{"id":5259,"date":"2025-06-22T22:35:07","date_gmt":"2025-06-22T22:35:07","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=5259"},"modified":"2025-09-06T17:32:15","modified_gmt":"2025-09-06T17:32:15","slug":"online-trust-most-excellent-user-experience","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/","title":{"rendered":"Online Trust: Most Excellent User Experience"},"content":{"rendered":"\n<p>The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these <a href=\"https:\/\/www.financialdataexchange.org\/FDX\/FDX\/News\/Press-Releases\/FDX%20Recognized%20by%20CFPB%20as%20a%20Standard-Setting%20Body,%20a%20Step%20Forward%20for%20Open%20Banking.aspx\" target=\"_blank\" rel=\"noopener\" title=\"\">guidelines<\/a> directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is not just functional, but also meets the letter and spirit of consumer data rights.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<h2><span style=\"color: #3366ff;\">Regulatory Foundations for the 1033 UX<\/span><\/h2>\n\n\n<p>The Consumer Financial Protection Bureau\u2019s Section 1033 rule, finalized in October 2024, mandates that financial institutions provide consumers and authorized third parties with access to their financial data in a secure, reliable, and user-friendly manner. FDX\u2019s UX Guidelines are explicitly mapped to these regulatory requirements, providing actionable recommendations for technical implementers.<\/p>\n\n\n\n<p>Key CFPB 1033 requirements that guided FDX\u2019s UX Guidelines include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Clear and Conspicuous Authorization Disclosure (1033.411(a))<\/strong>: The authorization disclosure must be prominent and segregated from other materials.<\/li>\n\n\n\n<li><strong>Identification of Parties (1033.411(b)(1)-(2), 1033.431(b))<\/strong>: The disclosure must clearly name the authorized third party, any data aggregator, and the data provider in a readily understandable format.<\/li>\n\n\n\n<li><strong>Purpose and Data Scope (1033.411(b)(3)-(4), 1033.211)<\/strong>: The disclosure must briefly describe the product\/service requested and specify the categories of data to be accessed.<\/li>\n\n\n\n<li><strong>Certification and Duration (1033.411(b)(6), 1033.421(b)(2)-(3))<\/strong>: The duration of data collection must be stated, with a maximum of one year before reauthorization is required.<\/li>\n\n\n\n<li><strong>Revocation Rights (1033.411(b)(7))<\/strong>: Users must be provided with a method to revoke consent that is as easy to use as the initial authorization.<\/li>\n\n\n\n<li><strong>Consent Management and Dashboards (1033.411(b)(7), 1033.431(c))<\/strong>: End users must be able to view, manage, and revoke their authorizations easily, with dashboards recommended for Data Providers, Data Recipients, and Data Access Platforms.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 39%\"><div class=\"wp-block-media-text__content\">\n<p>Trust, transparency, and clear communication are foundational to guiding the user journey in website design and development. These principles help users understand how their data is used, who has access to it, and for what purpose\u2014building confidence in the system and empowering users to make informed decisions. <\/p>\n\n\n\n<p>By providing clear, conspicuous disclosures, intuitive consent management, and accessible revocation options, designers ensure that users remain in control of their experiences and data. This approach not only streamlines interactions but also fosters lasting trust and satisfaction throughout the user journey.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2025\/06\/HandHoldingSun-168x300.jpg\" alt=\"hand holding sun - indicating good user experience\" class=\"wp-image-5256 size-medium lazyload\"\/><noscript><img fetchpriority=\"high\" decoding=\"async\" width=\"168\" height=\"300\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2025\/06\/HandHoldingSun-168x300.jpg\" alt=\"hand holding sun - indicating good user experience\" class=\"wp-image-5256 size-medium lazyload\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2025\/06\/HandHoldingSun-168x300.jpg 168w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2025\/06\/HandHoldingSun.webp 451w\" sizes=\"(max-width: 168px) 100vw, 168px\" \/><\/noscript><\/figure><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<h2><span style=\"color: #3366ff;\">Technical Implementation Highlights<\/span><\/h2>\n\n\n<p><strong>1. Consent Journeys and Processes<\/strong><\/p>\n\n\n\n<p>The guidelines break down the user experience into \u201cJourneys\u201d (e.g., granting, managing, or revoking consent) and \u201cProcesses\u201d (e.g., authentication, account selection). Each journey is mapped to CFPB 1033 requirements, ensuring that every user touchpoint is compliant and user-centric.<\/p>\n\n\n\n<p><strong>2. Authorization Disclosure<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Must include: names of all parties, product\/service description, data clusters (categories), duration, and revocation method.<\/li>\n\n\n\n<li>Must be clear, conspicuous, and available in the user\u2019s language, with links to English translation if needed.<\/li>\n\n\n\n<li>Electronic or written signature required for express informed consent.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Data Clusters and Scope<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data Clusters group related data elements (e.g., transactions, balances, account details).<\/li>\n\n\n\n<li>Only the data necessary for the stated business purpose should be requested and disclosed, in alignment with CFPB\u2019s data minimization principle.<\/li>\n\n\n\n<li>Standardized cluster names and descriptions promote consistency and user understanding.<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Consent Duration and Reauthorization<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Consent cannot exceed one year (1033.421(b)(2)). Reauthorization must be obtained at least annually.<\/li>\n\n\n\n<li>The expiration date must be displayed, and users must be notified prior to expiration.<\/li>\n<\/ul>\n\n\n\n<p><strong>5. Consent Management Dashboards<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dashboards should allow users to view which data, accounts, and third parties have access, and to revoke or reauthorize as needed.<\/li>\n\n\n\n<li>While not strictly required for Data Providers, dashboards are strongly recommended for all parties to support transparency and user control.<\/li>\n<\/ul>\n\n\n\n<p><strong>6. Revocation and Reauthorization Flows<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Revocation must be as easy as granting consent, with no cost or penalty.<\/li>\n\n\n\n<li>Any changes to the scope of consent require a new authorization disclosure and user consent.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-table is-style-regular\"><table><thead><tr><th class=\"has-text-align-center\" data-align=\"center\"><strong>FDX UX Guideline Area<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>CFPB 1033 Reference<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Implementation Example<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">Authorization Disclosure<\/td><td class=\"has-text-align-center\" data-align=\"center\">1033.411(a), (b)(1)-(4)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Clear, segregated consent screen with all required details<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Data Clusters &amp; Scope<\/td><td class=\"has-text-align-center\" data-align=\"center\">1033.211, 1033.411(b)(4)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Standardized data cluster selection in UI<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Consent Duration<\/td><td class=\"has-text-align-center\" data-align=\"center\">1033.411(b)(6), 1033.421<\/td><td class=\"has-text-align-center\" data-align=\"center\">Display of expiration date, annual reauthorization process<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Revocation Rights<\/td><td class=\"has-text-align-center\" data-align=\"center\">1033.411(b)(7)<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u201cRevoke access\u201d button in consent dashboard<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Consent Dashboards<\/td><td class=\"has-text-align-center\" data-align=\"center\">1033.411(b)(7), 1033.431<\/td><td class=\"has-text-align-center\" data-align=\"center\">Dashboard showing all active and past authorizations<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n\n\n<h2><span style=\"color: #3366ff;\">Conclusion<\/span><\/h2>\n\n\n<p>The FDX User Experience Guidelines are a practical, technical blueprint for building user data-sharing flows that are both best-in-class and CFPB 1033-compliant. By mapping every step of the user journey to specific regulatory requirements, FDX ensures that open finance implementations are not only secure and interoperable, but also empower consumers with real control and transparency over their financial data. <\/p>\n\n\n\n<p>For technical teams, aligning with these guidelines is not just about compliance\u2014it\u2019s about building trust and usability into the core of open finance. <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To learn more about the CFPB Section 1033 requirements for the Developer interface provisions, read my blog on the <a href=\"http:\/\/new-backbone-\" target=\"_blank\" rel=\"noopener\" title=\"Consensus Standard Data Format\">Consensus Standard Data Format<\/a> (CSDF).<\/li>\n\n\n\n<li>To read more about the Security Model of the FDX API V6.4.0 visit my blog article on the <a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/21\/future-of-secure-api-design-data-exchange-in-finance\/\" target=\"_blank\" rel=\"noopener\" title=\"Future of Secure API Design\">Future of Secure API Design<\/a>.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>References:<\/strong><\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/financialdataexchange.org\/FDX\/News\/Announcements\/FDX_Announces_Spring_2025_API_Release_6_4.aspx\">https:\/\/financialdataexchange.org\/FDX\/News\/Announcements\/FDX_Announces_Spring_2025_API_Release_6_4.aspx<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/financialdataexchange.org\/\">https:\/\/financialdataexchange.org<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/financialdataexchange.org\/common\/Uploaded%20files\/Intoduction%20To%20APIs%203212024_1120.pdf\">https:\/\/financialdataexchange.org\/common\/Uploaded%20files\/Intoduction%20To%20APIs%203212024_1120.pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.businesswire.com\/news\/home\/20210519005031\/en\/Financial-Data-Exchange-Releases-FDX-API-4.6\">https:\/\/www.businesswire.com\/news\/home\/20210519005031\/en\/Financial-Data-Exchange-Releases-FDX-API-4.6<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5201,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[20],"tags":[2575,2559,2574],"class_list":["post-5259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-standards","tag-2575","tag-api","tag-ux"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Online Trust: Most Excellent User Experience - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-06-22T22:35:07+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2025-09-06T17:32:15+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Online Trust: Most Excellent User Experience - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#blogposting\",\"name\":\"Online Trust: Most Excellent User Experience - CTIN\",\"headline\":\"Online Trust: Most Excellent User Experience\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/GlobalReach-RS.webp\",\"width\":1660,\"height\":803,\"caption\":\"abstract global map with IT images - user experience\"},\"datePublished\":\"2025-06-22T22:35:07+00:00\",\"dateModified\":\"2025-09-06T17:32:15+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#webpage\"},\"articleSection\":\"Standards, 1033, api, UX\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/standards\\\/#listItem\",\"name\":\"Standards\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/standards\\\/#listItem\",\"position\":4,\"name\":\"Standards\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/standards\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#listItem\",\"name\":\"Online Trust: Most Excellent User Experience\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#listItem\",\"position\":5,\"name\":\"Online Trust: Most Excellent User Experience\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/standards\\\/#listItem\",\"name\":\"Standards\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/\",\"name\":\"Online Trust: Most Excellent User Experience - CTIN\",\"description\":\"The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/GlobalReach-RS.webp\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#mainImage\",\"width\":1660,\"height\":803,\"caption\":\"abstract global map with IT images - user experience\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2025\\\/06\\\/22\\\/online-trust-most-excellent-user-experience\\\/#mainImage\"},\"datePublished\":\"2025-06-22T22:35:07+00:00\",\"dateModified\":\"2025-09-06T17:32:15+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Online Trust: Most Excellent User Experience - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Online Trust: Most Excellent User Experience - CTIN","description":"The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#blogposting","name":"Online Trust: Most Excellent User Experience - CTIN","headline":"Online Trust: Most Excellent User Experience","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2025\/06\/GlobalReach-RS.webp","width":1660,"height":803,"caption":"abstract global map with IT images - user experience"},"datePublished":"2025-06-22T22:35:07+00:00","dateModified":"2025-09-06T17:32:15+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#webpage"},"articleSection":"Standards, 1033, api, UX"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/#listItem","name":"Standards"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/#listItem","position":4,"name":"Standards","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#listItem","name":"Online Trust: Most Excellent User Experience"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#listItem","position":5,"name":"Online Trust: Most Excellent User Experience","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/#listItem","name":"Standards"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/","name":"Online Trust: Most Excellent User Experience - CTIN","description":"The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2025\/06\/GlobalReach-RS.webp","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#mainImage","width":1660,"height":803,"caption":"abstract global map with IT images - user experience"},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/#mainImage"},"datePublished":"2025-06-22T22:35:07+00:00","dateModified":"2025-09-06T17:32:15+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Online Trust: Most Excellent User Experience - CTIN","og:description":"The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2025-06-22T22:35:07+00:00","article:modified_time":"2025-09-06T17:32:15+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Online Trust: Most Excellent User Experience - CTIN","twitter:description":"The FDX User Experience Guidelines are designed to help technical teams deliver user-permissioned data sharing flows that are intuitive, transparent, and compliant with regulatory expectations. Developed by the FDX working group, these guidelines directly reflect requirements from the CFPB\u2019s Section 1033 rule, ensuring that user interface (UI) and user experience (UX) in open finance is","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"5259","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-09-06 17:51:11","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":"0","open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-06-22 21:59:52","updated":"2025-09-06 17:51:11"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/\" title=\"Standards\">Standards<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tOnline Trust: Most Excellent User Experience\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Standards","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/"},{"label":"Online Trust: Most Excellent User Experience","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2025\/06\/22\/online-trust-most-excellent-user-experience\/"}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/5259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=5259"}],"version-history":[{"count":17,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/5259\/revisions"}],"predecessor-version":[{"id":5321,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/5259\/revisions\/5321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/5201"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=5259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=5259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=5259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}