© State Services Commission, 2006 Authentication to access government services What might the future hold? Laurence Millar Deputy Commissioner Information.

Slides:



Advertisements
Similar presentations
Strengthening Your HR Capacity The Government of Canada Perspective
Advertisements

E-government mapping in Brazil Brazilian Court of Audit Cláudia Dias - August 2004.
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
IR Confidential & Proprietary Do Not Distribute Our Proposed IT Strategy (2006 – 2011) Developing Optimal IT Strategy Through Business Context, Applications,
Existing tools for cooperation – WG 2 1 Regional Policy Dialogue Capacity building seminars WORKING GROUP MEETINGS HIGH LEVEL SEMINAR SERIES 4 working.
National Infrastructure – Citizen’s Account
Achieving online trust through Mutual Authentication.
1 RXQ Ad Hoc Historical Usage Using a Registration Agent Process Flow Supplier Registration Agent Registration Agent sends Historical Usage Request.
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
A strategy for a Secure Information Society –
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
The Draft of Lithuanian Information Society Development Strategy for
1 The standardization challenge of E-Government After data... what? David Petraitis 5 June 2003 Workshop on challenges, perspectives and standardization.
Pacific Regional Digital Strategy II Suella Hansen & Noelle Jones Presentation for APT 28 April 2010.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
0 - 0.
1 Identification Who are you? How do I know you are who you say you are?
Project Appraisal Module 5 Session 6.
The Technology Premium: Finding Competitive Advantage June 2008 Lesley Price Head of Regeneration and Skills.
Taxpayers registration and e-services provided by the Estonian Tax and Customs Board Karin Aleksandrov Chief Expert Service Management Department.
1 Trade facilitation: Benefits and Capacity Building for Customs UNECE International Forum on Trade Facilitation, May 2003 Kunio Mikuriya Deputy.
Everyone can access. Contents Mer-links context The route of decision-making What is Mer-link? Lessons Learned.
TEEB Germany – a country study process at the interface of science and policy Christoph Schröter-Schlaack, Bernd Hansjürgens, Irene Ring, Aletta Bonn,
Goals of Workshop District Education Technology Plan Goals 8 goals aligned to State/National Education Technology Plans Strategies to meet challenges.
Creating and Capturing Customer Value
YES New Mexico Enterprise Eligibility System
“Building Capacity in Northern Communities” Strategic Plan (Draft Document) NOSDA Annual General Meeting April 9, 2013 Presentation by Michael.
Expert Group Meeting 2005 Centre for Spatial Data Infrastructures and Land Administration Department of Geomatics, The University of Melbourne SDI Requirements.
Work Integrated Learning ACDICT Learning and Teaching Network Forum, July 2010 Professor Chris Pilgrim Deputy Dean, Faculty of Information and Communication.
Take Charge of Your Finances
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Figures in Chapter 1. Learning objectives After studying this chapter, you should be able to; Define logistics and supply chain management. Describe logistics.
Barry Sandison Deputy Secretary, Health and Information Department of Human Services Data: creating value for service delivery.
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
Ms Joyce Tam, Principal Assistant Secretary for Information Technology and Broadcasting Presentation on “Developing an E-Government” to IIAC Members Thursday.
People Places Potential 1 Investing in people Transforming places Maximising potential
® NSTIC’s Effects on Privacy The Need to Balance Identity and Privacy- Protection with Market Forces in the National Strategy for Trusted Identities in.
HIT Policy Committee Federal Health IT Strategic Plan April 13, 2011 Jodi Daniel, ONC Seth Pazinski, ONC.
Digital public services and innovation
Click to edit Master title style Click to edit Master subtitle style Dr Andrew Trigg Head of Data Strategy HM Land Registry England & Wales
Federating Identity Management in the Government of Canada Identity North Conference November 20 th 2012 Presented by: Rita Whittle Senior Director, Cyber.
Proposed Whole of Government Direction for ICT Functional Leadership Workshop for monitoring departments 28 November 2013 John Roberts
supported by a local government initiative sharing nationally to improve services locally A-Z & Knowledge Base Project Sheila Apicella.
Welcome Bringing Clarity to Customer Service Business Support NVQs on the QCF.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Introduction Challenges of Managing in a Network Economy.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Chapter 6.  Identify the main elements of supply chain management and their relationship to the value chain and value networks  Assess the potential.
Privacy-Enhancing Identity Management – An Overview – Marit Hansen Independent Centre for Privacy Protection Schleswig-Holstein,
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Slide 6.1 Dave Chaffey, E-Business and E-Commerce Management, 4 th Edition, © Marketing Insights Limited 2009 Supply chain management Chapter 6.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Joined-up Government efficiency without “Big Brother” risks Fred Smith (Exposed) Fred Smith (Privacy Protected) Pseudonymisation.
Session 1. The context for the involvement of social landlords in tackling worklessness A profile of worklessness in social housing and an overview of.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
Identity and Access Management
Online Retailing The consumer is not primarily price-driven when shopping on the Internet but instead considers brand name, trust, reliability, delivery.
Tokens & Proofing De-Mystified
Bringing Clarity to Customer Service Business Support NVQs on the Framework Welcome 1.
Legal Framework for Civil Registration, Vital Statistics
ICT Functional Leadership Government Information Group
E-identities (and e-signatures)
Folkestone & Hythe District Council
Presentation transcript:

© State Services Commission, 2006 Authentication to access government services What might the future hold? Laurence Millar Deputy Commissioner Information and Communications Technology Privacy Issues Forum 30 March 2006

© State Services Commission, Agenda Strategic context Future for authentication Questions

© State Services Commission, NZ Digital Strategy New Zealand will be a world leader in using information and technology to realise its economic, social, environmental, and cultural goals, to the benefit of all its people.

© State Services Commission, E-government Strategy Goals By June 2007, networks and Internet technologies will be integral to the delivery of government information, services and processes. By June 2010, the operation of government will have been transformed through its use of the Internet.

© State Services Commission, Where We Are Today

© State Services Commission, Where We Want To Get To

© State Services Commission, Networked Goal Within Development Goals

© State Services Commission, Agenda Strategic context Future for authentication Questions

© State Services Commission, The Concept Of Authentication When people or businesses deal with government, they need to prove who they are to access some government services, for example when registering a company or looking at a persons medical records. Authentication is the process of confirming the identity of the person, to the required level of confidence. With the Internet becoming a mainstream channel for interacting, transacting and participating, online authentication has become a prerequisite for effective and efficient government worldwide.

© State Services Commission, Approach To Online Authentication Separate who a person is (identity) from what they do (activity). Excludes authorisation and role management. Name = Joe Bloggs Date of birth = 01/01/1970 Place of birth = Wellington Sex = male Mothers name = Bloggmom Username = joe, Password = joeblo22 Identity Verification Service (IVS) Government Logon Service (GLS)

© State Services Commission, IVS Overview An online, real time service that links an identity verification credential (IVC) with a strong GLS logon to verify the person is who they say they are Supports and enables a customer channel option (online) Identity is authoritatively verified to a passport-standard evidence of identity (EOI) IVS Design leverages: –Time, effort and expense of a passport application (and, subject to feasibility, citizenship and permanent residency) for both people and govt –Expertise, systems and resources of DIA, Identity Services –Authentication infrastructure –The Evidence of Identity Standard, as changes to the current EOI in Identity Services automatically flow through to the IVC

© State Services Commission, IVS Privacy Protection Implements core concept of separating identity from activity Based on Cabinet-approved principles, in particular opt-in Person initiates identity verification request and controls data release Uniqueness per agency or sector, no national identifier Minimum identity data stored No view of entitlement to agency services or transactions No additional identity data collected/stored People can self-audit usage online This is an additional channel, current offline methods will continue

© State Services Commission, IVS Benefits Provides people with additional means to verify their identity to agencies authoritatively at passport strength People who have been through one of the identified high quality Evidence of Identity process with government dont have to repeat it to receive an IVC Better ability for agencies and people to leverage the convenience of the online channel –e.g. support rural communities, overseas New Zealanders Ability to leverage the governments identity experts skills and knowledge to reduce identity fraud Tangible cost savings for agencies and government

© State Services Commission, Long Term Benefits Increased confidence and trust in using the online channel. People have the choice of using a common logon when transacting online with government. Cost-effective means for managing continuously evolving authentication technology changes and security threats. Better ability to tackle identity fraud. Benefits of governments collective size in delivering scale economies, expertise and adoption of best practices available to all agencies, irrespective of size –Includes integrity of evidence of identity process –Respect for privacy principles

© State Services Commission, Other potential services The authentication infrastructure is a secure, reliable and networked platform that can be leveraged economically by additional authentication services in the future.

© State Services Commission, Types Of Services Identification of services and their evaluation will start in July We expect two categories of all-of-government services: –Value Added Services Authentication of remote access, digital signatures, online payments, authentication of access parameters –Distributed Sources Of Authoritative Data Company identity from Ministry of Economic Development Partnership identity from Inland Revenue Department

© State Services Commission, Agenda Strategic context Future for authentication Questions