30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.

Slides:



Advertisements
Similar presentations
FRAUD PREVENTION TRAINING FRAUD PREVENTION TRAINING.
Advertisements

Red Flag Rules: What they are? & What you need to do
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
User Perception and Acceptance of Biometrics M. Angela Sasse Professor of Human-Centred Technology Department of Computer Science University College London,
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
FIT3105 Smart card based authentication and identity management Lecture 4.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
General Awareness Training
Copyright © 2008, CIBER Norge AS 1 Using eID and PKI – Status from Norway Nina Ingvaldsen and Mona Naomi Lintvedt 22 nd October 2008.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
EGovernment Services in Poland Today & in The Future Dariusz Bogucki Ph.D, IDA II, National Co-ordinator National Registers Department, Ministry of Internal.
Unethical use of Computers and Networks
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
The Best Identity Protection
Management Advisory and Compliance Services Towson University Management Advisory and Compliance Services Internal Controls.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
17/11/20151 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology Committee EURIMEuropean.
Identity Theft The Nation’s Fastest Growing Crime.
DIGITAL SIGNATURE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
You. are at risk for the fastest growing crimes crime.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Electronic Banking & Security Electronic Banking & Security.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Chapter 8 Data Privacy. Data Collection IP addresses Visited urls Anonymized? If so, supposed to prevent personal identification Europe considers IP address.
Fraud and the internet Sandra Peaston Assistant Director, Insight Cifas, The UK’s Fraud Prevention Service.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Identity Theft Chelsea Weser.
Add video notes to lecture
Own Your Identity.
Five Unethical Uses of Computers
Internal Controls Towson University
Chris Farmer Director of Fraud Strategy
Who Uses Encryption? Module 7 Section 3.
Pre-Employment Vetting in the Digital Age
Own Your Identity.
Legal Framework for Civil Registration, Vital Statistics
Identity & Access Management
ELECTRONIC PAYMENT SYSTEM.
Dashboard eHealth services: actual mockup
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
E-identities (and e-signatures)
Presentation transcript:

30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology Committee EURIMEuropean Information Society Group (Director)‏ apCommsAll-Party Communications Group (Secretary)‏ LASSeO Local Authority Smartcard Standards e-Organisation E-RAE-business Regulatory Alliance (President)‏ ISSA UKInformation Systems Security Association Advisory Board Nominet UKPolicy Advisory Body All-Party Group for Entrepreneurship (Chairp'n)‏ Select Committee on Science & Technology – Personal Internet Security PGP International Advisory BoardGTCInternational CouncilCRC Procurement

09/01/09Copyright - The Earl of Erroll2 DATA SECURITY I’ll speak for just under half a microcentury on ID and Citizen Cards

01/27/09Copyright - The Earl of Erroll3 Merlin

01/27/09Copyright - The Earl of Erroll4 A LORD

01/27/09Copyright - The Earl of Erroll5 A Territorial Soldier

©Parliamentary copyright 01/07 H O U S E o f L O R D S

01/27/09Copyright - The Earl of Erroll7 Me at my desk in the Lords

01/27/09Copyright - The Earl of Erroll8 The Home Office

25/02/09Copyright - The Earl of Erroll9 Trying a backflip

09/01/09Copyright - The Earl of Erroll10 PRIVACY & PROTECTION PRIVACY   IDENTIFICATION Once it’s stored, it's no longer private it WILL leak 90% don't care!?

09/01/09Copyright - The Earl of Erroll11 BALANCE OF POWER Individualism   Paternalism Capitalism Democratic Socialism

01/27/09Copyright - The Earl of Erroll12 IDENTITY CARDS ACT - PURPOSES - (a) in the interests of national security; (b) for the purposes of the prevention or detection of crime; (c) for the purposes of the enforcement of immigration controls; (d) for the purposes of the enforcement of prohibitions on unauthorised working or employment; or (e) for the purpose of securing the efficient and effective provision of public services.

DEFINITELY NEEDED Strong authentication when transacting business Local biometric verification for ICAO standard travel documents

ACCEPTABILITY Why would you want one? What is it useful for? What is the downside?

USES - IPS protect your identity from theft protect vulnerable people from those who have lied offer a convenient way to prove your age speed up many everyday transactions make it easier for you to travel in Europe make it simpler to prove your ID make the internet easier to use make it easier to replace lost and stolen documents protect your privacy

BENEFITS OF THE SCHEME Identity fraud has cost the UK over £1.7 billion CIFAS, the UK’s Fraud Prevention Service: 67,406 victims of identity fraud in 2006, up from 56,200 in Since 2000 almost 282,300 victims of identity fraud have been registered Over 10,000 fraudulent passport applications each year 430,000 illegal migrants could be living in the UK Between £20 & £50 million of ID-related benefit fraud committed each year

POLITICS Policy differentiation Authoritarianism Trust & Security Tamper Detection – Black Hats Cost Passport £375m - ID Card £125m – Foreign £326m

LOCAL AUTHORITIES Will still run their own schemes Different Purposes Administrative Efficiencies

ISSUES Trust Liability Repudiation

01/27/09Copyright - The Earl of Erroll20 ID issuing issues ID is issued for different purposes Some need more security than others Can each function trust the ID issued for another purpose Are you reliable in each of your personae Agree function and uses for electronic IDs

01/27/09Copyright - The Earl of Erroll21 Identity Recovery I’m not talking about Credit Card theft When you are impersonated How do you prove you are not the crook? How do you repudiate their transactions? How do you travel when your I.D. is on a “wanted” list? How do you restore your reputation? What is the true cost to you? Both Financial and Time

30/9/2009Copyright - The Earl of Erroll22 Generic Uses of I.D. Application Passport Authorisation Health Financial Electronic I.D. Purse Why Criminal Record Security, Benefits Allergy or Disease Creditworthiness P.K.I. / Certificates Cash & Tokens Need Name & Body Body Body only Reputation Anonymous

01/27/09Copyright - The Earl of Erroll23 -COMMUNICATION- we use language differently ENABLEMENT VRM I own my data “Identity Assurance” Advisers Flexibility & Discretion Consent Common Law CONTROL CRM We own citizens’ data “Identity Management” Inspectors Process & Procedure Demand Statute Law

09/01/09Copyright - The Earl of Erroll24 FINAL THOUGHTS Government Efficiency v. Privacy for the Entity Intrusion & Control must be targeted tightly Impact of data misuse – Data Integrity Mis-interpretation vs. Non-interpretation How does the SME or Citizen check the ID Card? If they can't, where is the benefit? CEN/TS & 2 (2007) LASSeO

25/02/09Copyright - The Earl of Erroll 25 Lord Erroll (Merlin)