Www.nationalsmartcardproject.org.uk www.scnf.org.uk National Smartcard Project Work Package 8 – Security Issues Report.

Slides:



Advertisements
Similar presentations
UNITED NATIONS COMMISION ON INTERNATIONAL TRADE LAW Enhancing legal certainty for electronic signatures and other authentication methods José Angelo Estrella.
Advertisements

AFACT eCOO WG interim meeting - Conference Call 1st March of 2011 Mahmood Zargar eCOO Experiences and Standards.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Archiving for legal purposes How to implement the new Belgian legislation to destroy physical invoices and use an electronic archive.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
The Data Protection (Jersey) Law 2005.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
1 Exploring Acceptance and Legal Nature of eRecords Within a Paper-Based Framework Electronic Signature & Records Association November 14, 2012 Rafael.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
National Smartcard Project Work Package 8 – Card Governance Report.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
National Smartcard Project Work Package 8 – Report on financial services legislation.
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Encryption and the Law: The need for a legal regulatory framework for PKI Yee Fen Lim Department of Law Macquarie University.
Information Security Policies and Standards
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Mª ANGELA JIMENEZ 1 UNIT 4. EXTERNAL AUDIT BASIS CONCEPTS.
Session 3 – Information Security Policies
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
National Smartcard Project Work Package 8 – Information Law Report.
Cyber Law & Islamic Ethics
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
Chapter 10: Authentication Guide to Computer Network Security.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Functional Model Workstream 1: Functional Element Development.
Copyright © 2008, CIBER Norge AS 1 Using eID and PKI – Status from Norway Nina Ingvaldsen and Mona Naomi Lintvedt 22 nd October 2008.
E-Signatures The Community framework on e-signatures (Directive 1999/93/EC) Dr Ioannis Iglezakis Visiting Lecturer University of Thessaloniki, Greece.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Evolving IT Framework Standards (Compliance and IT)
Abcde Electronic Signatures and Certification Authorities Obligations, Liabilities and Responsibilities Michael Peeters Pinsent Curtis - UK.
National Smartcard Project Work Package 8 – Corporate Structures Report.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Author(s): David A. Wallace and Margaret Hedstrom, 2009 License: Unless otherwise noted, this material is made available under the terms of the Creative.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Paperless Government and the Law John D. Gregory Ministry of the Attorney General June 5, 2009.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
DIGITAL SIGNATURE.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
The EU General Data Protection Regulation Frank Rankin.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Protection of Personal Information Act An Analysis on the impact.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
GDPR (General Data Protection Regulation)
Electronic Transactions & Authentication
General Data Protection Regulation
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Welcome To Money pad November 23, 2018 Sample footer.
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

National Smartcard Project Work Package 8 – Security Issues Report

Corporate Structures Report Format of report: Executive summary Introduction and Scope of report Electronic Signatures Certification-Service-Providers ISO Authentication Smartcard Issues Memorandum of agreement

The Executive Summary outlines: What is covered in the introduction to this report The scope of this report The key points covered in each section of this report and any conclusions reached Executive Summary

Introduction The Introduction explains: Purposes of report Parameters of report Context in which to be read Summary of key legislation and regulation reviewed Please note that the report should be read in conjunction with the Introductory Report

Electronic Signatures EU Directive on a community framework for electronic signatures (1999) Basic and advanced electronic signatures Technologically neutral Electronic Communications Act 2000 Definition of “Electronic Signature” Section 7 UNCITRAL Model Law on Electronic Signatures Functional Equivalent Approach Article 6 – “Compliance with a requirement for a signature” Electronic Signatures Regulations 2002

Electronic Signatures (continued) Law Commission Advice “Electronic Commerce: Formal requirements in Electronic Transactions” Reviewed legal status of: Electronic documents Electronic signatures Adopted “functional equivalent approach”

Electronic Signatures (continued) What is a signature? Means of identification Indication of personal involvement Indication of intention to be bound Law Commission advised: Look at function not form Courts can determine evidential weight Various types of signature already accepted printed, scanned, typed, faxed Considered 4 types of electronic signatures Digital, scanned, typed and click Do not confuse reliability with validity

Certification-Service-Providers Public key Infrastructure “digital certificates” and “digital signatures” Certification–Service-Providers EU Directive Electronic Communications Act 2000 tScheme Electronic Signatures Regulations 2000 Imposes liability on Certification–Service-Providers for “qualified certificates”

Liability of Certification-Service- Providers Where a CSP issues or guarantees a qualified certificate to the public and a person reasonably relies on that certificate for: accuracy of information in the certificate inclusion of Schedule 1 Information holding by signatory of relevant signature-creation-data ability of signature-creation-data and signature-verification- data to work together and that person suffers loss, then CSP liable unless can show that not acted negligently

Schedule 1 - Qualified Certificates Statement that a ‘Qualified Certificate’ Name and country of establishment of CSP Name or pseudonym of the signatory Signature-verification data Period of validity of the certificate Identity code of the certificate Advanced electronic signature of issuing CSP Limitations: on the scope of use of the certificate on the value of transactions for which it can be used

Schedule 2 - CSP Qualities Operational reliability Technical ability and security Financial stability and security Manner in which certificates: issued stored revoked Identification of signatories Conflict of interests

Information Security: ISO PIU Report “Privacy and data-sharing: The way forward for public services” 2002 Recommendation 13 Information Security: Confidentiality Integrity Availability

Information Security: ISO (continued) Detailed security standard 10 sections Key elements: Top down approach Identify assets Evaluate risks Develop Security policy Implement policy by way of Information Security Management System Review regularly Third party suppliers: are they compliant?

Verification and Authentication Verification Verifying the identity of a Card User Authentication Authenticating that Card User is Card User by Something that Card User knows Something that Card User possesses Something that the Card User is

Verification and Authentication HMG’s minimum requirements for the verification of the identity of individuals (2003) Four levels of identity verification: Level 0 - none necessary Level 1 – balance of probabilities Level 2 – substantial likelihood Level 3 – beyond reasonable doubt Different types of evidence associated with each level

Verification and Authentication Biometrics Behavioural/physiological traits of an individual “something that a person is” Fingerprints, iris and retinal scans etc Stored on a card or central database? Some concerns: Access to biometric data (by whom and for what purpose?) Updating of data Speed Not infallible (how are errors corrected?)

Verification and Authentication Article 29 Data Protection Working Party: Working document on Biometrics Biometrics = personal data and can be sensitive personal data Need to address: Purpose and proportionality of using biometric data Fair collection of biometric data Legitimate grounds for processing personal data

Smartcard Issues Electronic Signatures: Identify machine or card rather than person unless use biometric data Certification-Service-Providers Qualified Certificates include limits on use for which certificate may be relied and on liability ISO Card, reader, telecommunications network & database Verification and Authentication Identity fraud Lies about attribute (e.g. age) Adopts false identity (e.g. third party’s or bogus identity)

Smartcard Issues Certification-Service-Providers contractual issues Services, Purposes, Certificate Terms, tScheme Approval, Security, Revocation Procedures and Data Processor Card User contractual issues Identity, Data Protection, Purpose, Card Security, Password Security, Biometrics, Dispute resolution, Limitation of Liability, Signatures and Card Issuer Security Obligations

Memorandum of Agreement Agreement to be entered into with Certification Authority Provides framework for: Verification Services Authentication Services Revocation Services Allows new Local Authorities to join in the agreement at later date