EURIM Personal Identity Group Data Sharing Model for Public Services 13 th January 2005 Jim Lound © Experian Ltd 2005.

Slides:



Advertisements
Similar presentations
Barhale Procedure for Site Establishment
Advertisements

Department of Defense FOIA Website Compliance March 6, 2008 Internet Requirements Internet Requirements.
© Fujitsu Services 2004 EURIM PI Data Sharing sub- group 13 January 2005 EURIM PI Group Data sharing in practice A Fujitsu Perspective John Newton Account.
Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
EURIM Personal Identity Forum Data Sharing 28 th October 2004.
Care and support planning Care Act Outline of content  Introduction Introduction  Production of the plan Production of the plan  Planning for.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 18 SLIDE Credit Fundamentals Cost of Credit.
© 2009 Experian Limited. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
TEQSA Registration and Material Change Processes Senior Management Summit 15 February 2012 Professor Merran Evans, Pro Vice-Chancellor, Planning and Quality.
SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
Recordkeeping & Accounting
Umbrella Corp Practica 9 – English Group E-commerce Resources.
© 2008 Prentice Hall11-1 Introduction to Project Management Chapter 11 Managing Project Execution Information Systems Project Management: A Process and.
Project Execution.
Marketing Solution. Oriel TM. What is Oriel TM ? Oriel TM Is a Direct Marketing solution that enables addresses to be used for E - Campaigns.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
Fusion5 Empower-HR – SuperStream Sandy Duncan – HCM Development Manager Christine Hudson – HCM Customer Centre Manager.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
ENTERPRISE DATA INTEGRATION APPLICATION ARCHITECTURE COMMITTEE OCTOBER 8, Year Strategic Initiatives.
Payment Center Self Enrollment and Making a Payment Employee Paid (Individual Liability) Travel Card January 2009.
การจัดการช่องทางการจัดจำหน่าย Distribution Channel Management
National Infrastructure Tina Yule Technical Assurance Co-ordinator 21 st Century Government Unit.
SCONUL Access Contacts’ meeting: website report Wayne Connolly 3 July 2013.
Wisconsin Land Information Association Presentation March 4, 2004.
Lecture 11 Managing Project Execution. Project Execution The phase of a project in which work towards direct achievement of the project’s objectives and.
D5240 Document Retention System 8/20/ District 5240 The Rotary Foundation Grants Document Retention System Rotary Year
Electronic Signatures in the SFA Loan Programs Electronic P-Notes Presented by Jeff Baker & Kay Jacks.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Inspection Directions: An EMS Approach to Inspecting for Section 608 and 609 Compliance.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Managing Change 1. Why Do Requirements Change?  External Factors – those change agents over which the project team has little or no control.  Internal.
Doc.: IEEE /0099r0 Submission Sept Slide 1 Geo-location Database Issues of CEPT Date: Authors: Notice: This document has been.
National Enrolment Service (NES) Overview October 2015 – June 2016.
Key Performance Area (Optional) Performance Criteria Considerations 1. Major Concerns 2. Minor Concerns 3. Meeting Expectations 4. Exceeding Expectations.
Credit Cards. When thinking of getting a Credit Card follow the Three C’s: Character: Will you repay the debt? How you used credit before? Do you pay.
StagesOf Assessment Stages Of Assessment. The Stages of Assessment for the Single Assessment Process §Publishing information about services. §Completing.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Commodities Exchange Act Market Participant Criteria and Attestation Mark Ruane ERCOT Vice President of Credit and Enterprise Risk Management CWG/MCWG.
Oracle E-Business Suite R12.1 Accounts Payables Partner Boot Camp Training Courseware Part VIII – Transaction Taxes in Payables.
Fall 2006CS 395: Computer Security1 Key Management.
1 of 26 For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential.
Chapter 8: Developing Channel and Logistics Strategy The Marketing Plan Handbook Fourth Edition Marian Burk Wood 8-1.
The Points Based System Sponsorship Responsibilities Employer’s Obligations Cheryl Pellew.
Linking PayPal with your Online UK Business Account © 2016 Extra Direct (UK) Ltd PLEASE NOTE: This document is protected under Copyright. All rights reserved.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
4. Exceeding Expectations
StudentTranscripts Service Overview
Florida Information Protection Act of 2014 (FIPA)
Project Management Managing Project Execution
4. Exceeding Expectations
Own Your Identity.
Florida Information Protection Act of 2014 (FIPA)
EDI – Information The presentation includes information on:
StudentTranscripts Service Overview
StudentTranscripts Service Overview
Sabrina Iavarone Senior User Services Officer
re:SearchTX - Providing Clarity
Own Your Identity.
© 2015 Railinc. All rights reserved.
StudentTranscripts Service Overview
Bringing technology and leadership together.
StudentTranscripts Service Overview
Operationalizing Export Certification and Regionalization Programmes
StudentTranscripts Service Overview
Banking What is a bank? Banks are financial institutions that accept deposits from customers and lend money. These entities are for profit. What is a.
Implementation Business Case
You can trade paper delivery for speed, convenience, and accuracy, by issuing cases electronically via our EPD process PLAG (03.19) For Financial.
Contract Requirements for Suppliers
Presentation transcript:

EURIM Personal Identity Group Data Sharing Model for Public Services 13 th January 2005 Jim Lound © Experian Ltd 2005

Provider of services Individual Product / Service requests FOI requests Initiating the contact © Experian Ltd 2005

Provider of services Individual Proactively servicing the customer Initiating the contact © Experian Ltd 2005

Provider of services Own Data Reactive data sharing prompted by Service Provider Data acquisition Data Owner © Experian Ltd 2005

Provider of services Own Data Proactive data sharing prompted by changes to circumstances Own Data Data Owner Data acquisition © Experian Ltd 2005

Other Service Providers Potential huge demand Own Data Data Owner Contention © Experian Ltd 2005

Trusted Intermediary Provider of services Data Owner Partner Data Data Owner Trusted Intermediary - Single Interface © Experian Ltd 2005

Trusted Intermediary Individual Data Owner Trusted Intermediary - Single Interface © Experian Ltd 2005

Trusted Intermediary Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access © Experian Ltd 2005

Trusted Intermediary Service Provider & Partner Data Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access Copy Database Feed of updated records Real Time Access © Experian Ltd 2005

Trusted Intermediary Service Provider & Partner Data Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access Copy Database Feed of updated records Third Party Data In-houseExternal Data Real Time Access Real Time Access © Experian Ltd 2005

Trusted Intermediary Service Provider & Partner Data Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access Copy Database Feed of updated records Third Party Service Providers Third Party Data Real Time Access In-houseExternal Data Real Time Access e.g. Nat. ID Card verification Real Time Access © Experian Ltd 2005

Trusted Intermediary Service Provider & Partner Data Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access Copy Database Feed of updated records Third Party Service Providers Third Party Data Added Value Services Real Time Access In-houseExternal Data Real Time Access e.g. Nat. ID Card verification Real Time Access Real Time Access © Experian Ltd 2005

Key considerations Benefits to the citizen Benefits to the citizen Trust Trust Data quality Data quality Governance Governance Infrastructure Infrastructure Data Protection Data Protection Legislation Legislation © Experian Ltd 2005

Benefits to the individual – why are we doing this? Quicker service Reduce the need to supply documents Contribution towards identity checking Contribution towards service eligibility assessment More convenient distribution channels Ability to take advantage of cost reductions reflected in pricing Proactive service offerings © Experian Ltd 2005

Trust Trusted Intermediary Provider of services Individual © Experian Ltd 2005

Data Quality Accuracy Up to date Complete Formats Effective name and address matching routines © Experian Ltd 2005

Governance Membership - managing   Data quality - policing   Contribution - controlling level of data accessed   Purpose - controlling amount of data accessed   Citizen access   Individual’s right to look at their data   Individual’s right to know who has accessed their data. © Experian Ltd 2005

Infrastructure Minimise the financial risk - data contributors   Undertake the quality control processes   Receive, manage and maintain the shared data   Manage the day to day operations   Add value to the data   Provide electronic access to the data being shared   Support a range of distribution channels & technologies © Experian Ltd 2005

Infrastructure (cont.) Support the demands of response times   Facilitate the assessment of the levels of trust   Provide proactive notifications to individuals Provide individuals with access to their data © Experian Ltd 2005

Data Protection Issues A key issue will be to establish an acceptable and compliant method of allowing the appropriate data for sharing to be ‘in place' prior to consent in order to allow the data to be immediately released when consent is given. © Experian Ltd 2005

Legislation In areas affected, remove legislative constraints that currently prevent individuals from initiating data sharing through their express consent © Experian Ltd 2005