We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJacob Frost
Modified over 2 years ago
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008
© fedict All rights reserved 2 > Content of the eID > Digital certificates > eID and privacy
© fedict All rights reserved 3 Legal aspects Belgian electronic identity card Content of the eID
© fedict All rights reserved 4 Content of the eID > From a visual point of view, the information shown will be the same as on the present identity card: name first 2 Christian names first letter of third Christian name nationality place and date of birth sex place of issue start and end dates of validity card number owners photograph owners signature National Register Number Visual identification of the owner
© fedict All rights reserved 5 Content of the eID > From an electronic point of view, the data on the chip is the same as the information printed on the card, plus: address identity and signature keys identity and signature certificate Certificate Service Provider security information (chip number, signature for identity data, etc.) > No other data is stored, no data container Electronic identification of the owner
© fedict All rights reserved 6 authentication data capture signature Content of the eID
© fedict All rights reserved 7 Content of the eID PIN protectedUse without PIN ID ADDRESS authentication digital signature RRN SIGN RRN SIGN RRN SIGN RRN SIGN PKIIDENTITY private public authentication data capture signature
© fedict All rights reserved 8 Content of the eID eID as a tool (mean) to read efficiently, without mistakes identification data. takes time unefficient prone to error fast efficient exact copy
© fedict All rights reserved 9 Content of the eID
© fedict All rights reserved 10 authentication data capture signature Content of the eID
© fedict All rights reserved 11 Content of the eID eID as a tool for strong authentication (in the electronic world) Hi Jan ! Hi Peter ! physical world online world …
© fedict All rights reserved 12 Content of the eID !! The PIN usage for authentication is done ONCE until card is removed !!
© fedict All rights reserved 13 authentication data capture signature Content of the eID
© fedict All rights reserved 14 !! The PIN usage for signature is requested each time for a signature !!
© fedict All rights reserved 15 Content of the eID > Belgian ID card Act of 19 July 1991 (amended by Act of 25 March 2003 to introduce electronic identity cards) > Article 6 §2 : other content can only be added by law. No intention to have a data container -> access key model > eID valid for 5 years > 24/7 helpdesk in case of loss, theft, destruction
© fedict All rights reserved 16 eID : the access key model home banking, online opening of accounts, … proof of membership SSO, … Healthcare e.g. SIS drivers licence student cards, e- learning, … … e-commerce
© fedict All rights reserved 17 Legal aspects Belgian electronic identity card Digital certificates
© fedict All rights reserved 18 Digital certificates > eID contains two digital certificates: one for electronic signature one for authentication
© fedict All rights reserved 19 Digital certificates > European Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community Framework for Electronic Signatures. > The two main objectives: free internal market for electronic signatures and certification services (all electronic signatures, all certification services, all signature products) legal effect of electronic signatures (under certain conditions, for specific purposes, with many exceptions)
© fedict All rights reserved 20 Digital certificates > Authorisation (mandatory) is forbidden, accreditation (voluntary) is allowed, supervision is obliged. > General principle: legal effect + admissibility as evidence for all electronic signatures. > Second principle: certain electronic signatures get the same legal effect as hand-written signature.
© fedict All rights reserved 21 Digital certificates > Liability for CSP > Respect of Data Protection Directive > National law determines in which fields electronic documents and electronic signatures can be used > Standardization work to clarify the requirements of the annexes of the Directive
© fedict All rights reserved 22 Digital certificates > Belgian E-Sign act of 20 October 2000 on the introduction of telecommunication means and the use of electronic signatures > Evidence; non-discrimination principle > New article 1322, 2 Civil law, For the purpose of this article, a signature can also mean data in electronic form which can be attributed to a certain person and which demonstrate the integrity of the content of the document
© fedict All rights reserved 23 Digital certificates > Belgian CSP act of 9 July 2001 to create a legal framework for the usage of electronic signatures and certification services > Article 4 § 5: The qualified electronic signature is the only type of signature that will automatically be given the same legal value as a handwritten signature. A qualified signature is an advanced electronic signature based on a qualified certificate and produced by a secure signature creation device.
© fedict All rights reserved 24 Digital certificates > Digital certificates on Belgian eID cards Issued by an accredited Cerification Authority Allow signatures with same legal value as handwritten signatures > Signature function not activated for minors > Authentication and signature data not activated if citizen does not want to
© fedict All rights reserved 25 Legal aspects Belgian electronic identity card eID and privacy
© fedict All rights reserved 26 eID and privacy > Visual control of the eID Only obliged to show the eID in restricted cases (legal authorities such as police) Article 1 Royal Decree 25 March 2003 on electronic identity cards
© fedict All rights reserved 27 eID and privacy > Electronic control of the eID Strictly regulated, only by Royal Decree Article 6 § 4 ID card Act
© fedict All rights reserved 28 eID and privacy > Use of national identification number Act of 8 August 1983 (amended by Act of 25 March) Use of national identification number only after authorisation of Sectoral Committee (Privacy Commission) and only for specific groups (Belgian public authorities, public and private entities for fulfulling a task of general interest, subcontractors of Belgian public authorities, Notary public and baillif, Pharmacists, Lawyers)
© fedict All rights reserved 29 eID and privacy > Rights as a citizen Access right to data on eID and data in National Register of identification data (via eID, via municipality) Correction right (mistakes or incomplete information) Information right Everyone who accessed data in National Register of identification data during last 6 months
© fedict All rights reserved 30 > Questions > Samoera Jacobs >
Legal aspects of eID Dr Patrick Van Eecke Attorney at law (DLA Piper Rudnick Gray Cary) Lecturer (University of London & Solvay Business School)
Communication for the open minded Study on user identification methods in card payments, e-payments and mobile payments Summary of recommendations (WP5)
E-ID and identity management aspects in the Belgian social sector Frank Robben General Manager Crossroads Bank for Social Security General Manager SmalS-MvM.
1 Professional qualifications Presentation of main components of Commission proposal IMCO 9 January 2012 Priority under Single Market Act.
R4eGOV e-ID USER GROUP MEETING 26 April 2007 The Crossroads Bank for Social Security succeeding on interoperability within the social sector R4eGOV e-ID.
Prof.Dr.Victor PATRICIU, ROMANIA ITU- E-Commerce Centers for the CEE, CIS & Baltic States Regional Seminar on E-Commerce May, 14-17, 2002, Bucharest, ROMANIA.
DG Research - Directorate B - Unit 02: Strengthening cooperation in research and European scientific base Jean-David MALO - Brussels, 30th of September.
1 HIPAA Privacy Basics Presented by: Michele A. Masucci Harvey Z. Werblowsky McDermott, Will & Emery October 30, 2002.
FP7 & CIP New ways of interacting 23/06/ Ways of interacting - Topics Part 1 :The Research Participant Portal (PP) –Roles and Access Management.
1 16/02/2014 The Negotiation Process: Negotiation timeline Participant Portal NEF – Negotiation facility Anita Kucharska Administration and Finance Unit.
Dra. Isabel Davara Fdez. de Marcos U.S. Department of Commerce Washington, D.C., October 2007 CONFERENCE ON CROSS BORDER DATA FLOWS.
1 NISTIR 7628 Guidelines to Smart Grid Cyber Security Volume II: Privacy Briefing February 16, 2011 CSWG Privacy Subgroup Lead: Rebecca Herold
Harmonized implementation of CDM Accreditation CDM-Accreditation Panel.
AVIATION SAFETY Recent Developments in the EU Aviation Safety Policy 6 – 8 November 2007, Bangkok (Thailand) DGTREN / Air Transport / Air Safety /
EHealth: some challenges Frank Robben General manager eHealth-platform Sint-Pieterssteenweg 375 B-1040 Brussels
European Aviation Safety Agency 04 July 2007 M-005 Limited pilot owner maintenance Slide 1.
European CommissionDirectorate-General Justice, Freedom and Security Data Protection 1 Conference on Cross Border Data Flows & Privacy October 15-16, 2007.
13 September 2007Czech Republic NPA Amendment to Part-M for aircraft not used in Commercial Air Transport Juan Anton.
Chapter 8 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
1 CURRENT DEVELOPMENTS IN THE REGULATORY FRAMEWORK OF THE EUROPEAN BANKING SYSTEM Prof. Christos Vl. Gortsos Secretary General, HBA November 2007.
ICT-PSP Reporting / payments Willy Van Puymbroeck 23 June 2011.
CologneY Morier A concept for better regulation in general aviation Part-M and General Aviation workshop Cologne, 01 December 2006 Y Morier.
European government procurement policy and experience Rita Beuter Senior Expert, European Policies, EIPA, Maastricht (NL) © EIPA – 2008.
1 HIPAA Privacy Standards Health Insurance Portability and Accountability Act – HIPAA Privacy Standards Healthcare Provider Training Module Copyright 2003.
Presented By: Cinde Warmington, Esq. Shaheen & Gordon, P.A. 107 Storrs Street P.O. Box 2703 Concord, NH
1 The Ontology of Documents Barry Smith.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa: Transposition of SADC Cyber-security.
The Legal Framework for Creating Trust in Cyberspace: Security and Privacy Skopje March 2006 James X. Dempsey Center for Democracy & Technology Global.
Copyright Davis Wright Tremaine LLP - Jan Working with the HIPAA Privacy Manual and Forms --- HIPAA Summit West II Clark Stanton & Tom Jeffry Davis.
Washington, DC I Newark I Minneapolis I Portland I St. Louis I New Orleans I Los Angeles I Orlando The E-Rate Program CIPA Update Fall 2011 Applicant Trainings.
© 2016 SlidePlayer.com Inc. All rights reserved.