIF. Return to Text
37. See https://www.gleif.org/en/lei-system/gleif-accreditation-of-lei-issuers/required-documents for the Master Agreement governing the relationship between the GLEIF and each LOU. Return to Text

This version is optimized for use by screen readers. Descriptions for all mathematical expressions are provided in LaTex format. A printable pdf version is available. Return to Text