Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.

Slides:



Advertisements
Similar presentations
A strategy for a Secure Information Society –
Advertisements

Reliability in British Columbia
Singapore February 2001 Promoting Fair and Transparent Regulation in Securities Markets A Presentation to the APEC-OECD Co-operative Initiative on Regulatory.
Emergency Management Unit “S ETTING THE T ABLE ” T O A CCOMPLISH THE T ACTICAL O BJECTIVE C ITY OF O TTAWA S ECURITY AND E MERGENCY M ANAGEMENT B RANCH.
Day: Wednesday 9 th November Session: 9.00am am Speaker: Stig Enemark Topic:The Land Management Paradigm.
#CPACONGRESS E3: Strengthening integrity in a complex environment Hawari Badri FCPA Assistant Secretary, Department of Immigration and Border Protection.
INTERNATIONAL UNION FOR CONSERVATION OF NATURE. 2 Implemented in 12 countries of Africa, Asia, Latin America and the Middle East, through IUCN regional.
Towards a framework for integrated cross-border law enforcement initiatives Based on the Consultation Paper circulated to CACOLE in July 2008 by Public.
The Evolution of the Trusted Traveler Concept September 2010.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Security of eGovernment, European Parliament, Brussels 2013 Max Snijder, Linda Kool, Geert Munnichs L Kool | 1 19 February 2013 Findings from the ePassport.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Evolution of Identity Management May 15, 2008 For: CIPS Security Special Interest Group Presented by: Mike Waddingham, PMP President, Code Technology Corp.
Copyright © 2008 McGraw-Hill Ryerson Ltd.1 Chapter Ten Regulating Business Canadian Business and Society: Ethics & Responsibilities.
Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.
Federating Identity Management in the Government of Canada Identity North Conference November 20 th 2012 Presented by: Rita Whittle Senior Director, Cyber.
Contemporary Issues in Canadian Health Care Nola M. Ries, MPA, LLM Adjunct Assistant Professor, University of Victoria Research Associate, Health Law Institute,
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
19 March 2008Corruption Risk Mapping1 Corruption risk mapping Towards an Integrity risk map for the Hungarian public sector.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Questions and answers on Bill C-4, Budget Implementation Act.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Harmonisation of electronic Identities for the European Citizen Jan van Arkel, co- chair Porvoo group, May 11, 2006 Ljubljana.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
Investment Funds Conference “Collective Investment Funds in the Qatar Financial Centre – Confidence and Opportunity” November 26-27, 2007 Michael Webb.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
GOC Technical Architecture GoC Position on Open Source Presentation to eGovOS Open Source in Government Series March 15, 2004.
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
Canada Border Services Agency Update Presentation to: Transportation Border Working Group Bellingham, Washington June 7, 2006.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Initial reflections of the privacy commissioner on Ontario’s draft privacy bill Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario Toronto.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Communication Paper on Smart Regulation COM(2010) 543, 8 October 2010 Presentation by Savia Orphanidou 3 rd November 2010.
BUS2302 Information Technology and the Business Student Group 2 Biometrics March 28, 2013.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
Cross-Border Cooperation November 17, Purpose Highlight how Canada and US advance cross-border cooperation  Canada-US law enforcement context.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
New Pensions Act Developments: What you need to know Yvonne White & Jerry Moriarty The Pensions Board 18 April, 2007.
Consumer Authentication for Networked Personal Health Information Redwood Health Information Collaborative March 18, 2008 Josh Lemieux Director, Personal.
Setting the context: Full costing and the financial sustainability of universities Country Workshop: POLAND EUIMA – Full Costing Project University of.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Regulation Inside Government: Reducing Administrative Burden Issues and Approaches Case Study: Canada OECD Workshop Mexico City – March 14-15, 2006 Gilles.
1 The Privacy Impact Assessment Guidelines Guy Herriges Manager, Information and Privacy Office of the Corporate Chief Strategist, MBS November 2000.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
DEMOCRATIC BELIEFS AND VALUES
Reaping the Benefits of Open Government By Suzanne Legault, Interim Information Commissioner Office of the Information Commissioner of Canada Canada School.
TAIEX-REGIO Workshop on Applying the Partnership Principle in the European Structural and Investment Funds Bratislava, 20/05/2016 Involvement of Partners.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS Paulo Magina Head of the Public Procurement Unit Public Sector Integrity Division 10 th INGP Annual.
Page 1 Procurement and Probity Issues that Impact on the School Environment Presentation to the Tasmanian Schools Administrators’ Association (TSAA) Hobart.
Internet Governance in Nigeria:
Athina Antoniou and Lilian Mitrou
Unique Identification Number Project
Public Sector Institutional Reform Project
The Public Sector Equality Duty
Trafficking in Persons (TIP)
Promoting prosperity for all
Consumer Protection Online
Multi-level citizenship: causes and opportunities The Dynamics of Citizenship in the Post-Political World, Stockholm University, May Andreas.
Follow us: June 15-16, 2017 Steering Committee Meeting Summary of Conclusions and Action Items Follow.
The Public Sector Equality Duty
Appropriate Access InCommon Identity Assurance Profiles
The Promise of Social Co-ops
Presentation transcript:

Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th Annual Privacy and Security Workshop & 15th CACR Information Security Workshop, November 2-3, 2006

“We have to have a real debate on this [a national identity card] … we cannot bury our head in the sand anymore. Something is going on worldwide and we have to have that debate. Three years ago we were in the avant-garde, but right now we’re trailing.” Denis Coderre, “Day Proposes National ID Card”, Canadian Press, February 17, 2006.

What is identity policy? A comprehensive national identity scheme involves the collection and processing of individual-specific data that will be shared across services, both within and beyond government, often for a wide variety of purposes.

Overview Moving toward a Canadian Identity Policy Regime? Implications for the Relationship between Citizens and the State 7 main areas of concern Conclusions and next steps

Moving toward a Canadian Identity Policy Regime? Emerging components: e-Passport (DFAIT/Passport Office) Biometric visas (CIC) NEXUS & CANPASS (PSEPC/CBSA) Identity Management Policy Framework (Treasury Board) Principles of Authentication (Industry Canada) Changes to Existing Identity Schemes (Federal & Provincial) Western Hemisphere Travel Initiative (US), Smart Borders Agreement (Canada/US), Security & Prosperity Partnership (Canada/US/Mexico)

Implications for the Relationship between Citizens and the State Changing an existing policy or implementing a new one can alter how people regard their governments. Can be positive or negative Choices must be made with care

1 - Political Risks Public trust is essential Risks to political incumbents Tendency for public support to decrease over time as policy problems are identified and publicized (Australia, UK, France) Lack of confidence in governments’ ability to successfully develop and implement the system (UK) Risks to democratic institutions Attempts to avoid political risk through relying on international and other obligations (US REAL-ID and EU biometric passports) and avoiding public debate (OSCP)

2 – Multiple, Inconsistent Goals The purpose of such a system must be clearly articulated Goals include: Combating terrorism Combating benefit fraud Combating identity fraud and theft Managing borders Supporting private sector with adequate identification regime Promoting e-Government services Purpose relates directly to the type of system developed e.g., combating terrorism v. promoting e-government services

3 - Feasibility of Goals Can the system be built to meet the stated goals and objectives? To develop a new database or build on existing ones? (UK, Australian smart card) As the goals become broader, the feasibility is reduced (Ontario Smart Card Project)

4 - Effectiveness of choices Are the chosen design specifications and technologies appropriate to meeting the goals? changes to passport regimes (EU & US) centralised v. decentralised models (UK, France) implications for other databases (UK)

5 - Costs Four facets of costs-consideration: costs attributed to design decisions distribution of costs costs burden - who pays? opportunity costs Costs are often under-estimated in proposals

6 - Who makes the decisions and owns the system? Federal or provincial (Canada)? Which ministry within a government? Tendency for primary group’s interests to have significant implications on design (e.g., law enforcement v. the Treasury)

7 - Privacy and Civil Liberties Practically every government considers these issues within their policy, but how well they consider it in their design and implementation will influence the level of risk that is likely to arise.

Conclusions Modern identity policies are highly complex social and technological instruments that must be carefully designed and deployed to avoid or balance the risks outlined here. A successful policy can be seen as a positive renewal of the social contract. An unsuccessful policy can be seen as a profound lack of respect by the government toward its citizens.

Next Steps … In-depth analysis of Canadian identity policies and programs Provide a range of policy options for Canada Workshops in Vancouver, Ottawa, and Maritimes (December 2006 to February 2007) A final report to the Office of the Privacy Commissioner in March 2007 A real public debate? This work is supported by the Office of the Privacy Commissioner of Canada Contributions Program and SSHRC INE Digital Identity Construction Project.

Questions?