Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

The detection and prevention of ID Fraud
© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
Roll out of Biometric Residence Permits RTW documentation
Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Janice Kephart Director of National Security Policy, Center for Immigration Studies Heritage Foundation July 14, 2009.
Commercial Presentation 1AIAC Group 1.  Motivation – Qualification Assurance  CERTCOP - Competence verification  Motivation – Document Validity.
Review of Patents Agenda Item 3: Report of the New Technologies Working Group.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Tuesday, 29 April 2014 Ministry Of Interior MOI In addition to traditional peace keeping and civil defense duties, the Saudi Arabian Ministry Of Interior.
The Rental Exchange Julie Alexander Income Collection Policy.
Anonymous, Liberal and User-Centric Electronic Identity Supports Citizen Privacy Protection in e-Government OASIS eGov Workshop - 1 May 2008 Libor Neumann.
FIT3105 Smart card based authentication and identity management Lecture 4.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.
How to get your free Windows Store Access
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Country Update: Austria Herbert Leitold Secure Information Technology Center - Austria
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
Dr. Benito Nacif Electoral Council, IFE Mexico 9 September, 2010 Building Trust through an Independent Electoral Registry: the Mexican Experience.
PUBLIC AND MIGRATION MANAGEMENT POLICIES. PARTICIPATING AUTHORITIES  Ministry of Interior & Police  Migration Council  General Migration Department.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
Harmonisation of electronic Identities for the European Citizen Jan van Arkel, co- chair Porvoo group, May 11, 2006 Ljubljana.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Secure Management of Information across multiple Stakeholders SEMIRAMIS – CIP-ICT PSP SEMIRAMIS General Presentation.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
EGovernment Services in Poland Today & in The Future Dariusz Bogucki Ph.D, IDA II, National Co-ordinator National Registers Department, Ministry of Internal.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Regional Workshop on International Migration Statistics Cairo, Egypt 30/6/2009-3/7/2009.
Governments provide information at local and national levels.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
THE MALAYSIAN ELECTRONIC PASSPORT
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
Module 1 4 th November, Module 1 4 th November, 2010 Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain.
Copyright 2010, The World Bank Group. All Rights Reserved. Other Justice & Governance Agencies Part 2 Crime, Justice & Security Statistics Produced in.
Electronic Information System for Civil Registration and Administrative Services European eGovernment Conference July, Como, Italy Toma Bussarov.
DATA SOURCES FOR MEASURING FORCED DISPLACEMENT WITH A FOCUS ON ADMINISTRATIVE SOURCES Khassoum DIALLO Snr Statistician UNHCR Regional workshop on strengthening.
MAXIMIZING BENEFITS OF INTEGRATED PROPERTY DATA Presented by Aidas Petrošius Advisor to Director General
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
The Aadhaar project Unique Identity and Its Positive Externalities for Inclusiveness 16 th January 2013 UIDAI
Module 1 Version:1.3_ Release date:
Strengthening civil registration and vital statistics systems - a necessity for the region to overcome socio- economic and health challenges Dr. Lene Mikkelsen.
Voting and Elections in the United States (Ch. 6 and 7)
THE MALAYSIAN ELECTRONIC PASSPORT
Namibia: Civil Registration and Vital Statistics System
Smart Data infrastructure
Identity and Access Management
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
The mobile applications fighting the tax fraud and tax evasion
National Electoral Register
Unique Identification Number Project
Estonian e-Governance best practices and cooperation with UN Ingmar Vali Centre of Registers and Information Systems Estonia Who am I, where I am from:
A strategy for improving CRVS in Lao PDR
SOLUTION LAND TITLES.
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Legal Framework for Civil Registration, Vital Statistics
Acceptable forms of identification
Regional Initiatives – South Asia Civil Registration Group (CR8)
Introduction of ISO/IEC Identity Proofing
E-identities (and e-signatures)
Vanuatu By Ettienne Ravo
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Vanuatu By Ettienne Ravo
Presentation transcript:

Ronny Depoortere January 16th, 2012 Chisinau

Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner stone of an efficient public service. It is the task of the government to provide reliable and verifiable identification and authentication checking entitlement to government services or benefits organising elections issuing identity/travel documents combat identity fraud border control & monitoring immigration flows crime prevention anti-terrorism statistical or demographic analysis Benefits:

identity Identity - real world & virtual world unique identifiers unique document numbers and virtual token numbers

IDENTITY MANAGEMENT

Unique Data Source for – biographical data – civil data (identity and status) source for derived lists or databases (travel, elections, etc) linked with other registers (voter lists, emigration records, etc.) Unique Data Source ( Population Register )

Unique Data Source

ID card management & ID token management ID card management & ID token management enrolment and registration enrolment and registration production of secure ID documents production of secure ID documents POPULATION REGISTER POPULATION REGISTER biometric validation biometric validation

A unique Central Source is key for your central identity management Paper-based Central & digital

Unique Identifiers 2 types of unique identifiers 1.unique numbers for persons 2.unique numbers for identity documents travel documents virtual tokens identifiers make it easy to present and prove identity identifiers enable eGov by means of information exchange even without involving the citizen

Most countries with e-services policy use e-ID card as key identifier : – Need for physical control in Moldova – Need for travel document (ID being much cheaper than a passport) – Biometrics storage ? – Off-line ID checking (rental, banks, etc.) – Mobile authentication (CR-principle eg Portugal) Can also be done without e-ID card – Most average users don’t have a smartphone yet Discussion client- vs server-side mobile e-ID Identity Documents and their use

documents or tokens are carriers for identity information a secure ID card usually contains – unique ID number – unique card number number – identity data – photo, biometric data an e-ID card is the typical base tool to identify and authenticate a person Identity Documents & Tokens

Perfectly in-line with Moldova’s strategy Is very complementary -> derived mobile identity Mobile Identity

Issuing ID documents or ID tokens relies on a reliable first-time registration procedure to establish the true identity of the citizen Registration for other ID documents or tokens relies on ID cards as initial proof of identity (« Mother Identity ») Registration

Ronny Depoortere Sr. Vice-President ZETES PASS T