Internet Governance in Nigeria:

Slides:



Advertisements
Similar presentations
The World Intellectual Property Organization (WIPO)
Advertisements

© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
IBM’s Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Mobile Technology And Cyber Security K. N. ATUAHENE Director, Domestic Trade and Distribution Ministry of Trade and Industry.
6th MSDI Working Group Meeting
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Page 1 ©2000 Bull Major Challenges in e-Government Value System in modern IS’s for Public services Claude Boulle, European Affairs FP 6 Consultation Meeting.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
ISO Energy Management System Certification
LEVERAGING THE ENTERPRISE INFORMATION ENVIRONMENT Louise Edmonds Senior Manager Information Management ACT Health.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
Recommendation of the OECD Council for enhanced access and more effective use of public sector information 11 th Meeting of the PSI Group European Commission.
The Porvoo Group Tapio Aaltonen Director, CA-services, co- chair Porvoo Group Population Register Centre Finland.
World summit on the information society 1 WSIS: Internet Governance President of the WSIS Phase II Preparatory Committee Ambassador Janis Karklins April.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
…Providing Assured Identity By Barr. Chris ‘E Onyemenam Director General / CEO, NIMC 18 th November, 18 th November, 2015 National e-ID Card for Credible.
Back office integration for better E-government services Crossroads Bank for Social Security Frank Robben General manager Crossroads Bank for Social Security.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
WORLD SUMMIT ON INFORMATION SOCIETY The Internet Governance Issue in the Tunis Agenda ---- Ridha Guellouz African Preparatory Meeting for the Internet.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
“DEVELOPMENT OF A NATIONAL ICT POLICY ICT Policy in the ECTEL Member States Mr. Donnie Defreitas MSc, (Hav.), ECTEL Caribbean Internet Forum Bay Gardens.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
UNGGIM – PRIVATE SECTOR NETWORK. AGENDA > OVERVIEW OF PRIVATE SECTOR >PURPOSE AND VISION OF PRIVATE SECTOR NETWORK > STRUCTURE AND TERMS OF REFERENCE.
The NIMS and the Financial Sector In Nigeria By Barr. Chris ‘E Onyemenam Presentation at the 2 ND International Conference on Due Diligence Organized by.
Smart Data infrastructure
Identity and Access Management
A policy framework for an open and trusted Internet
Proposed Strategic Plan for NITDA ( )
Lee Hibbard Council of Europe / EuroDIG
A Shift in the Data Security Paradigm
Government of Jamaica GovNet Jamaica Initiative
Smart Cities: What’s in it for the consumer?
Paperless & Cashless Poland Program overview
Federated IdM Across Heterogeneous Clouding Environment
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Unique Identification Number Project
Module 8: Securing Network Traffic by Using IPSec and Certificates
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Standards for success in city IT and construction projects
An Overview of MPEG-21 Cory McKay.
National Cyber Strategy Preparedness: 8 Preparatory Questions
Why the Multistakeholder Approach Works
Internet Interconnection
An Industry Perspective Nicole Denjoy COCIR Secretary General
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Legal Framework for Civil Registration, Vital Statistics
The Role of Bilateral Donors in supporting capacity-building in the area of ICT Open Consultations on Financing Mechanisms for Meeting the Challenges.
United Nations Statistics Division
Module 8: Securing Network Traffic by Using IPSec and Certificates
Expert Group Meeting on SDG Economic Indicators in Africa
Reinhard Scholl, GTSC-7 Chairman
HLN Consulting, LLC® November 8, 2006
E-identities (and e-signatures)
The State of Data: Evaluating BIG DATA & its Impact
OU BATTLECARD: Oracle Identity Management Training
Presentation to Portfolio Committee Department of Home Affairs
Presentation transcript:

Internet Governance in Nigeria: NIMC Creating and Managing a Secure Database DG NIMC Engr. Aliyu A. Aziz

Internet Governance Has been defined as: “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet.” or “A Limited set of policy issues associated with the global synchronization and management of domain names and IP addresses to Combined ideas around the management of the technical resources necessary for its stability and discussion around behaviours emerging from the use of the Internet”.

Issues of Internet Governance The principal issues of Internet governance, significant today are; the introduction and deployment of IPv6; the management of the national ccTLD; the development of broadband infrastructure; cybersecurity; human rights online and freedom of expression; and Issues of access and availability. country code top-level domain (ccTLD)

Summary Issues of Internet Governance Domain Name System Security Extensions (DNSSEC) Internet Exchange Point (IXP) is a physical infrastructure that allows several Internet Service Providers (ISPs) and network operators to exchange traffic between their networks, generally referred to as autonomous systems  Business Process Outsourcing (BPO)

Stakeholders in national internet governance There are five main stakeholder groups within an Internet governance environment. These are: government and official agencies; the private sector; the Internet technical and professional community; civil society; and users, consumers and the wider community of citizens, present and future.

Government as a Stakeholder The Internet has significance in government for several reasons: It has wide-ranging political importance within national social and economic development. It has specific sectoral significance, concerned with the management of the ICT sector itself. It has implications for national security. It has wide-ranging significance for the delivery of government services, particularly through e-government, in the education sector and in areas such as trade facilitation. Different entities within government have responsibilities in these different areas, and together make up a wide range of interested stakeholders. NIMCs contribution to internet governance is to provide assured identities for national security, social and economic development via the establishment of the one true database an identity of citizens of Nigeria.

NIMC: Creating and Managing a Secure Database To bring about effective and lasting change in governance of our nation, National Identity Management is centred not only on national security but also on the issue of citizenship and entitlement to services. Socio- economic and cultural change is slowly taking roots in Nigeria today, and a National Identity management System (NIMS) seeks to harmonise all existing identity system into one key, secure national database. NIMC was setup to collect basic demographic and biometric data; create operate and manage a National Identity Database; provide unique identification for the citizens of Nigeria; provide on-line/off-line cost effective verification and authentication infrastructure in Nigeria; Foster the development of an identity sector in Nigeria as well as be integrated with existing ID schemes.

Authentication/Identification Identity Assurance A common challenge in Nigeria today is Identity Verification. Identity Management is evolving and NIMC is adapting to these changes. Globally, Biometric Identity assurance requirements are evolving; From To Authentication/Identification Identity Assurance One project at a time An infrastructure for multiple systems Engineering/Technology Led Business Process and Change Mgt Led Client-Server based Service-Oriented Architectures Fingerprint-centric Multi-Biometric Single Vendor COTS based, Multi-Vendor Framework Commercial Of The Shelf (COTS) Compliance Compliance plus Adaptability Biometric matching performance Enterprise Systems Performance Proprietary Standards-based with interoperability Disparate Federated

Establishing A Single Version of Truth Before NIMS With NIMS Int. Passport Driver‘s License Driver‘s License Passport Passport 8 Police (security) Pension Police Pension Phone (SIM) 14298374042 Phone (SIM) Health Care Health Care Banking Voters Card Banking (Finance/commerce) Voters Card - Ghost Identities - Multiple Identities - Duplicate Identities

Creating the National Identity Database and NIMS Overview

Acquisition of Personal Information data

National Identity Database Records of “All Nigerians” and “Legal Residents” in a single accessible database. Will be integrated to other databases through the NIN One person one unique number (NIN) for life. Never ever reused: Your NIN is yours for ever, alive and in death Updates and changes to data easy, possible and tracked NIN: NNNNNNNNNN

NIMS and the Harmonization mandate (NIN)

Verification OFFLINE ONLINE

National Identity (smart) Cards

NIIMC Integrated Network

NOTES: The use of ICTs is essential to the sustenance of the database creation, management and its use in the delivery of government services. The National Identity Database is securely managed; consistency and confidentiality is maintained; and regular data security audits are carried out according to global industry standards. (ISO 27001:2013, and PCI-DSS certified) Having a secure and harmonised database is a mechanism used by most civilised and advanced societies to ensure security and safeguard the socio- economic system. The National Identity Database can be used to check anti-social tendencies like internet fraud/cyber crime, theft, terrorism and the likes. An efficient security identity system can be used as a planning tool for any government, and this system of identity and data management needs to be maintained. Benefits include; The authorities can effectively integrate and manage all data flow systems including bank details, driver’s license systems, employment and job creation data, population data and most importantly an effective security identity platform for all Internet Governance shapes the development objectives ensuring frameworks that ensure that the Internet delivers social and economic benefits necessary in improving the livelihoods of its users While the database can be used to achieve socio economic benefits, we are not ignorant of the fact that the Internet and digital economy brings with it the attendant challenges of cybercrime and breaches in cybersecurity.

“The benefits of increased connectivity and Internet access come with the attendant challenges of cybercrime and privacy concerns NIMC provides assured identity” QUESTIONS?

THANK YOU www.nimc.gov.ng