Legal Framework in Identity Systems T Koshy

Slides:



Advertisements
Similar presentations
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Advertisements

The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
United Nations Workshop on Principles and Recommendations for a Vital Statistics System, Revision 3, for African English-speaking countries Addis Ababa,
Regulation & Implementation of Mobile Internet Quality of Service: Role & Scope of Civil Society Organisations PRESENTATION BY: NEHA TOMAR, RESEARCH ASSOCIATE,
Sub-session 1B: General Overview of CRVS systems.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
2010 World Programme on Population and Housing Censuses Workshop on Civil Registration and Vital Statistics in the UNESCWA Region Cairo, Egypt, December.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
United Nations Workshop on Principles and Recommendations for a Vital Statistics System, Revision 3, for African English-speaking countries Addis Ababa,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
African Centre for Statistics United Nations Economic Commission for Africa Systemic, Institutional and Infrastructural Challenges in CRVS in the African.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Data protection as an integral part of OOP implementations: The Austrian approach Peter Kustor.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Agencija za zaštitu ličnih/osobnih podataka u Bosni i Hercegovini Агенција за заштиту личних података у Босни и Херцеговини Personal Data Protection Agency.
Module on Legal Frameworks CRVS eLearning course
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
Namibia: Civil Registration and Vital Statistics System
Register and change the address Iran's actions
Johannesburg, South Africa
ESign Aashutosh.
GDPR (General Data Protection Regulation)
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Brisbane Accord Group SESSION 4. legal framework in the Civil Registration, vital statistics and ID systems Civil Registration Process: Place, Time, Cost,
Issues of personal data protection in scientific research
Data Protection: EU & International
Athina Antoniou and Lilian Mitrou
Session 2: Institutional arrangements for energy statistics
Microsoft 365 Get help with regulatory compliance
General Data Protection Regulation
Civil Registration Process: Place, Time, Cost, Late Registration
Civil Registration Process: Place, Time, Cost, Late Registration
Information Governance and Data Privacy: A World of Risk
A strategy for improving CRVS in Lao PDR
Civil Registration Process: Place, Time, Cost, Late Registration
Bob Siegel President Privacy Ref, Inc.
Civil Registration Process: Place, Time, Cost, Late Registration
Program Strategy and Implementation Plan
Erica Westenberg September 28, 2017
Law on Family Registration (Amended 2017)
ESF Monitoring & Evaluation and Data Protection in Spain
Civil Registration Process: Place, Time, Cost, Late Registration
Civil Registration Process: Place, Time, Cost, Late Registration
Legal Framework for Civil Registration, Vital Statistics
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
Civil Registration Process: Place, Time, Cost, Late Registration
Scanning the environment: The global perspective on the integration of non-traditional data sources, administrative data and geospatial information Sub-regional.
Sub-regional workshop on integration of administrative data, big data
The role of the ECCP (1) The involvement of all relevant stakeholders – public authorities, economic and social partners and civil society bodies – at.
Civil Registration Process: Place, Time, Cost, Late Registration
Digital ID in Asia and the Pacific
Data transfers to non-EU countries under the new GDPR
Importance of Law and Policies in the Environmental Management System
Operationalizing Export Certification and Regionalization Programmes
Is Data Protection a Fundamental Right Protecting the Individual?
Outline What is governance and what does it comprise?
REGIONAL NETWORK FOR CIVIL ORGANIZATIONS ON MIGRATION – RNCOM
CRVS Legal and Regulatory Review Tools and Methodology Ashley Frederes Technical Advisor Bangkok, 30 January 2019.
Civil Registration Process: Place, Time, Cost, Late Registration
Overview of the recommendations regarding approximation of the Law on personal data protection to the new EU General data protection regulation Valerija.
United Nations Statistics Division
Outline Background: development of the Commission’s position
Student Data Privacy: National Trends and Wyoming’s Role
Functioning of the vital statistics system
Introduction to key terms and concepts of legal identity
FIJI Kamni Naidu and Shivendra Deo
Presentation transcript:

Legal Framework in Identity Systems T Koshy 17th July 2017

Setting the Context CRVS Identity Management Registration & Certification of Vital Events Measuring Characteristics and Trends Identity Management Establishing Identity Authentication for Service Delivery

Identity Management Clear Focus Use of Biometrics Channel for Collection, Verification & Transmission Personal Data Central Electronic ID repository Authentication for Service Delivery Value Added Services through ID platform E Sign E Stamping Digital Locker

Identity Management Ecosytem Build e-ID Building on e-ID Building around e-ID Build e-ID Building on e-ID Building around e-ID Establishing infrastructure to provide every resident a unique identity Interfacing ID systems to service delivery (government and private sector enterprise) to improve efficiencies and reduce leakages Deploying an innovation ecosystem around the ID and bring about transformation of governance and industry e-ID aids in overcoming challenges faced by the governments in providing effective and efficient service delivery

Principles of Identification for Sustainable Development 1 Inclusion Universal Coverage and Accessibility 2 Design Robust, Secure, Responsive, Interoperable identity platform, Technology neutrality and Operational sustainability 3 Governance Safeguarding data privacy, security, and user rights; Institutional accountability and Independent oversight and grievance management Source: Principles of Identification for Sustainable Development: Towards the Digital Age

Key Design Principles for a Legal Framework 1 2 3 Accountability OECD Principles: Collection Limitation Principle, Data Quality Principle, Purpose Specification Principle, Use Limitation Principle, Security Safeguards Principle, Openness Principle, Individual Participation Principle, Accountability Principle Data Ownership Data Governance A strong legal framework provides the basis for a robust legal environment that promotes trust in the design, implementation and use of unique ID in a country

Accountability Communication Framework and Transparency Citizens/Legal Residents Ensuring accountability through Clearly defined rules for data collection, compilation and storage Enforce Compliance to stated rules and procedure for collection, compilation and storage of data A robust communication framework; governed by rules on data sharing amongst parties (data owner, holder and consumer); Data Owner Institutions & Agencies that collect/store enrolment data Data Holder Data protection entails protecting of data during the following stages: Collection (Registration), storage, usage, sharing and disposal Information being collected should always be treated as potentially valuable for others. Designers of program should consider who would monitor the compliance of data protection within the program, whether there is a monitoring body for each social program linked to the identity program or individuals need to submit their complaints to the national identity body. Private/Public organizations which uses the data for service fulfilment Data Consumer Specify Responsibility and Ensure Accountability of stakeholders

Accountability Legislative Provisions Adequate safeguards and penalties for identity impersonation at the time of enrolment Adequate safeguards and penalties against unauthorized data access and usage Penalties for non-compliance with authorized disclosure requirements Clear expectations & penalties for mandated service commitments Adequate protocols for data breach notifications and actions by stakeholders A specific oversight mechanism within the program should address the data protection issues. Such mechanism should not only comply with the minimum requirements related to due process guarantees but should also have the mandate to order deletion or rectification of data as well as other form of repartitions. Clearly articulated penal provisions ensure adequate safeguards against non- compliance to on data privacy and disclosure

Data Ownership Consent Architecture The access to any identity–linked data is the prerogative of the individual There should be no blanket consent for public use, around the information provided as a part of the enrolment procedure “Function creep” should be prevented by ensuring that data collected for one purpose is not used for another without prior consent Access to one’s own personal data-without constraint and without any delays or expenses Information on categories being processed Purpose of processing Who is receiving it Logic involved in processing Example of Right to Information Act- oversight on government-private contracts… An effective legal framework for managing national identities should be based on the principles of purpose and prior informed consent

Data Governance Protection of Personally Identified Information (PII) Personal data is defined as any information relating to an identified or identifiable natural person (‘data subject’) – Article (2a), convention (108) Protection of personal data- United Nations Guidelines for the Regulation of Computerized Personal Data Files, OECD guidelines on the protection of privacy and trans border flow of personal data, Council of Europe’s convention for the protection of individuals with regard to Automatic Processing of Personal Data (Convention 108) Legal framework will encompass the following: Constitution of a country: does the constitution guarantee right to privacy/and or data protection? Right to a remedy in the constitution? Independent oversight body established by the constitution Internationally legally binding treaties Other laws/regulations/policies/guidelines specific to a country, Individual privacy rights to protect individuals, permit them to access their personal information and wherever necessary , to challenge/correct inaccuracies

Elements of Legal Framework for National Identity Incorporation of the right legislative principles and information protection protocols should culminate in the articulation of a clear and effective National Act for Identity, with adequate constitutional validity to enforce the stated provisions.

Linkages between CRVS and National ID law Circular and dynamic linkages for universal coverage Legislative provisions for data transmission and storage Legal requirement of CR certificate/s as breeder document/s As both civil register and national identity system deal with citizen data which comprises of PII…common design principles for legal frameworks come into play Civil registration provides critical entry into the identity management system. ID management system adds layers of additional and relevant information, as per the law; including photograph, fingerprints, and other biometrics. Civil Registration Law essentially comprises of : (Source: Outline Legal CRVS document) General provisions, civil registration infrastructure, sphere of competence, roles and responsibilities of registrars, regn. Of birth, death, marriage, divorce, amendment of records, data privacy and confidentiality including collection and transmission of records, procedures and protocols for collecting and transmitting statistical information (vital stats), procedures and protocols for submitting records to the population register and identity management agency, citizen’s compliance and remedies, inspection and penalties and Funding of the civil registration system and operations A legal framework conducive to a centralized organization can facilitate communication between information systems and enables nationwide harmonization of registration and data standards

Thank You