We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAbraham Furnace
Modified over 2 years ago
EURIM Personal Identity Group Data Sharing Model for Public Services 13 th January 2005 Jim Lound © Experian Ltd 2005
Provider of services Individual Product / Service requests FOI requests Initiating the contact © Experian Ltd 2005
Provider of services Individual Proactively servicing the customer Initiating the contact © Experian Ltd 2005
Provider of services Own Data Reactive data sharing prompted by Service Provider Data acquisition Data Owner © Experian Ltd 2005
Provider of services Own Data Proactive data sharing prompted by changes to circumstances Own Data Data Owner Data acquisition © Experian Ltd 2005
Other Service Providers Potential huge demand Own Data Data Owner Contention © Experian Ltd 2005
Trusted Intermediary Provider of services Data Owner Partner Data Data Owner Trusted Intermediary - Single Interface © Experian Ltd 2005
Trusted Intermediary Individual Data Owner Trusted Intermediary - Single Interface © Experian Ltd 2005
Trusted Intermediary Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access © Experian Ltd 2005
Trusted Intermediary Service Provider & Partner Data Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access Copy Database Feed of updated records Real Time Access © Experian Ltd 2005
Trusted Intermediary Service Provider & Partner Data Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access Copy Database Feed of updated records Third Party Data In-houseExternal Data Real Time Access Real Time Access © Experian Ltd 2005
Trusted Intermediary Service Provider & Partner Data Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access Copy Database Feed of updated records Third Party Service Providers Third Party Data Real Time Access In-houseExternal Data Real Time Access e.g. Nat. ID Card verification Real Time Access © Experian Ltd 2005
Trusted Intermediary Service Provider & Partner Data Infrastructure Closed User Groups ‘Open’ to Public Sector Public Services Data Sharing Pot Real Time Access Copy Database Feed of updated records Third Party Service Providers Third Party Data Added Value Services Real Time Access In-houseExternal Data Real Time Access e.g. Nat. ID Card verification Real Time Access Real Time Access © Experian Ltd 2005
Key considerations Benefits to the citizen Benefits to the citizen Trust Trust Data quality Data quality Governance Governance Infrastructure Infrastructure Data Protection Data Protection Legislation Legislation © Experian Ltd 2005
Benefits to the individual – why are we doing this? Quicker service Reduce the need to supply documents Contribution towards identity checking Contribution towards service eligibility assessment More convenient distribution channels Ability to take advantage of cost reductions reflected in pricing Proactive service offerings © Experian Ltd 2005
Trust Trusted Intermediary Provider of services Individual © Experian Ltd 2005
Data Quality Accuracy Up to date Complete Formats Effective name and address matching routines © Experian Ltd 2005
Governance Membership - managing Data quality - policing Contribution - controlling level of data accessed Purpose - controlling amount of data accessed Citizen access Individual’s right to look at their data Individual’s right to know who has accessed their data. © Experian Ltd 2005
Infrastructure Minimise the financial risk - data contributors Undertake the quality control processes Receive, manage and maintain the shared data Manage the day to day operations Add value to the data Provide electronic access to the data being shared Support a range of distribution channels & technologies © Experian Ltd 2005
Infrastructure (cont.) Support the demands of response times Facilitate the assessment of the levels of trust Provide proactive notifications to individuals Provide individuals with access to their data © Experian Ltd 2005
Data Protection Issues A key issue will be to establish an acceptable and compliant method of allowing the appropriate data for sharing to be ‘in place' prior to consent in order to allow the data to be immediately released when consent is given. © Experian Ltd 2005
Legislation In areas affected, remove legislative constraints that currently prevent individuals from initiating data sharing through their express consent © Experian Ltd 2005
EURIM Personal Identity Forum Data Sharing 28 th October 2004.
Oracle E-Business Suite R12.1 Accounts Payables Partner Boot Camp Training Courseware Part VIII – Transaction Taxes in Payables.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Key Performance Area (Optional) Performance Criteria Considerations 1. Major Concerns 2. Minor Concerns 3. Meeting Expectations 4. Exceeding Expectations.
SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May 2015
© 2009 Experian Limited. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Lecture 11 Managing Project Execution. Project Execution The phase of a project in which work towards direct achievement of the project’s objectives and.
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
The Points Based System Sponsorship Responsibilities Employer’s Obligations Cheryl Pellew.
Umbrella Corp Practica 9 – English Group E-commerce Resources.
Marketing Solution. Oriel TM. What is Oriel TM ? Oriel TM Is a Direct Marketing solution that enables addresses to be used for E - Campaigns.
© 2008 Prentice Hall11-1 Introduction to Project Management Chapter 11 Managing Project Execution Information Systems Project Management: A Process and.
Linking PayPal with your Online UK Business Account © 2016 Extra Direct (UK) Ltd PLEASE NOTE: This document is protected under Copyright. All rights reserved.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
© Fujitsu Services 2004 EURIM PI Data Sharing sub- group 13 January 2005 EURIM PI Group Data sharing in practice A Fujitsu Perspective John Newton Account.
Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
Electronic Signatures in the SFA Loan Programs Electronic P-Notes Presented by Jeff Baker & Kay Jacks.
การจัดการช่องทางการจัดจำหน่าย Distribution Channel Management
ISO 9001 : 2000.
VOTER REGISTRATION AND IDENTIFICATION
National Enrolment Service (NES) Overview October 2015 – June 2016.
INTRODUCTION TO DATA PROTECTION An overview of the Irish Data Protection legislation.
Fall 2006CS 395: Computer Security1 Key Management.
Fusion5 Empower-HR – SuperStream Sandy Duncan – HCM Development Manager Christine Hudson – HCM Customer Centre Manager.
Department of Defense FOIA Website Compliance March 6, 2008 Internet Requirements Internet Requirements.
National Infrastructure Tina Yule Technical Assurance Co-ordinator 21 st Century Government Unit.
Results of January 2007 Meeting of Working Group on the Questionnaire and Indicators 24 January 2007.
Recordkeeping & Accounting
D5240 Document Retention System 8/20/ District 5240 The Rotary Foundation Grants Document Retention System Rotary Year
Chapter 14 The Second Component: The Database.
Care and support planning Care Act Outline of content Introduction Introduction Production of the plan Production of the plan Planning for.
Credit Cards. When thinking of getting a Credit Card follow the Three C’s: Character: Will you repay the debt? How you used credit before? Do you pay.
Reduce Your Return Mail by One Third! National Postal Forum Nashville TN March 20–23, 2005 Jan Caldwell, Address Management Sharon Harrison, SBC Liz Weber,
Copyright 2010, The World Bank Group. All Rights Reserved. Recommended Tabulations and Dissemination Section B.
Inspection Directions: An EMS Approach to Inspecting for Section 608 and 609 Compliance.
AmeriCorps is introducing a new online payment system for the processing of AmeriCorps forms
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
ANSI 5010 Deidre Lawson Fryfogle- Product Manager.
Florida Information Protection Act of 2014 (FIPA).
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
Access Through Collective Services. Why Services ? RROs are well placed to provide: Access to broad repertoires of content Through controlled channels.
Enter date here Authenticate Pro Helen Clift 15 th November 2005.
Top 5 OPTN Policy Violations
Barhale Procedure for Site Establishment
Data Protection & FOI Data Protection: Background Human Right to Privacy Unenumerated right under Irish Constitution Explicit right under European Convention.
Software Project Management
1 ISO/TC 176/SC 2/N1282 ISO 9001:2008 to ISO 9001:2015 Summary of Changes.
1 Computerised National Land Book of Latvia Ints Lukss Project Manager MikroKods Ltd.
© 2017 SlidePlayer.com Inc. All rights reserved.