Document verification and identity management

Slides:



Advertisements
Similar presentations
Identity Management: Is an Identity Card the Solution in Australia? Presentation to RSNA Conference The Social Implications of Information Security Measures.
Advertisements

The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Janice Kephart Director of National Security Policy, Center for Immigration Studies Heritage Foundation July 14, 2009.
New Products for the Public Sector The products that will change your work life Presented by: Derek O’Halloran Date: 14 th June 2007.
Tim Moss Director of Corporate Strategy Presentation  Overview of Companies House  Fraud facts and Figures  Current Work  Prevention  Future Actions.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Identity Theft Stefany K. Watson Brandon K. Mosley.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft By:Annalee Vanfossen. What is Identity theft? Faking someone’s identity who is not yours Trying to achieve something while using fake identification.
 Prepared by: Noor Elfi Aziani Bt Noor Azmi Noor Shafika Bt Mohamad Nazer e-safety.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Ethics What is it, why is it relevant to HCI, why is it important?
The Health and Social Services Access Card: What will it mean for Australians? Financial Literacy, Banking and Identity Conference 25th and 26th October.
Facts, Issues, and Considerations 7 May 2008 Steven Barnett Identity Theft.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Spoofing Rafael Sabino 10/28/2004. Introduction What is spoofing? Context and Security relevant decisions Phishing Web spoofing Remedies.
Automatic Fingerprint Identification System Purpose Fingerprinting Process Applications Cost Issues Future National ID Card.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DL/ID Card Design Specification Responsible Retailing Forum Rich Carter (AAMVA) 2004 Responsible Retailing Forum The Next Generation of State IDs.
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Identity theft By: Blake D uncan.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Scams & Schemes Common Sense Media.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Electronic authentication: validating and verifying customer identities and bank details Presented by: Stan Matthews & Scott Robertson 13 th November 2007.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
E - ENTERPRISE PUAN NORIDAH BINTI ABU BAKAR CSC 434 SITI NADHRAH BINTI OTHMAN SPORT SCIENCE AND RECREATION /SR223 E – Enterprise is about business conducted.
21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Your Identity, My Free Cable Tilisha Gaston. Overview If you are a victim of fraud you will know how to resolve Anyone can be a victim of fraud How to.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Identity Theft The Nation’s Fastest Growing Crime.
Identity Theft By: Michael Jones and Sarah Trent.
Identity Theft How it happens and how to avoid it.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Identity Theft One of America's fastest growing crimes.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Jeff loses his identity! Lesson 5: Identity Theft.
The Solution SSIVS.
Identity Theft It’s a crime!
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
Add video notes to lecture
FREE AND UNIVERSAL RIGHT Presented by Susan Cook July 23,2016
Raihana Ferdous, Vallipuram Muthukkumarasamy
Biometric Security Fujitsu Palm Vein Technology
JP Morgan spends $500 million per year on cyber security
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Protecting Your Identity
Don’t Get Scammed on Your Way to College and Avoiding Identity Theft
Clemson University Red Flags Rule Training
Other Crimes: Abduction, Theft, Robbery, Arson, Fraud, Firearms… and Other Crimes That Require Less Explanation.
Presentation transcript:

Document verification and identity management Anna Johnston Chair, Australian Privacy Foundation Document verification and identity management Safeguarding Australia 2005 12 July 2005, Canberra

Risks of centralised identity models makes identity fraud / theft easier only need to hack one database, or bribe one person, or forge one document false sense of security remedying identity theft much harder for the victim plus privacy risks!

DVS : what we know aims to tackle problem of fake foundation documents strengths: allows dispersed identity model ‘blind’ system, no data retained limitations: won’t deal with ‘real’ foundation documents obtained fraudulently

DVS : what we don’t know cost of problem intended to fix? cost of strategy (including DVS)? will it be effective? on what types of identity fraud? what other options are there? what might undermine the strategy?

UK examples of costs cost of identity fraud est. £1.3 billion pa approx £35 million pa to be eliminated by national ID card LSE estimates cost of national ID card at between £10.6 billion and £19.2 billion solution costs much more than problem

Are we all on board? Medicare smartcard risks becoming a de facto national ID card NSW combined driver & non-driver photo ID card - unique and universal identifier Various State & Federal proposals increase risk of identity fraud because of centralised identity models