The Health and Social Services Access Card: What will it mean for Australians? Financial Literacy, Banking and Identity Conference 25th and 26th October.

Slides:



Advertisements
Similar presentations
ISE Cards India Limited is specializing in delivering secure personalization of identification documents and cards solutions. The company has established.
Advertisements

Identity Management: Is an Identity Card the Solution in Australia? Presentation to RSNA Conference The Social Implications of Information Security Measures.
GST and financial services (the New Zealand experience) Marie Pallot Policy Advice Division Inland Revenue New Zealand.
The Care Act 2015 Manchester Carers Forum / Gaddum Centre
Confidentiality and HIPAA
HIPAA Privacy Rule Training
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
LLL - Supporting Lutheran Schools Last updated: January 2014.
Registrar experiences with WHOIS Bruce Tonkin Melbourne IT Ltd.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
LLL Congregation Presentation Last updated: January 2014.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
SOUND MIND LEADS TO SAFE BANKING. KNOW YOUR CUSTOMER KNOW YOUR CUSTOMER.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
FERPA and IRB: Implications for Testing Centers Judith W. Grant, Ph.D.,CIP NCTA Conference San Antonio, Texas August 6, 2009.
Consumers Online: Privacy, Security and Identity Professor Margaret Jackson and Marita Shelly Presentation to the RMIT Financial Literacy, Banking & Identity.
Use of Children as Research Subjects What information should be provided for an FP7 ethical review?
Managing Personal Information - Australian Companies Outsourcing to India and the Philippines Professor Margaret Jackson and Marita Shelly.
HIPAA COMPLIANCE FANTASTIC FOUR CASEY FORD MANINDER SINGH RANGER OLSOM Information Security in Real Business.
2/16/2010 The Family Educational Records and Privacy Act.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
The Social Context of the Security of Internet Banking By Supriya Singh RMIT University/SITCRC Paper.
Moving toward universal coverage: the impact of different reform alternatives on equity in financing and utilization of health care in South Africa JE.
Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
1 Consent for treatment A summary guide for health practitioners about obtaining consent for treatment Bridie Woolnough Resolution Officer Health Care.
1 The importance of credit bureau and need of legal framework for it LITHUANIA.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
Non-immigration Applications for Incorporation into the Smart ID Card Information Technology and Broadcasting Bureau 20 December 2001.
Identity verification in the private sector Chris Gration 30 March 2006.
+ Privacy in the Information Age Year 12, 2012 Lesson 3 January
The Application of the Concept of Uniqueness for Creating Public Use Microdata Files Jay J. Kim, U.S. National Center for Health Statistics Dong M. Jeong,
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Data Protection Act AS Module Heathcote Ch. 12.
1 How to Read a Medicare Summary Notice Updated August 2014.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
1 End-Year Review and Outlook for 2001 David Carse Deputy Chief Executive Hong Kong Monetary Authority 22 January 2001.
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Writing Proposals Nayda G. Santiago Capstone CpE Jan 26, 2009.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
AHIA ANNUAL CONFERENCE 2006 INDUSTRY VIEWS ON THE IMPLEMENTATION OF BROADER HEALTH COVER : A PRIVATE HOSPITAL VIEW CHRISTINE A GEE NATIONAL PRESIDENT AUSTRALIAN.
RULES GOVERNING PRIVATE MEMBERS’ LEGISLATIVE PROPOSALS Presentation by NA Table to Committee on Private Members’ Legislative Proposals and Special Petitions.
1 SOUTH AFRICAN AIRWAYS BILL, 2006 Select Committee on Labour and Public Enterprises, Cape Town 14 November 2006.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Core Topic 11 Documentation, record keeping and reporting.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Understanding Privacy An Overview of our Responsibilities.
Health and Social Care Vetting and Barring Scheme (VBS) Review of the Scheme.
Understanding Privacy An Overview of our Responsibilities.
HIPAA Privacy Rule Training
Documenting Life in the UK
Debriefing Study Visit in Thailand (6-9 Oct 2014)
Data Protection Act.
Document verification and identity management
TFN’s & ABN’s.
Presentation heading (one or two lines)
Data Protection Legislation
Changes to Exempt Categories
Legal Framework for Civil Registration, Vital Statistics
ISE CARDS INDIA LIMITED
E-identities (and e-signatures)
Presentation transcript:

The Health and Social Services Access Card: What will it mean for Australians? Financial Literacy, Banking and Identity Conference 25th and 26th October 2006 RMIT University, Melbourne Presentation to RSNA Conference The Social Implications of Information Security Measures on Citizens and Business Margaret Jackson and Julian Ligertwood May 2006

Company OverviewSlide 2 Introduction Our paper examines:  the reasons behind the government’s decision to proceed with the Access card as well as the features that it will contain  various criticisms in relation to the card, including the proposed purpose of the card, the administrative scheme, and the adequacy of privacy protection  whether the Access card represents a de facto national identity card

Company OverviewSlide 3 The Medicare Card The government heath care insurance scheme was first known as Medibank when introduced in 1974, and then as Medicare after the scheme was amended in 1983 All Australian adults are issued with a card which contains a unique number, a name and an expiry date As at June 2005, there were 20.5 million people enrolled in Medicare and 11.4 million ‘active’ cards (Medicare 2006) There are two separate databases linked to the Medicare card, one dealing with Medicare claims and the other with PBS claims. These databases are required to be kept separate but privacy guidelines state the limited ways in which these databases can be accessed by government departments (OFPC 2006)

Company OverviewSlide 4 The Medicare Smart Card A Medicare smartcard was launched in July 2004 as part of the Government’s ‘commitment to using better information to deliver better quality health services The smartcard has the same physical appearance as the Medicare card and holds the same information with the optional choice of including a digital photo which is stored on the chip and is not visible on the card The smartcard was trialled in Tasmania and was intended to be made available to the rest of Australia in line with the HealthConnect initiative, however, on 25 May 2006, the Government announced it would not proceed with the trial, giving the introduction of the Health Services Access card as the main reason for its cessation

Company OverviewSlide 5 ID Cards in Australia  ID Card during World War II  Australia Card (1987)  Australia Card II ( )  Health and Social Services Access Card ( )

Company OverviewSlide 6 The Access Card Proposal The major purpose of the smartcard, to be phased in from 2008, is to prevent welfare fraud. The card will replace 17 existing benefits cards. The cost of setting up the smartcard is about $1 billion over four years It will not be compulsory to have or carry the card, unless the individual requires health or government services. However, as all adults and children over the age of 15 are required to have the card, if they wish to be reimbursed for health expenses, the new smartcard will be, in effect, compulsory for the majority of Australians

Company OverviewSlide 7 The Access Card Proposal cont… The Access card will be a plastic card containing a microchip. On the front of the card will be the cardholder’s name and photograph, and on the back will be the cardholder’s reformatted Medicare number and digital signature. The chip will contain data such as a photograph, data of birth, address and names of dependants, in addition to optional information relevant to a medical emergency

Company OverviewSlide 8 The Access Card Proposal cont… Registration for the card will be facilitated by the Secure Customer Registration Service (SCRS) which, in addition to the information on each card, will contain an individual’s address, date of birth, documentation presented during registration, dependant information, concession status, and a flag for each of the agencies with whom the customer has an existing relationship The Government has stated that the SCRS will not contain any agency specific data, nor will it provide agencies with access to other agencies’ data Access Card Consumer and Privacy Taskforce established

Company OverviewSlide 9 Issues and Criticisms Legislative and regulatory management Privacy concerns The costs of administering the card could be much greater than predicted by the government Will the objective of preventing welfare fraud be obtained by introducing the Access card? Given the recent cases of unauthorized access and disclosure of personal information by government officials, there are real concerns about maintaining adequate levels of security and privacy protection over the centralised database There are also concerns over function creep and who will have access to the data base

Company OverviewSlide 10 National ID Card Schemes Generally, a national identity card scheme, as opposed to an identity scheme for a specified purpose, involves the collection of personal identifying information to be stored in a computer database created by and managed by the government, and the issuing of a card with personal details on it, normally a photo, a number and signature All adults must be issued with the card and usually but not always are required to carry it on them at all times The United Kingdom Government recently introduced a national identity card scheme by enacting the Identity Cards Act 2006

Company OverviewSlide 11 UK Identity Cards Act  The LSE Report found: No evidence that the introduction of the proposed UK Identity card would reduce identity fraud and could lead to a greater incidence of such fraud An identity card would have no impact on private sector fraud such as credit card fraud An identity card would not reduce most immigration fraud and that money laundering usually does not involve false identities Its only likely effective role would be to reduce social security fraud  The Report concluded that the proposal would be very expensive and queried the Government’s calculations  This Report provided the basis for the initial rejection of the Identity Cards Bill in the House of Lords on 16 January 2006

Company OverviewSlide 12 UK Identity Cards Act cont…  The UK Government has not been able to show how the Identity Card and the Register will be used to reduce terrorism and other security threats  The LSE Report found that an identity card would have little impact on identity fraud and on a range of other areas of fraud

Company OverviewSlide 13 A De Facto ID Card? It has been stressed by the Access Card Consumer and Privacy Taskforce in its discussion paper, and by privacy groups, that it is very important that the Access card does not become a national identity card by stealth Although the Government denies that there is a risk of this happening, many believe that the current proposal for the Access card already has the features of an identity card The Victorian Privacy Commissioner points out that the card’s photograph will inevitably lead to people being required to produce the card for purposes other than those for which the card was issued, thus becoming a de facto identity card Multifunctional nature causes concern. The entire Australian population does not need a government card to stop welfare fraud.

Company OverviewSlide 14 Conclusion Whilst originally proposed as a way to reduce social security fraud, the Access card appears already to be undergoing function creep and is to be used as a new Medicare card, for the provision of all government services, for disaster relief etc There are a number of privacy issues associated with the proposal, particularly around the extent of third party access, the breadth of the data being collected, and the introduction of additional uses for the data which may not be explained to individuals at the time they supply their personal information. Until further details are available, however, it is not possible to discuss them further

Company OverviewSlide 15 Conclusion cont… No matter what name the card is given, it is imperative that the objectives of the scheme are precisely articulated so that there can be an appropriate evaluation of how the scheme would address those objectives